Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: The tides are changing (Score 1) 416

by cloud.pt (#49273831) Attached to: Politics Is Poisoning NASA's Ability To Do Science
Politics was once a major instigator of NASA having more funding than national health back in the cold war moon race. Who gives two flying if now other matters take priority. It's not like space, physics or science in general are going to stop. Researchers have material to study for centuries, and all they have to do is look up (or even down). If anything, they can rely on new findings from other space agencies. The US is mostly worrying with a matter of honor and space-faring tradition rather than the greater good.

Comment: Left, right and center (Score 1) 760

This is, once more, a political problem: Do you want to concede to a completely capitalist-based system, that has been known to fail in the long run, financially, against the poor, but incentivizing a meritocracy state where those that "work hard play harder"? Or are you willing to go with a hybrid system, which the US already has to some extent compared to most countries (which will go for decades with leftist or rightist mandates depending on referendum tendency)? My opinion is: I sincerely don't know what would be better, but for starters, Finland, Switzerland and co. are not bad examples to follow. I think whatever makes people morally conscious, in a generalized, broad financial status spectrum (i.e. will keep the poor and the rich in check for crimes and traffic rules) is not that bad, whatever your political inclination. Then again, those countries have other problems derived from such a flat, even view of society (which is not communism per say, but will eventually translate in similar nuances).

Comment: Re:Predictive behavior and minor User Input (Score 1) 286

by cloud.pt (#49267519) Attached to: Elon Musk Pledges To End "Range Anxiety" For Tesla Model S

This is not the car telling you where you can or cannot go imperatively. This is the car sharing dynamic information to you about where you could go before you are stuck in the middle of nowhere, just like you would get stuck with non-intelligent ones but without the empty tank warning @60miles from a gas statio. It won't prevent you from doing the stupid thing itself, it will let you know how stupid it is to do it, before you even have the chance of starting it.

Don't be a glass half-empty type of person: the original topic was about "people being anxious about having enough juice to go somewhere", not "ways I can rage about how an intelligent car performing tasks you liked to predict mentally with a non-intelligent one and how hipster that was and how lazy people are becoming" ^_^.

Comment: Re:Predictive behavior and minor User Input (Score 1) 286

by cloud.pt (#49266753) Attached to: Elon Musk Pledges To End "Range Anxiety" For Tesla Model S
This is what I meant to say in my first comment, but then I re-read it and my English was so poor I didn't understand the message myself. I meant exactly: ask the user for a broad destination, then provide him feedback right off the bat. Calculations are hard but I specified the feedback I exemplified wasn't accurate anyway. It just needs to let the user know his most likely battery outcomes during and after the trip, and his options if the most likely outcome is "running out of juice" either during the trip or on the way back to origin.

Comment: Predictive behavior and minor User Input (Score 3, Insightful) 286

by cloud.pt (#49266139) Attached to: Elon Musk Pledges To End "Range Anxiety" For Tesla Model S
In order to stop drivers from micromanaging their ranges, is just to let a user know how likely is he to run out of juice, right off the bat when he starts his journey. A simple voice request from the car speech synthesizer, asking for a city, a street, or something not very specific which can be used for broad calculations, and then let the user know: "You might have not enough battery to go/come back home"/"You can make a round trip 8 times to that destination"/"You might run out of juice but there's a supercharger nearby, would you like me to reserve a spot for you at hh:mm AM/PM?"

Comment: Re:Task scheduling is not issue tracking (Score 1) 144

by cloud.pt (#49244653) Attached to: Ask Slashdot: Issue Tracker For Non-Engineers?

Todo lists, like Todoist might also work.

Hundreds of todo apps turned up with the smartphone wave, but I believe that's the one that best integrates across platforms (Web, Mobile, and even some specific OS apps and MS/Open Source Office suites. Oh and the cloud, I think there's a Gmail plugin too). The main benefit of Todoist though is, like Trello, that they are very easy to get into, but can evolve if you need the added complexity.

See it like this: you can simplify a code-centric issue tracker like JIRA or Redmine to non-code tasks much like you can evolve Todoist or Trello into coding trackers (i.e. like with KANBAN). But I think Trello eventually leans to be more of a code tool while Todoist seems like a Swiss Army of task-oriented needs, i.e. more generic.

Comment: Task scheduling is not issue tracking (Score 5, Informative) 144

by cloud.pt (#49242513) Attached to: Ask Slashdot: Issue Tracker For Non-Engineers?

You don't want issue tracking - you want task scheduling and task completion methodologies. The non-engineer have schedules to fulfill which are usually not associated with a deliverable but a task. If there's no deliverable, there's no bug, no feature, i.e. no ISSUE. So tracking issues loses the focus. Issues aren't always tasks in trackers and that's why those are so tied to code, since they mold issues to whatever a release date/agile software development needs.

