Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Comment Re:What we've learned from Bitcoin (Score 1) 221

Accountants LOVE the idea that every coin you spend is traceable.
  A BitCoin like crypto currency is likely in the offing as a supplement to cash and bank transactions
Backed by the full faith and credit of the US it is likely to be one of MANY co-existing currencies. (Just like we have now! [on paper.])

Comment WRONG! Make the NSA SHARE its data. (Score 1) 324

That it stupid, short sighed and unworkable. You can't un-see

Instead, make them SHARE and just learn what you can.

We will have different uses for the data, but its just data, that WE unknowingly paid for.

The last time that happened we got Google Maps. The time before we got the internet.

Comment Only work if documents we on computer. (Score 1) 57

As things stand, I doubt that the NK is that advanced. It doesn't need to be. There were NO COMPUTERS when the first A-Bomb was dropped or when V2s flew.

The purpose of an atomic bomb atop a rocket is to get near enough to a target and detonate.

It does not need any sophistication to do so,

it just needs enough propellant, a crude guidance system (like a cheap GPS [use existing infrastructure,] some actuators for targeting and detonation,) air bursting at height seems to generate a big blast.

Comment a long shot get mac os X on their hardware (Score -1, Offtopic) 513

Fuggedaboudid. If it wasn't made by Apple, it is NOT running OS X. Apple doesn't care what YOU think or need. Apple cares about what THEY need, which is your cash. (I don't blame them. Its like being able to drop a Ford engine block into a chevy chassis. Its not happening unless you're really willing to do it, by hand, by yourself, without any support from either company.)

Macs are mostly there for people to build applications for the Apple ecosystem, which is primarily iOS anyway.

Comment Learn Forth. (Score 1) 365

Charles H. Moore wrote it and extended it to be able to compile directly into silicon.

Forth is actually a TIL [Threaded Interpretive Language] but it is so easily extensible that it is possible to implement all the way to the gates.

Moore was working with Forth to do exactly that last I heard.

Comment And will it attract bugs? (Score 1) 237

Insects depend on high-frequency sound to attract mates.

I'd hate to find my windshield suddenly covered with horny (or angry) bugs while driving, in the rain, on a dark road, on my way to the ditch, picking up a few unwanted, unexpected pedestrians, who were waiting for a bus...

Comment YES. YES, YES!!! (Score 2) 216

Its about time. What really pisses me off about the NSA isn't that its just a warmed over version of Pointdexter's TIA (Total Information Awareness) but the secrecy.

Forget about privacy. That toothpaste been squeezed out of the tube for years.

WE'RE paying for all of this in all the ways possible and we're not seeing any benefits.

Why not?

Because its all supposed to be a big secret.

SCREW the NSA's sense of entitlement to OUR data.

Comment Hardware is just petrified software. (Score 1) 105

I fail to see the difficulty, or the divide, since hardware is a question of petrifying some software to enhance the operation of certain algorithms.

I remember reading articles several years ago by Chuck Moore about what he was doing to control a silicon foundry to produce chips which would hard wire some algorithms in silicon while leaving the rest as software implementations in Forth.

TILs (Threaded Interpreted Languages) lend themselves very well to this.

The level of interpretation, and the repetition of interpiling, depends on what you define and cache as interpreted code. That is only one step away from petrifying it in silicon.

Comment The request was anything but polite... (Score 1) 279

"when asked politely by my national security adviser and cabinet secretary to destroy the files they had, they went ahead and destroyed those files"

They knew they didn't have the only copy so they figured "WTF It's the only way we're going to get out of this basement so, screw it, we can always pick up a spare copy at our destination."

The security adviser should have told the cabinet secretary about the reach of the internet, but he didn't bother. LOL :-)

Comment Uh, this is actually brilliant. (Score 1) 101

"some entity other than their owners" but what if YOU own and enforce it.

"Publish" all of your data to a backup drive, apply DRM to "secure it*" and issue take downs to any intruder (like the NSA) to force them to remove it or face litigation and hassles from the sheriff.

All you need to do is have a warning page/file at the lowest lever on the backup drive and then encrypt your backup.

*) "Secure it" can be as flimsy as the original DVD DRM. The point is to insure the protection of the law, however unwilling the law might be to provide it.

Whom computers would destroy, they must first drive mad.