Hmm. Much depends on where you live. If you are on the west or east coast, with great public transport, then I agree.
If however, you live in Texas, where public transportation is treated as a poor joke, and one in bad taste at that, and vast metroplexes, then maybe not so much.
It's funny, because the buss routes through the "poor" side of town are 40% less than on the "rich" side of town. On the poor side, you are expected to walk as much as 6 miles to a "transportation hub", while on the "rich" side, there are no routes longer than a mile away from any business or residental section.
Hmm. Much depends on where you live. If you are on the west or east coast, with great public transport, then I agree.
The issue here isn't that CostCo is being numb, the issue is that people can sue CostCo if they claim to be sick from the peanut butter. Even if the food bank gives it away, and the person that gets it gives it away, the chain is still there, and CostCo is still in the sights of a plaintiff as a target for a suit.
This is pretty much why railroads will shred brand new cars if they were in a derailment. It's easier accounting to pay the manufacturer for the car than to risk 100,000 or more in liability because the car "might have been" damaged in the derailment leading to the suit. Hmmm. $40K for the car an know that's the end of it, or risk potentially $100K+ payouts for decades after from someone that might not even be born yet? It's simple math.
He's a sysadmin at the NSA, which means he's supposed to be maintaining their servers -- not looking through classified materials.
That's a problem the NSA needs to look into. Unauthorized people seeing classified data is a problem.
So if he were to report to his superiors about his concerns with any of these highly classified programs, he'd be admitting to looking at information he should never touch.
Another problem for the NSA to look into.
If he did anyway, he would have been shit-canned immediately and investigated.
Third time's the charm, right? Right?
So, it sounds like a complete pile of horseshit to me.
Except so far no one is saying "yeah, we looked into his complaints, they were completely baseless."
By the way, my tag line is the same tag line I've used for most of the years I've been reading Slash Dot.
Ordinarily tracks next to a derailed train are closed, being considered unsafe until a track inspector or officer OKs it's use.
I have a HD camcorder. The charger is proprietary. It dose the amazingly complex thing of supplying 8.4 VDC at 1.5 amps. The battries are proprietary too. They supply 7.4 VDC at 890mAh.
Not common (and I think I know why) but not out of the realm of cobbling up something to match. However, any aftermarket parts just don't work. Why? Because they don't have the all holy and copyright/trademarked "protection" of geniuine equipment which would "degrade" my user experience. Never mind that a simple battery for this camcorders costs retail $190USD, while the price of the parts is nearer to $12.
And while we are about tilting at windmills, let's go after ink cartridges. I wouldn't mind paying $400 for a printer, if I could get ink packs for it for less than $130 per month to print about 200 pages.
No one sane wants to see a city vaporized by a terrorist's atomic bomb, but it that any worse than a society where we have no secrets from the Government? "I've got nothing to hide" is a mind set that trusts that someone won't find a rationale that something you did was harmful. Then make your life a living hell with "secret evidence" you are not able to see or refute.
To quote Ben Franklin: "They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety."
How do we, the citizens, reign in the over broad, overzealous surveillance culture? Normally I'd say "cut off the money" but that depends on elected representatives to pass a budget to do just that. Time and again, they have failed to do so."
The barrier to entry for competition in the US is the last mile from the home to the internet hub. This may of course be more than a mile, but usually it's right around that. Cable companies have pumped billions of dollars per large city into their infrastructure. AT&T same. They are not about to allow competition in their areas if they can (legally or under the table) prevent it. Some of the dirty tricks used by incumbent telco operators is to have a "third party" buy up internet cooperatives once they become medium to large (more than 1000 subscribers), then bankrupt them, forcing the current customers to either pay much higher fees for less service via the incumbent, or do without internet all together if the incumbent decides a portion of the co-op is too expensive to build out to.
As far as radio frequency spectrum, look at what most of them already have in inventory versus what they have in use. The incumbents are stock piling spectrum to keep it out of the hands of competitive companies that require it to provide better service at lower cost. The FCC needs a rule that if 50% of the spectrum is not in at least 80% use, the spectrum is taken away and put back up for auction.
It is frequently stated that the US has the worst internet at the highest costs in the world. This is incorrect. It's only about the 8th worst, it just affects the most people.
Are sites that do this shooting themselves in the foot and losing a lot of sales, or am I a stick in the mud for not wanting to part with my email and telephone number to get a price?"
I have an encrypted loop back file that auto-mounts upon log in, requesting first the account password via getty, then the disk password in
Interesting thing to note kids:
Never use mass transit without pulling out your "Sunday go to meetin'" laptop. You know the one I mean.
The one that, first thing you do, is to DOD wipe the drive (Thanks DBAN!), then load the OS (Linux, of course.)
If you mount a drive over a directory that already has files in it, you can't see the files in the original directory.
So, in my encrypted directory, I have many many files of Porn that I bought the files. Carefully recorded in an invoice.txt file in the directory
along with the bank account
gibberish. Nothing to see. Honest Injun!
