Ordinarily tracks next to a derailed train are closed, being considered unsafe until a track inspector or officer OKs it's use.
I was user 341 at Sourceforge, 14 years ago.
I always liked the SF.net idea. This is kinda sad to see happening.
But enough crying over spilt milk.
* Don't use Dice, don't hire folks using Dice.
* Move your own projects off sourceforge.
* If you need a project from sourceforge email them and ask them to avoid the download jacking by moving their project if possible
* Support other providers who play fair.
* If you use a website reputation tool, mark sf appropriately.
I love wikipedia (and have contributed both $ and time).
There seems to have been a move on Wikipedia away from actual contributing, and towards criticizing others. This drives new folks away.
It's far too easy to slap all the labels on articles. The rate of tagging for problems seems way above the rate of fixing.
Do these sound familiar? "This article may require cleanup to meet Wikipedia's quality standards. No cleanup reason has been specified." "This article may require copy editing for grammar, style, cohesion, tone, or spelling." "This article's plot summary may be too long or excessively detailed." "This article may need a more detailed summary" "This article may have too many section headers dividing up its content."
Perhaps they could just put a global message up. "This Wikipedia may have items that require editing. If you find such an entry, please fix it yourself."
Before long we are going to have just heavy fisted editors, and the PR flaks paid enough to deal with them and warp the articles.
Most regular people don't have the time to battle it out, but I thank everyone who tries! And I love the "welcome to wikipedia" people, keep up the good work.
I have a HD camcorder. The charger is proprietary. It dose the amazingly complex thing of supplying 8.4 VDC at 1.5 amps. The battries are proprietary too. They supply 7.4 VDC at 890mAh.
Not common (and I think I know why) but not out of the realm of cobbling up something to match. However, any aftermarket parts just don't work. Why? Because they don't have the all holy and copyright/trademarked "protection" of geniuine equipment which would "degrade" my user experience. Never mind that a simple battery for this camcorders costs retail $190USD, while the price of the parts is nearer to $12.
And while we are about tilting at windmills, let's go after ink cartridges. I wouldn't mind paying $400 for a printer, if I could get ink packs for it for less than $130 per month to print about 200 pages.
No one sane wants to see a city vaporized by a terrorist's atomic bomb, but it that any worse than a society where we have no secrets from the Government? "I've got nothing to hide" is a mind set that trusts that someone won't find a rationale that something you did was harmful. Then make your life a living hell with "secret evidence" you are not able to see or refute.
To quote Ben Franklin: "They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety."
How do we, the citizens, reign in the over broad, overzealous surveillance culture? Normally I'd say "cut off the money" but that depends on elected representatives to pass a budget to do just that. Time and again, they have failed to do so."
The barrier to entry for competition in the US is the last mile from the home to the internet hub. This may of course be more than a mile, but usually it's right around that. Cable companies have pumped billions of dollars per large city into their infrastructure. AT&T same. They are not about to allow competition in their areas if they can (legally or under the table) prevent it. Some of the dirty tricks used by incumbent telco operators is to have a "third party" buy up internet cooperatives once they become medium to large (more than 1000 subscribers), then bankrupt them, forcing the current customers to either pay much higher fees for less service via the incumbent, or do without internet all together if the incumbent decides a portion of the co-op is too expensive to build out to.
As far as radio frequency spectrum, look at what most of them already have in inventory versus what they have in use. The incumbents are stock piling spectrum to keep it out of the hands of competitive companies that require it to provide better service at lower cost. The FCC needs a rule that if 50% of the spectrum is not in at least 80% use, the spectrum is taken away and put back up for auction.
It is frequently stated that the US has the worst internet at the highest costs in the world. This is incorrect. It's only about the 8th worst, it just affects the most people.
Are sites that do this shooting themselves in the foot and losing a lot of sales, or am I a stick in the mud for not wanting to part with my email and telephone number to get a price?"
I have an encrypted loop back file that auto-mounts upon log in, requesting first the account password via getty, then the disk password in
Interesting thing to note kids:
Never use mass transit without pulling out your "Sunday go to meetin'" laptop. You know the one I mean.
The one that, first thing you do, is to DOD wipe the drive (Thanks DBAN!), then load the OS (Linux, of course.)
If you mount a drive over a directory that already has files in it, you can't see the files in the original directory.
So, in my encrypted directory, I have many many files of Porn that I bought the files. Carefully recorded in an invoice.txt file in the directory
along with the bank account
gibberish. Nothing to see. Honest Injun!
On the base directory, I used to have my "real" files. Now I do something far sexier than that dodge. I used to just not give the loop back encrypted drive
a password, it would fail to mount, and I'd have my real files.
