Please create an account to participate in the Slashdot moderation system


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:What a f@cking tool (Score 3, Funny) 485

Anyone been accusing Snowden of climate warming yet?

No, but a farmer here had a three-legged calf born on a blue moon. We can legitimately tie that to Snowden making a deal with the devil. We should burn him. If he doesn't burn, he's a witch. If he does burn, then we owe him an apology.

Comment Re:Data data everywhere and not a drop to think (Score 1) 366

this data was not automatically uploaded and calculated.

I know, right? All the sophisticated sensors on an airliner and there isn't one to say your exact weight? The DMV can weigh trucks without stopping at scales now, how is it airlines are still using average passenger and bag weights? This is insane.

Comment Re:No no no (Score 4, Interesting) 607

The outsourcing is already in progress. Look up the term "nighthawk radiologist".

That was in 2004. As digitization has spread through healthcare, the practice has only gotten more prevalent.

If you can pipe the data to somewhere else and get someone accredited to sign off on your work so they are the professional of record, you can outsource anything to anyone anywhere. Use a nurse practitioner for in-office visits, outsource case review to a medical professional somewhere else.

Same deal for lawyers. For contracts, research, etc. you can outsource to paralegals. For discovery, have someone else scan, index, and cross correlate everything before you turn it over to the junior partners, but bill at the senior rate.

BTW there are a lot of unemployed/underemployed lawyers...

Affordable Care Act Exchanges Fail To Detect Counterfeit Documentation ( 246

Tulsa_Time writes with this excerpt of an account from the (unapologetically partisan) Americans for Tax Reform about a report released by the Government Accountability Office in which "application and enrollment controls on the federal exchange and two state exchanges (California and Kentucky)" were investigated by supplying false information; in each case, the investigators were able to obtain and activate health insurance through the exchanges. A slice: Ten fictitious applicants were created to test whether verification steps including validating an applicant's Social Security number, verifying citizenship, and verifying household income were completed properly. In order to test these controls, GAO's test applications provided fraudulent documentation: "For each of the 10 undercover applications where we obtained qualified health-plan coverage, the respective marketplace directed that our applicants submit supplementary documentation we provided counterfeit follow-up documentation, such as fictitious Social Security cards with impossible Social Security numbers, for all 10 undercover applications."

Comment Re:How specifically does it work? (Score 1) 78

( self reply because this is slashdot without edit ability )

Oh ffs, this has nothing to do with signing into Yahoo ON your mobile phone.

> After set-up is complete, users will only have to type in their Yahoo Mail addresses when logging in from a new browser or device to prompt the Account Key log-in process. Yahoo will send a push notification to their smartphone where they can simply hit âoeyesâ to allow the new login. If users tap the notification theyâ(TM)ll be taken to a screen with more detail, such as what type of device is trying to log in and where in the world they are signing in from.

This is about using your phone and it's APP (or even an alternative e-mail address elsewhere) as a final "yes log me in on the device X in the world that just asked to log me in".

This is two factor without the second factor. Instead of sending a code to your phone, they simply send a hyperlink to your phone or alternate e-mail address asking you to confirm a login from elsewhere.

Notice the "second e-mail address" thingie. Yup, if plebs turn that on, e-mail addresses are chained together and someone stealing your gmail account will now have access to your yahoo account.

Hmmm, this is a neat idea, sure is a good idea for grandmas and the like. If it wasn't for the fact that people loose their phones all the time. And having users chain together mail accounts to allow them to recover their account when they loose their phone... eh, sounds dicey...

Comment How specifically does it work? (Score 1) 78

Does anyone actually have a reference to an article describing SPECIFICALLY how it works? Yahoo is being REALLY vague in their press releases, presumably to keep the plebs from getting confused or concerned. (All they say is "look, easy and safe".)

Everyone here is assuming they're sending an SMS code, but the descriptions from Yahoo read like this:

> To sign in, you'll just need to tap "Yes" on the notification we send to your phone.