On the base directory, I used to have my "real" files. Now I do something far sexier than that dodge. I used to just not give the loop back encrypted drive
a password, it would fail to mount, and I'd have my real files.
The key takeaway here is "Give 'em something to titillate them while at the same time hiding your real private files. Sensitive files belong in a encrypted cloud drop box outside of ANZAC treaty partners. Remember to delete history on that kiddos. Not ALL history, just that which shows you accessed a drop box."
I have to wonder though. Why am I more afraid of my own government than I am of "terrorists"?
I don't want to hurt anyone, and I don't have a "statement" to make that requires more than a few harsh words to select people behaving badly.
The below has been my tag line almost since I opened a Slashdot account. Sad to say, it's more true now than it ever was before.
AT&T - for all that it's the same name as the precursor of the inventor of the telephone system and many innovative systems, is sadly not even a pale ghost of it's former glory. What they are is group of clue avoiding MBAs cum lawyers running a reconstituted monopoly to maximize shareholder profits and piss off customers. They are worse than that barking dog that just won't SHUT UP, they are a drag on innovation, competition, and customer service. While they do a great job of "servicing" their customers, it's not in a way that is appreciated or desired by those same customers. Besides, they use crunchy peanut butter as lube. With no "reach around". (I know how disgusting a mental image that is. Sorry, but that's about what I feel about them.)
If I had the power, anyone at AT&T (Indeed, ANY telco) above lower management would be forever barred from working anywhere near telecommunications, internet, or anything more advanced than a grill for flipping burgers. Even that I would consider high risk; food poisoning, you know.
America: Highest Internet costs, Lowest Internet speeds. Go figure.
On what is kept. If it really is just the metadata and not the conversation, then the storage requirements are not all that large.
For Landlines, there is a unique identifier applied at the switch. I mis-remember what it's called, but in South Texas, it usually started with BAPA- blah blah blah for several digits.
For cell phones, there is the OMEI/UDID/ESN. Normally around 14 to 20 digits, usually 15.
Next, called number, same info.
Last, call duration.
I believe it's long been known that using particular words in a telephone conversation would raise a flag. I don't know if that's true or not. If so, lets consider this scenario:
Call metadata captured and stored - always.
Call voice session saved to a temporary storage area.
Voice data is analyzed for key words using automation. (Think about when you call your credit card company, and can input your CC number by voice)
If no keyword flags are raised, delete the conversation after X time (or immediately, who knows?)
If keyword flag is raised, score by number of keywords, flag conversation for human review, preserve all data.
After human review, who knows?
What I think: If preserving our freedom comes at the price of invading all of our privacy, then the terrorists have been gifted with a victory they could have never won for themselves. We have destroyed our freedom with the illusion of security, and now have neither freedom nor security. To draw a parallel, how is having the TSA able to squeeze my balls protecting me? "Dude - don't touch my junk!"
About all you can do if you can't get someone to listen (and I'll bet you can't, and I'll tell you why) is to refuse to give your permission for your child to use the Internet as school. So why won't they listen?
When I left, there was a ~4 million dollar budget to renew and expand the email system (All teachers and staff, all kids, plus all parents, maybe e-mail for life like some colleges do, mail boxes that hold more than 512 megabytes and anti-virus). Google came in and moved everything to Google for under $200,000, expanded coverage of users as we'd wanted, and freed up 3 staff members that were doing nothing but email for other tasks. Hard to argue that $3.8 million bucks that suddenly pops up for other uses isn't a good thing, especially when a lot of other money was cut off. What's going through the superintendents head goes something like this: "Someone worried about privacy -something I don't understand but sound like it's not that important- for kids versus like, 3.8 million I can put toward fixing X, or maybe keeping those 1,000 classroom teachers I was going to have to lay off..."
Booth babes (of either sex and orientation) are a red flag that the company you are dealing with would like to grab your attention using the nether regions of your body rather than engaging your mind with a fantastic product. Easy tip off that they are more interested in flash over substance that will leave one looking foolish for having selected their product.
Look - don't buy.
Pet Peeve: Coders that bring up the earliest record in history. If a customer with 7 years of history calls up with a problem, likely it's with the latest order, not one they made 7 years ago.
That said, a database should treat all information in it as frangible. Nothing is ever written in stone, and all input can never be 100% validated by rules. The best you can do is say "Did they really go from Male to Female?" or "Customer unique identifier change is not supported on this version. See your supervisor for how to proceed."
What about Open Stack? For production, don't oversubscribe RAM. For a play ground, isolate them to one physical machine and let that machine over subscribe. I'm guessing but you can host about 20-25 virtual servers per compute node, you'll need a physical management machine, and if you do a lot of different images/want backups, you'll need a machine with a bunch of disk space or a iSCSI appliance. The open stack doc will tell you which iSCSI system will work.