Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Why? (Score 1) 166

It may be old, but it is a quick solution for many tasks. It is a text based coding environment using something similar to perl hashes, but they are multidimensional and sorted. Put a carot in front of a variable and it becomes a database entry that all processes can see, but otherwise local variables for the code. The commands can be shortened in many cases down to a letter or two. Strict form of Optional-Label space command space arguments space command space arguments..... Reminds me a little of basic, but instead of line numbers, optional labels on any line will name and index the code as well as the data storage.

There were many at one time, but most were gobbled up by Cache'. They seem to have turned theirs into a web server to avoid the terminal text limits. Pity.

There is a FileMan package of mumps code made for the VA way back, that is a pretty complete relational database package for those needs. Call centers have used it well. Multi-user in/out bound switch controlling script engines. Some of the script applications used FileMan as a base for storage, but the data could still be used in a native manner. Some of the script editors were very featured, and could generate mumps code very cleanly. Other than FileMan however, I did not see anything but custom code.

I liked using under VMS the most, but the aix version is just as useful. DOS versions were a nightmare for me. I love it still, but trying to stay with it and avoiding the healthcare industry is getting harder every day. Most recently however, perl takes up more of my time.

Comment Politics Too? (Score 1) 385

Doesn't Robin Hood Theory go for bad politics as well as bad energy? And would not be limited to only one area of life.

Take the money from those lousy, good for nothing, bad politicians in office, and all kinds of good can be done!

Why limit yourselves to only fixing energy? Get those ignorant, self-serving, A#%holes out of office! The rest will fall into line at the same time.

Comment Re:Wait a minute... (Score 1) 152

.... /. claim MS gives the (favorite three letter agency goes here) backdoors to all of their clients machines?

That was in the era where software was delivered/obtained and installed on the users computer. This is the age of server based subscription applications. They were only allowing back doors into other people's equipment, never MS server total access if they could help it.

Do unto others, never me. -- MS

Comment They were working for/with NSA for one of the long (Score 1) 547

They were one of the earliest companies working for/with the NSA on snooping their customer base, that was listed on some of the timeline graphics leaked. They did what they could to get camera and mic in all their customers' homes. They could upload firmware to the unit under secret-non-court orders to enable live recording/viewing. The "gate" of everyone visiting said customer's home can be collected for future identification off security cams. Facial recognition collections. Voice ID. All of this would be considered meta-data in the business they are in, to be collected in the big data bin of Utah.

Comment Data-Rendition...? (Score 1) 262

They will always deny US spying on US citizens. The same as with torture, as they are not the party directly spying on US citizens. The same technology companies providing the "foreign-spy" tools are used by allies. UK using the same tools and feeds can profile all US citizens without law coming into play. The US just shares intelligence with the UK, giving them all they produce without actually spying on their own citizens. Do we call this "Data-Rendition"?

Comment Filibuster how? (Score 3, Interesting) 213

This will give the old ones in power a means of censoring or silencing unpopular (to them anyways,) rants from either the other side of the aisle or freshmen seats. "He is not following Majority Rules! Cut that guy's feed!" C-SPAN cannot even keep a feed coming during "public" events, and you think this will change?

This is just adding a new power to those in charge that would directly effect our governing. A switch to silence instead of a gavel and pleading.

Comment Only one piece of Evidence Exists? (Score 1) 306

None may get standing unless the case with standing only has a single piece of possible evidence.

If there is more evidence, regardless of case details, other evidence will be obtained by using the purloined information from illegal spying. Something will be found through legal means, and be presented in court with no need to mention the illegally obtained information.

There will be no standing.
There will always be illegal snooping.
The genie is out......

Comment Sue the school for "not intruding" (Score 1) 349

Sue the school for "not intruding" into the personal lives of every other cussing student. Why did they open themselves up to liability of enforcing students private speech? How many have been victim to one of their students on a rant in a public place, virtual or real, where nothing was done?

One of the only ways to get past this undesired practice of intrusion into personal life by the schools is to hold them accountable and show them what they stepped in with their new practice. They enforced their whim in an area they should not be intruding. It does not matter who owned the pipes used by the punished. If they want to play full time nanny, hold them to it for all students. They do not get to apply a policy to only a single student they have in their sights.

Comment Must Wipe It (Score 5, Insightful) 385

No decision needed. Look all you want, but the liability is on you if someone decides your computer is of interest and data is questionable. Unless you report it to vender in a verifiable way, data on the drive, even if it was not yours, is now yours in any examination. Report it in writing or no evidence will exist to point in someone else's direction for liability.

Wiping beyond technological limits of retrieval is important with both criminal liabilities and civil copyright liabilities. The odds of old data being a problem in your life may be low, but it would be icing on the cake with any situation bringing your drive to the attention of some types of investigations.

Call it paranoia if you like, but why drive around in your new used-car with a suitcase in the trunk that came with the car without knowing precisely what is inside. Remove the suitcase, or examine every square inch of it looking for contraband..

Slashdot Top Deals

Make headway at work. Continue to let things deteriorate at home.