Are they using MMS? (Multi Media Texts?)

Is their App reading your text messages!?!? Effectively using SMS as a side channel?

You know what comes next -- heavy attacks upon PHONE COMPANIES to steal phone numbers. The creaky ancient phone system is going to bust open under this... everyone's personal phone numbers are going to get slammed on a regular basis. Rich, famous, and powerful people especially.

Comment I hope that ruling stands up (Score 2) 127

There are too many times rights holders throw out a complaint, even when it's a clear case of fair use. Then they put the burden of proof on the publisher to prove it's really fair use. It's abusive and unfair and about time RIAA and that ilk got their pee-pee whacked for papering the landscape with infringement threats.

Comment I have the evidence (Score 1) 696

I have a video camera on the front fork of my bike and have clear evidence of who's at fault. I have clips of city buses crowding the bike lane, the mirror whizzing by inches from my helmet. Other great shots of cars cutting me off on right turns, including one truck that ran me onto the sidewalk with his trailer, ironically next to a sign that said Right Turns Yield To Bikes In Bike Lane. Even left turns, people who can clearly see me coming, cutting it so close I've had to slide to a stop.

Mixed in with the idiots are a far larger pool of considerate people. People who insist on waiting for me, even when they have the right of way, cars that cover for me on turns and those who change lanes to give me more space. The considerate and aware people far outnumber the idiots but the problem is it only takes one idiot to kill you.

In my experience the worst offenders are women. Of the top 10 close calls I've had, 7 were female drivers. Ironically the closest call I've ever had was a police car, typing on his computer and not paying attention. He ran me into the curb and just kept going.

I've also seen my share of bike riders doing the incredibly stupid. Cutting across turn lanes when the arrow is with the cars, riding the wrong way down sidewalks, ignoring right of way at intersections and at night with no lights. So I understand the frustration the other way.

When it comes to bikes and pedestrians on roads, especially in big cities, the people designing bike lanes and intersections are people driving to work. In most cases the problem is literally dictating the solution. The other problem are the righteously entitled who scoff at bike riders because they're not paying road taxes. They're the most deliberate when it comes to ceding the very minimum amount of space when moving over. Those are the only ones I'd really like to drag of their car and beat to a pulp.

Comment I tried the same thing (Score 1) 146

By way of disclosure, I tried in 2009/2010 and wasn't able to do it at any reasonable cost. Our compromise was living in a campground and getting cable service. That worked surprisingly well.

While most campgrounds have wifi, not all campground wifi is reliable enough to run a business. During the season it will bog down during peak demand, some of the smaller campgrounds have time outs and bandwidth limiters.

Out in the twigs even wireless wasn't reliable enough to make work.

Comment I can tell from the comments (Score 5, Interesting) 382

I can tell from the comments most of you don't live near the ocean. Down here in South Florida it's already making an impact. There are storm drains that flow water during high tide up and down the coast and boat docks underwater. Miami is worse. Hallendale Beach has five of their seven fresh water pumps closed because of salt water intrusion.

The real problem that no one is talking about is what happens when Miami gets nailed by a Cat 4 or 5 hurricane? We're going to have boats washing up on I-95. Do we spend the money to rebuild Miami just to have it flood 40 years later? Or when it gets nailed by another hurricane?

Comment They're going to lose this one (Score 2) 120

UC San Diego alleges that Aisen and at least eight colleagues (who have joined Aisen at USC) changed computer passwords to retain their custody and root control of the ADCS system, essentially locking out UCSD from administrative control of the Alzheimer’s study.

Courts have traditionally taken a dim view of that strategy. Hostage taking is almost never the answer, regardless of the nature of the dispute. Had he taken a copy of the database, that would have been more palatable. Something is always hinky when one person sets themselves up as the lone guardian of data purity.

We're here to give you a computer, not a religion. - attributed to Bob Pariseau, at the introduction of the Amiga