Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:I have no fear of AI, but fear AI weapons (Score 1) 280 280

Well there is robotic discrimination and not allowing robots unattended by a human. But let's say we get far enough with the skins we create to make robots indistinguishable from humans, there is always asimovs 3 laws preprogrammed into the robot requiring the technological knowledge to be higher.

But let's assume these are as easy to hack as a console, sure the technical limitation still brings the potential down but there would be a decent number of people who could pull that off. Definitely an organized crime syndicate of some sort, so we have these robots who look like humans, talk like humans, act like humans and imprisoning them doesn't scare them.

Question: How is this different than today? I guess more energetic and go getter mentality? Also we could wire in rfid broadcast chips to every robot and make them more trackable through different techs. But in the end someone who is highly technically skilled could get around this, just like today someone who is highly technically skilled could likely create there own version of this or, you know, an explosive device.

Comment Re:or... (Score 2) 363 363

Seriously, when was the last time you used Google maps? Not only the one on my mobile phone but the one on my desktop tries to give me first the quickest route (which usually involves hiways for long periods of time), second an optional route with no tolls, third several other route choices of different combinations. No seriously, they have had an "avoid tolls" check box on there site for the longest time.

Lastly, it tends to be faster than my garmin at recalculating (and more precise) but my garmin is like 6ish years old so that probably has little to do with them and far more to do with me failing to update my tech.

Comment Re:Cell phone WAP (Score 1) 267 267

It could, yes, it could also just get me disciplined, but that's up to HR and my direct manager... if I'm even detected. None the less, network administrators really do have a god complex if they think they can fire other people. All they can do is let the manager know and handle it (which is usually "dude, knock it off" and you knock it off).

But I'm also not doing anything heavier than standard web traffic and not going to really any sites that are truly offensive (but for some reason work finds facebook okay and cracked an evil bastard child). Mostly server maintenance or personal notes on my server. I am kinda a boring person in retrospect.

Comment Re: Like the nazi used to say (Score 1) 431 431

A couple of kids have, here is one

Admittedly not a nuclear bomb, just a reactor but none the less. I will agree to a certain extent acquiring knowledge does not in itself justify breaking the law. However, sometimes the pursuit of knowledge requires it. Ask Galileo. (Admittedly that is a false equivalency, but so was petty larceny to building a nuclear bomb).

Comment Re:Cell phone WAP (Score 2) 267 267

pshhhhh, ssh (or other protocol) tunneling on an unblocked port always worked for me...

The point is, you can't really stop an informed employee/network user from getting around your firewalls. Worst case scenario they just chain off the phone. The downside to this is you still need a firewall to block malware sites. Informed users can still end up on those so that is a potential vulnerability but non informed users have a much higher chance without some type of web blocker. So I'd say just keep a blacklist of known malware and open everything else up (or yeah sign in/log/tag time). But I'd definitely keep the malware sites blocked.

Comment Re:For 100 points... (Score 1) 101 101

Google sued bt and apple at one time. Both settled and they've never really been aggressive, but still... Change of management, change of CEO, change of corporate policies, downturn in their economics. No one should have nukes or everyone should have nukes, that is really the only way to sustain. (In case it's not clear nukes are a metaphor here).

Comment Re: "...keep everyone who uses the Internet safe." (Score 2) 91 91

My opinions of the ACA not-withstanding, what do you call 17 U.S. 518 (1819) and 118 U.S. 394 (1886).

I used wikipedia for easy access, but I provide the reference numbers if you like to look them up. And these aren't the only cases, (note one is 1819 so don't even begin to say this wasn't established in the early years of the US). The SCOTUS job _IS_ to interpret the law, actually it's not just limited to the SCOTUS but the judical branch interprets, lower courts are forced to take a higher courts interpretation though.

Comment Re:It might help if courts took hacking seriously (Score 1) 40 40

Because that has worked so well in the United States. Last I checked we criminalize everything over here including hacking and it's not taken exactly lightly. But people still do it, and people still sell drugs! We need a better solution, but using the legal system doesn't work. It really doesn't. I'm not going to whine about people losing their future livelyhood or how bad prisons are. I just want to point out kids still do it as a hobby and so do adults.

Comment Re:Why offer only xml? (Score 1) 6 6

I'm not sure if you read through the solution I proposed though, the idea above is that you would generate both json and xml (actually specifically it would be json->xml and it would look like this):

public static String createXmlObjectFromPojo(MyPojo myPojoIAmTransforming){
JSONObject jsonObj = new JSONObject(myPojoIAmTransforming);
String xml = XML.toString(jsonObj);
return xml;

In a handy little static util (5 lines of code), but then you could take it further and offer BOTH JSON or XML (esp if you are using spring but as long as you have a url mapper, I am going to write it like I am using spring mvc).

MyController {
@RequestMapping("/url/request.json", RequestMethod.GET)
public String returnJson(ModelMap map){
//Do all your logic going to assume you've created the bean to return your pojo
return new JSONObject(myPojoIAmTransforming).toString();

@RequestMapping("/url/request.xml", RequestMethod.GET)
public String returnXml(ModelMap map){
//Do all your logic going to assume you've created the bean to return your pojo
JSONObject jsonObj = new JSONObject(myPojoIAmTransforming);
String xml = XML.toString(jsonObj);
return xml;

Then just have a common method that handles your logic generation (you can even further reduce the code but I'm typing this off the top of my head, just been doing it for a decade or so...). Then you don't have to use anything like jaxb and code proliferation. You just keep your code nice and tight with your restful services. Hope this helps!

You are in a maze of little twisting passages, all different.