The key takeaway here is "Give 'em something to titillate them while at the same time hiding your real private files. Sensitive files belong in a encrypted cloud drop box outside of ANZAC treaty partners. Remember to delete history on that kiddos. Not ALL history, just that which shows you accessed a drop box."
I have to wonder though. Why am I more afraid of my own government than I am of "terrorists"?
I don't want to hurt anyone, and I don't have a "statement" to make that requires more than a few harsh words to select people behaving badly.
The below has been my tag line almost since I opened a Slashdot account. Sad to say, it's more true now than it ever was before.
AT&T - for all that it's the same name as the precursor of the inventor of the telephone system and many innovative systems, is sadly not even a pale ghost of it's former glory. What they are is group of clue avoiding MBAs cum lawyers running a reconstituted monopoly to maximize shareholder profits and piss off customers. They are worse than that barking dog that just won't SHUT UP, they are a drag on innovation, competition, and customer service. While they do a great job of "servicing" their customers, it's not in a way that is appreciated or desired by those same customers. Besides, they use crunchy peanut butter as lube. With no "reach around". (I know how disgusting a mental image that is. Sorry, but that's about what I feel about them.)
If I had the power, anyone at AT&T (Indeed, ANY telco) above lower management would be forever barred from working anywhere near telecommunications, internet, or anything more advanced than a grill for flipping burgers. Even that I would consider high risk; food poisoning, you know.
America: Highest Internet costs, Lowest Internet speeds. Go figure.
On what is kept. If it really is just the metadata and not the conversation, then the storage requirements are not all that large.
For Landlines, there is a unique identifier applied at the switch. I mis-remember what it's called, but in South Texas, it usually started with BAPA- blah blah blah for several digits.
For cell phones, there is the OMEI/UDID/ESN. Normally around 14 to 20 digits, usually 15.
Next, called number, same info.
Last, call duration.
I believe it's long been known that using particular words in a telephone conversation would raise a flag. I don't know if that's true or not. If so, lets consider this scenario:
Call metadata captured and stored - always.
Call voice session saved to a temporary storage area.
Voice data is analyzed for key words using automation. (Think about when you call your credit card company, and can input your CC number by voice)
If no keyword flags are raised, delete the conversation after X time (or immediately, who knows?)
If keyword flag is raised, score by number of keywords, flag conversation for human review, preserve all data.
After human review, who knows?
What I think: If preserving our freedom comes at the price of invading all of our privacy, then the terrorists have been gifted with a victory they could have never won for themselves. We have destroyed our freedom with the illusion of security, and now have neither freedom nor security. To draw a parallel, how is having the TSA able to squeeze my balls protecting me? "Dude - don't touch my junk!"
About all you can do if you can't get someone to listen (and I'll bet you can't, and I'll tell you why) is to refuse to give your permission for your child to use the Internet as school. So why won't they listen?
When I left, there was a ~4 million dollar budget to renew and expand the email system (All teachers and staff, all kids, plus all parents, maybe e-mail for life like some colleges do, mail boxes that hold more than 512 megabytes and anti-virus). Google came in and moved everything to Google for under $200,000, expanded coverage of users as we'd wanted, and freed up 3 staff members that were doing nothing but email for other tasks. Hard to argue that $3.8 million bucks that suddenly pops up for other uses isn't a good thing, especially when a lot of other money was cut off. What's going through the superintendents head goes something like this: "Someone worried about privacy -something I don't understand but sound like it's not that important- for kids versus like, 3.8 million I can put toward fixing X, or maybe keeping those 1,000 classroom teachers I was going to have to lay off..."
Booth babes (of either sex and orientation) are a red flag that the company you are dealing with would like to grab your attention using the nether regions of your body rather than engaging your mind with a fantastic product. Easy tip off that they are more interested in flash over substance that will leave one looking foolish for having selected their product.
Look - don't buy.
Pet Peeve: Coders that bring up the earliest record in history. If a customer with 7 years of history calls up with a problem, likely it's with the latest order, not one they made 7 years ago.
That said, a database should treat all information in it as frangible. Nothing is ever written in stone, and all input can never be 100% validated by rules. The best you can do is say "Did they really go from Male to Female?" or "Customer unique identifier change is not supported on this version. See your supervisor for how to proceed."
What about Open Stack? For production, don't oversubscribe RAM. For a play ground, isolate them to one physical machine and let that machine over subscribe. I'm guessing but you can host about 20-25 virtual servers per compute node, you'll need a physical management machine, and if you do a lot of different images/want backups, you'll need a machine with a bunch of disk space or a iSCSI appliance. The open stack doc will tell you which iSCSI system will work.
It took me all of three minutes to isolate his Flash Cookie.
My my my. Just LOOK at what he's been doing!