Forgot your password?

Comment: Re:I must be the outlier (Score 1) 234

by RobertLTux (#47568321) Attached to: Comcast Confessions

easy way to handle this

involve either a Priest or a Lawyer in the process (bonus points if you have BOTH).

Okay Your Honor i have here a written statement from Father Smith and Mr Jones Equire stating that on the X day of the Y Month in the Year of Our Lord two thousand and Z the three of us visited the retail location and 1 returned the company owned equipment 2 canceled the service.

Assuming that Comcast even shows up this is an open and shut case.

Comment: Re:For software developers (Score 1) 134

there are a number of places that sell girls ballet costumes that could be used to distract somebody with security clearance therefore we must monitor/regulate access to these stores selling "terror supplies"!

just about anything can be somehow used to "violate National Security" with minimal work and the correct context.

Comment: In health care?? (Score 1) 143

by RobertLTux (#47371151) Attached to: Ask Slashdot: Replacing Paper With Tablets For Design Meetings?

I would suggest using tech in 2 different groups

1 where it is absolutely needed: As you can see in this video patients that have a combined Coughing Fit and Projectile Vomit episode are spraying material beyond ....

2 Only when you can justify putting said tech in a BURN BAG with the rest of the stuff from case 1

just remember paper can be put in a Burn Bag without having to file an EPA damage report.

If you actually need to use tech then plan on having meetings to

1 agree on a solution
2 actually implement said solution

Comment: Re:Distinct DNA (Score 1) 1330

by RobertLTux (#47363217) Attached to: U.S. Supreme Court Upholds Religious Objections To Contraception

actually i would work this from the other side

we need to sort out how to remove and then support prenatal infants so that we can remove the "Danger to The Mother" part of the equation.

Of course i would also propose a 3 Strikes and Your OUT!! policy where if a young man "collects" a Third "Baby Momma" he gets banned from the game (and has his "bat" removed to enforce this).

but then im a Conservative Baptist WOLF with anger issues.

Comment: Grace Hoppper would be PISSED (Score 3, Insightful) 548

by RobertLTux (#47281527) Attached to: Girls Take All In $50 Million Google Learn-to-Code Initiative

She would most likely start cutting down one of her microseconds to strangle some folks. We don't need to do stuff like this we need to get kids to learn from the beginning that

1 Girls are not SEX OBJECTS
2 Smart and Pretty are not exclusive of each other
3 Some girls can do Math and some boys can't do Math (and science and tech and...)

Comment: Re:ooh ive played this game before. (Score 1) 170

as as a cable tech (being paid by the hour) i reserve the right to

1 spend extra time doing the job because i had to stop every 10 minutes to catch my breath

2 accidentally miss wire your setup to give my fellow (nonallergic) tech a swing at a service call

3 tick that Job Required Uncovered Labor [X] box and add $40.00 to your bill

4 not complete the job at all and tick the Customer Denied Needed Access[X] box

5 just about anything else i can do to F4 with you (and get away with it)

Comment: Galaxy of WRONG here (Score 1) 185

by RobertLTux (#47141755) Attached to: Ask Slashdot: Taking a New Tack On Net Neutrality?

If you actually block legit sites unless those sites pay you for access.

1 they will go off campus for access when they need it
2 if any of those schools are or have a brother/sister college that "does law" they will spin up a Class Action Lawsuit in DAYS

In short if you like what a chicken looks like after being sucked into the engines of a C-5 then go ahead and BE THE CHICKEN!!

Safer would be to make sure than "friendly sites" are always fast.

Comment: the way it should be for TOFC type stuff (Score 1) 156

by RobertLTux (#47131407) Attached to: Security Researchers Threatened With US Cybercrime Laws

mock up a few copies and then dare folks to hack it (sort by remote and physical access type hacks)

when you get something that can stand up to a decent number of hacks (remote hacks that require you to be on the same subnet on a blue moon with Big$ tool between the hours of 22:00 and 23:59 and the product needs to be in mode X and physical hacks that would be obvious don't count) then you as a last check put up a BIG$ bounty on hacks.

Then you can release a cyber product targeting children.

Comment: Re:Doesn't seem like a difficult question (Score 1) 437

this is where a LEO car should be able to engage a FOLLOW ME type mode to get the car somewhere safe i could see it as

1 the car detects "driver failure event" (everything from just nodded off for several seconds to full cardiac arrest)
2 the car then enables the hazard lights slows down to safe minimum and sets off the "driver in distress" beacon
3 the nearest LEO car then links in and starts guiding the car off the road.

this works just as well with an organic driver as a non-organic driver

It is surely a great calamity for a human being to have no obsessions. - Robert Bly