Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:So, what was the nature of this agreement? (Score 2) 122 122

I read an blog article written by Bob Metcalfe a few years ago where he mentioned that every building in Manhattan is within 150 feet of a fiber optic cable, and only a hardware install from being an OC768, if your curious that would be a monthly inernet bill of between $1.5 - 2.5M and carry 975 times the bandwidth of Verizon's FiOS. The one of biggest expense in putting in a fiber network is actually laying the fiber and laying 1 cable isn't significantly less expensive than laying 50, which is why most of the fiber is dark, it's cheaper to put it in now before labor costs go up.

Comment: Re:If you're using GPL code, you have no choice (Score 2) 162 162

the GPL is free even for the arseholes. it just doesn't let them be arseholes WITH the GPL-ed code.

GPL = once free, always free. no special privileges for arseholes to make it non-free in future.

The copyright owner/owners can always re-issue under any licence they choose at any time, the only complication that can arise is when there are multiple owners who can't or will not agree to change the licence. This is a problem with the Linux kernal because there have been so many contributions that have been added and removed over the decades that no one knows who all the copyright owners are.

Comment: Re:Not first (Score 2) 181 181

I use Sonic.net and I'm not affected by this at all.

LOL @ everyone using those shit ISPs.

Those guys are level 2 ISP, one notch below internet backbone, except AT&T which is level 1 too. There is a very good chance Sonic.net is peering with one or more of the 5. When they screw with the traffic, they're very likely screwing with your traffic too.

Comment: Sound Like HIPAA Violation to me (Score 5, Informative) 142 142

Allstate's patent also said the invention has the potential to evaluate drivers' physiological data, including heart rate, blood pressure and electrocardiogram signals, which could be recorded from steering wheel sensors. ... The recorded data may also provide an objective behavioral data collection system for third parties, e.g., health insurance companies, lending institutions, credit-rating companies, product and service marketing companies, potential employers, to evaluate an individual's behavioral characteristics in a real-life and commonly experienced situation, i.e., driving a motor vehicle, Insurer monitoring your heart rate?

That's a lot of big words, but all I can hear is HIPAA violation!

Protected Health Information.
  The Privacy Rule protects all "individually identifiable health information" held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy Rule calls this information "protected health information (PHI)."12

“Individually identifiable health information” is information, including demographic data, that relates to:

        the individual’s past, present or future physical or mental health or condition,
        the provision of health care to the individual, or
        the past, present, or future payment for the provision of health care to the individual,

and that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual.13 Individually identifiable health information includes many common identifiers (e.g., name, address, birth date, Social Security Number).
Summary of the HIPAA Privacy Rule

Comment: Re:Back end (Score 2) 142 142

Nope.

For analysis the entire data set has to be decrypted.

Well lets see:

Transparent Data Encryption

Oracle Advanced Security Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information from storage by enforcing data-at-rest encryption in the database layer. Applications and users authenticated to the database continue to have access to application data transparently (no application code or configuration changes are required), while attacks from OS users attempting to read sensitive data from tablespace files and attacks from thieves attempting to read information from acquired disks or backups are denied access to the clear text data. Transparent Data Encryption

Summary: With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and BitLocker Drive Encryption, the new volume-level encryption introduced in Windows Vista®, both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption, EFS, or BitLocker. Database Encryption in SQL Server 2008 Enterprise Edition

The major players seem to do it out of the box.

Comment: Re:Project administrators held PRC passports! (Score 2) 142 142

It's because consulting firms are unable to find high skilled computer experts in the US, so they must expand the H1-B program to bring in more foreigners to compensate for the lack of competent Americans!

That should be

It's because consulting firms are unwilling to pay competitive wages for highly skilled computer experts in the US, so they must expand the H1-B program to bring in more foreigners to compensate for the lack of competent Americans willing to work for peon wages!

Comment: Re:I for one, (Score 1) 401 401

Europeans just can't process the concept of individual sovereignty and that rights and privileges originate with the individual and Governmental Authority is granted to the government by the individuals and Government governs only at the pleasure of the People not the other way around. Centuries of being conditioned to except sovereignty as top-down coming from God -> Pope -> King -> Duke -> Serf, makes the concept of individual sovereignty too alien; Government Bureaucrats like the top-down fine.

Counting in binary is just like counting in decimal -- if you are all thumbs. -- Glaser and Way

Working...