Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment vote with your wallet (Score 1) 130 130

Universities (including the public ones) are a business like any other and are highly sensitive to voting with one's wallet.

At the one I work at we actually go to great lengths *not* to monitor, record, or police what students do beyond what's needed to keep the peace.
we also invite students to bring their game consoles in after major releases so we can fine tune stuff to ensure decent latency.

tl;dr somebody is having power trip there and/or just bought a shiny new piece of oppressionware and checked all the boxes.

Comment Re:What's it going to take? (Score 1) 120 120

You are forgetting that the having conduct ruled unconstitutional only precludes the recipient being prosecuted in the US criminal courts for it, assuming the transgressors get caught doing it, you weren't killed in the process, and you were on US soil when it happened.

Comment Better than nothing? (Score 3, Interesting) 120 120

So, can I claim this as a victory under the "enemy of my enemy" philosophy?

Of course what goes without mention here is that "high shelf" just means they have to go through the trouble of getting the trial itself declared a matter of national security, meaning they can classify the entire charade (pfft, speedy and public what?).

Comment Re: Speed tests (Score 1) 398 398

"speed tests" (the consumer oriented public sort, eg: are a joke because Oookla ( encourage the ISPs to run a local copy of it .. and naturally the configuration favors the *most local* one by default .. so unless you're paying attention or use a geek-oriented test (of which there is no shortage, but not quite as easy to use) you are just testing the "local loop" portion of your connection.

I should point out here that the CIR (bandwidth you are promised) is generally only stated in terms of the local loop, since normally that's all that your access-ISP has control over.

FWIW you can download the Oookla ( client to run on your own network, which is rather handy if you want to test out that fancy 802.11ac wifi setup (or whatever).

Comment ~$7500 per transaction? (Score 1) 69 69

3750000000/495793 = 7564.25 per transaction .. even if it's the Real (Brazil's 'dollar') it's a little less than half that in USD.
If the crooks are smart they are shaving a'la Superman3 and not stealing it outright but that's a huge per-transaction average.

Comment Re:Be polite (Score 4, Informative) 286 286

Just say "I do not consent to this search
This .. and remember kids (and cops) .. that whole "digital breadcrumb" thing cuts both ways.

Even using an "imager" on a device (usually) creates a ./messages log entry which is handily timestamped with ntp sync'd clock accuracy.

Comment Time+Effort = yes (usually) (Score 2) 176 176

With enough time and effort (money being #3, but two outta three is generally all that's needed) .. yes, you can make it work.

If it's just an academic exercise then go for it, try and find hardware from the same (or earlier) era than the disks.

If you really want to flex an embedded device you'll be better off using recent distributions as those are customized for the hardware. Just because it's old software doesn't mean it'll run fine on newer (but underpowered) devices.

BOTH hardware and software have improved over time.

Comment Re:"... as a means to reduce theft." (Score 1) 158 158

True .. it's like the stupid car radios where you have to enter a code when the battery dies.
If it gets stolen, the thief realizes sometime later that it's useless, and it's still stolen.
Meanwhile, every time YOU have a dead battery or replace it, you have to dig around and find the stupid tag, or pay the dealer $100 to tell you.

Time-sharing is the junk-mail part of the computer business. -- H.R.J. Grosch (attributed)