Unlike issues, tasks always translate to effective actions to undertake someplace, sometime, with someone, for whatever reason.

Post-its are still used nowadays because they do their job representing tasks, and their physical form, order or the fact it is in the trash can imply its relevance, priority, date/time-frame and status. Tell her to keep using tools she's comfortable with, but customize a variation of KANBAN for her team's specific needs. And then maybe decide if a web platform or a physical board make more sense in her context, and the learning curve is acceptable. Post-its + a board or Trello are a good place to start.

Comment: You came to the right place! (Score 2) 205

by cloud.pt (#49235935) Attached to: Ask Slashdot - Breaking Into Penetration Testing At 30

Ignore them people saying your lack of programming "freshness" is a barrier. You could be the best/most productive programmer around here and still have no clue where to start digging for useful, relevant exploits you could abuse in any particular system you seem to be an expert in.

With that said, what you want to do is get yourself involved in the latest articles about zero day exploits, trojan horses, patch fixes, heartbleed, so on a so forth. You can get started right here on slashdot: any single search of one of those keywords will point you to news about a known issue, then it probably links to specifics of such issue. Eventually they lead to techniques used, be them SQL/packet injections, memory exploits, privilege escalation. With this you get the basics on the WHY and the HOW things are happening. When you start reaching outside of /. and to the less known technologies fixing flaws constantly, and you get a very good idea of the WHEN of such events - every single day!

Now what you have to do is pick a system you want to test. Familiarize with its architectural patterns, integration with internal and external components, the system it resides in (including hardware/software), but specifically it's use of memory, it's use of the OS APIs, etc. Do this until you get a feel of something fragile. The smell of weakness is usually an exploit waiting to happen. Then you will probably hit a lot of walls.

Also, remember that most exploits come in the form of an actual feature. Change your mindset to something like "if this can be used for good, it can be used for something not that good". That also works your way when you want to have your way with a specific technology.

When it's not a feature that reeks of bad engineering, the only thing left are bugs. But you can't look at bugs in the closed source, black-box environment most technologies you would want to test come packaged in. So find integration bugs: IPC, external interfaces, dependencies can usually be abused with heavy load, injections and whatnot, to induce unexpected behavior.

Comment: Why bother finding logic (Score 1) 113

by cloud.pt (#49232187) Attached to: UK ISPs Quietly Block Sites That List Pirate Bay Proxies
It's pretty obvious that TPB, or most other piracy-related blockades originate out of lobbying, politician monetary incentives and even influences on the judicial system directly.

Ask yourself a question, with a cognitive and morally correct mindset instead of that straight-edge abiding citizen mask you usually wear for society approval: Is it constitutional to block TPB itself?

NO! IT'S THE FREAKIN INTERNET, AND THE FACT YOUR GOVERNMENT IS SANCTIONING IT DOESN'T MAKE IT RIGHT.

With that said, why even bother finding logic to this proxy listing blocking? Linking to a site that links illegal content is illegal? Linkception nonsense you say?

The nonsense started way back. Fight the root of the problem, not the ever branching ramifications of an unconstitutional decisions that keep bending the law.

Comment: Re:This looks like a canary (Score 1) 124

by cloud.pt (#49172289) Attached to: Google Backs Off Default Encryption on New Android Lollilop Devices

You're missing two points:

PRISM is one program. There are many others out in the wild (as per Snowden leaks) that don't rely on bulk data collection. This dragnet you talk about is meant to do exploratory investigation, yet intelligence methods also apply to targeted data collection. Discriminating factors in this data (e.g. the fact the user is inclined to opt-in) make it the more interesting for targeted collection, although some might disagree and argue the contrary also holds true (people not encrypting data not to raise suspicion).

Secondly, encryption by default burdens the actual relevance of the data. In the statement I made, conspiracy theory, XKCD comic, name it what you will I am also implying PRISM becomes more effective, as enabling the collection of data that is decryptable in due time renders it usable. Add the fact that opting in is made post-flashing/initial setup so the phone is exponentially more likely to have a connection to the internet during the process of opting-in/encryption. Run-time generated key is thus more likely to be passed around the cloud like an Indian smoke pipe that agencies drag from middlemen (Google) whenever they feel like getting a proverbial high.

Comment: This looks like a canary (Score 1) 124

by cloud.pt (#49170241) Attached to: Google Backs Off Default Encryption on New Android Lollilop Devices

This has all the nuances of Android file system's own version of a warrant canary: it was there, by default, until it wasn't.

Makes it easy for the NSA to distinguish those that feel the need to encrypt their data, and those who don't. I'm betting this flag is passed to Google's server for some business logic reason (reason being "unspecified" due to non-disclosure of law enforcement requests).

Committees have become so important nowadays that subcommittees have to be appointed to do the work.

Working...