Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Conflicting goals (Score 1) 172

Or just don't rent a modem from your ISP. By your own modem (they're usually less than $100), so at the $10 per month rental price, you'll make it back in a year. Also since it's your own modem, there doesn't need to be the public hotspot. I also would recommend not getting the modem router combos. They usually don't have that great of performance and are much less configurable.

Comment Re:read the book: Getting to Yes (Score 2) 174

I second this. There are a lot of ways to approach this, but reading some books on Negotiations is always helpful. But make sure you have a lawyer (one that you are paying, don't just get a friend who may not spend as much time on it since it's just a favor) to thoroughly look through any contracts.

Comment Re:FUD at least sort of. (Score 4, Informative) 199

But if you are worried about it transmitting when off, it's actually very easy to check with packet sniffers. This really shouldn't even be a he said she said argument. There is a really clear and simple way to test this:

1. Turn Nest Camera to "off" mode, ie the Green LED is off. 2. Start up wireshark and see if the Nest Camera is transmitting to the anything and where it's transmitting to.

Now, repeat the above with the Nest fully turned on. Compare the packets captured. Is the camera talking to the same servers and transmitting similar amount of data?

You can tell much more objectively this way then speculating what is or isn't doing based on power usage.

Comment Re:non-story (Score 1) 199

I like how the people posting blatant lies post anonymously :)

First of all, there is a difference between the camera being powered on and recording. It's like leaving your camera on but not hitting the shutter. The camera is on, but nothing is being saved anywhere.

Second, you can delete your videos. You can do it on the old dropcams to the new Nest Cams. See the support site if you don't know how to do it.

If you are worried about the fact that it can take a few days for all the copies in the distributed cloud to be deleted, then yes, when you host the amount of data that Google does, it's going to take some time for all the replicated copies to be deleted. Cloud infrastructure is pretty complicated.

Comment Re:nice little dig at the end (Score 3, Informative) 109

There is no need, there is already a separate law for that, they can call you a traitor. And the consequences are much worse than anything in this law. In that case, they can just arrest you and put you in jail. Why would they use this law where they have to try you in court first? And there is no prison term attached to this law, only some fines.

Comment Re:WTF does that mean? (Score 4, Interesting) 222

Actually, I'm pretty sure that Google can theoretically sublicense it to other entities not related to Google. But I doubt that's what happened. Google has this clause so they can pick up awesome videos and use it in commercials without getting sued for infringement. As that would actually mean sublicensing the content from Google to a media firm. Besides, Google+ is not a subsidiary of Google, neither is Youtube. They are just products offered by Google. They don't need to sublicense it to move it form one service or another.

But yes, the Youtube Standard License give Google the right to sublicense and distribute not anyone viewing the videos. So if you download a video that's not yours on Standard YouTube License from YouTube and then upload it to your website without using the YouTube link you are actually pirating. If you use the YouTube container (ie it's actually streaming from YouTube) then you are getting a sublicense which is not pirating.

Comment Policies are not only for banning use of PEDs (Score 1) 227

Of all the firms I've worked at, we've allowed the use of PEDs. From the survey, it seems like the only policy possible was one that bans PEDs. I feel like the survey should specifically ask if PEDs are banned. Because my company has a policy regarding PEDs in place, but they do not ban PEDs. There are device management policies in place instead. I think the survey would benefit from making that distinction.

Comment Re:Why use ISP email? (Score 1) 269

But then that's like saying why are we using iPhones or Android devices, they might go away in the future. Just because in 2035 you wouldn't want to use the services/product doesn't mean you should avoid them now. Anyway, Gmail is part of Google's Apps for Work platform, so it will be supported long after we stop caring about it because there will be companies paying for it.

Comment Why not let him know what to do (Score 4, Insightful) 279

If he is not a disgruntled worker just work with him to set up expectations from the IT side of things. Do you expect him to turn his computer in? When? Should he delete files off? Yes/No? I think most people would be happy to work though an exit checklist and it would make you seem really organized. But if the employee has it in for you, then you may want to do more than that. But it looks like you've already made back ups of things that you think may be important. In any case, I would formulate a standard policy for people leaving the firm. So that they have clear expectations on what needs to be done on the IT side of things.

Submission + - Google's DeepMind developing artificial intelligent video game players (

misosoup7 writes: Smart programs have been beating humans are various games since the early 90's. The problem is that these programs are specialized and can only do one thing. The Deep Blue chess computer can only play chess, not even tic-tac-toe. The Google DeepMind team now has made a breakthrough against this "narrow" intelligence problem by creating an AI that can perform well across a variety of games. Published in Nature, the team describes their new algorithm. And you can watch the program play Space Invaders and Breakout at the bottom in the attached videos.

Submission + - New DDoS Attack And Tools Use Google Maps Plugin As Proxy

An anonymous reader writes: Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks. A known vulnerability in a Google Maps plugin for Joomla allows the plugin to act as a proxy. Attackers spoof (fake) the source of the requests, causing the results to be sent from the proxy to someone else – their denial of service target. The true source of the attack remains unknown, because the attack traffic appears to come from the Joomla servers.

Slashdot Top Deals

Suburbia is where the developer bulldozes out the trees, then names the streets after them. -- Bill Vaughn