Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:FOSS names (Score 1) 270

So you think fsck is something besides a descriptive abbreviation for File System Check?

Dennis Ritchie thought so too:

Dennis Ritchie: “So fsck was originally called something else”
Question: “What was it called?”
Dennis Ritchie: "Well, the second letter was different"
~ Q&A at Usenix

I don't know if he was a pre-teen when he wrote it, but it's a bad name anyway because it doesn't suggest anything to do with the purpose of the tool.

Submission + - NHS moves to NoSQL running on an open-source stack->

An anonymous reader writes: The NHS has ripped the Oracle backbone from a national patient database system and inserted NoSQL running on an open-source stack.

Spine2 has gone live following successful redevelopment including redeployment on new, x86 hardware. The project to replace Spine1 had been running for three years with Spine2 now undergoing a 45-day monitoring period.

Link to Original Source

Submission + - Intel releases Edison: hugely powerful x86 board almost as small as an SD card->

szczys writes: Intel is upping their bid for a place at the power-efficient, yet powerful device table. This Edison board features an x86 based SoC running at 100 MHz. The footprint measures 35.5mm x 25.0 mm and offers a 70-pin connector to break out 40 pins for add-on hardware.
Link to Original Source

Comment Re:Well, you have mine. (Score 1) 727

Sometimes if I leave k3b (DVD burning software installed by default) open for to long, it causes KDE to go full-on rahtard, and has been known to require a reboot.

You may find you can just restart X. press CTRL+ALT+BACKSPACE

Every time I upgrade to the latest version of slackware, I'm able to simply copy data and I'm right back in business. This matter of having the same data for 10+ years is extremely important to so many people.

This is a huge advantage of *nix from a sysadmins PoV; the fact that there is an enforced directory convention, with config data all in /etc, apps in /usr etc. windows has something similar in theory - but it's not enforced and few apps follow it.

Submission + - DoxBox: Open-Source disk encryption for Windows 1

monkey999 writes: A new disk encryption program for Windows has been released that is compatible with Linux encryption and — unlike Truecrypt — is fully maintained. From the announcement:

Features

  • Full transparent encryption, DoxBoxes appear as removable disks in Windows Explorer.
  • Explorer mode lets you access DoxBoxes when you don't have admin permissions.
  • Compatible with Linux encryption, Cryptoloop "losetup", dm-crypt, and LUKS. Linux shell scripts support deniable encryption on Linux.
  • Supports smartcards and security tokens.
  • Optional 'key files' let you use a thumb-drive as a key.
  • Portable mode doesn't need to be installed and leaves little trace on 3rd party PCs
  • Deniable encryption protects you from 'rubber hose cryptography'.

Submission + - Is our universe a quantum cellular automaton?->

St.Creed writes: Noble-prize winner Gerard van 't Hooft is best known for the work that enabled physicists to predict the mass of the top quark, w-boson and z-boson. But he has long been known for his rather "idiosyncratic" ideas on the nature of the universe as well. His theory on the holographic universe is by now fairly well known. However, he has taken it a step further in a 202-page article (or book) on Arxiv.org, where he claims that there may well be a system with classical properties underlying quantum mechanics.

Our models suggest that Einstein may still have been right, when he objected against the conclusions drawn by Bohr and Heisenberg. It may well be that, at its most basic level, there is no randomness in nature, no fundamentally statistical aspect to the laws of [quantum] evolution.

The ideas presented in the introduction are quite interesting to read even for non-physicists.
Link to Original Source

Comment Re:Something like this already exists... (Score 1) 184

these "freedom activists" ... the actual perpetrator.

If someone is active in supporting freedom then they are a freedom activist - no scare quotes needed. Which concept are you implying is dubious: freedom or being an activist? OTOH people can be identified and punished for saying or doing things online that have no victims apart from political ideologies - so they are 'perpetrators' not perpetrators.

It's one thing to stand up and say "I am Spartacus", it's quite another to point at someone else and say "he is Spartacus".

I don't quite get this, if you explicitly allow some dissident (called 'Spartacus', say) to use your network and identify as yourself, how isn't that you yourself saying 'I am Spartacus'?

Comment Open your Wifi and your mind will follow (Score 1, Interesting) 184

All the people saying "don't open your router because then the gov't will hold you responsible for things other people use it for" are missing the point. This is exactly why this is a freedom of speech issue and why the EFF is involved in the first place.
The gov't would like every act online to be traceable to an individual who can then be held responsible for it.
Freedom of speech means freedom from punishment because of your speech. The Soviets used to have a joke "everybody in Russia is free to say what they like - they're just not free to stay out of prison afterwards."
The only way to guarantee FoS is anonymity. The gov't can't punish you if they can't find you. Which is why dictatorships hate online anonymity.
Even if it was true that you could be held responsible for things others do using your router, you'd still have a duty to let them do it.
IANAL but AFAIK there is no legal basis in either the UK or US to punish someone for enabling someone else to commit a crime, unless it was part of a deliberate conspiracy, or 'common purpose'. So, (if its true at all that this is 'dangerous') the authorities are trying to illegally blackmail people into supporting their unconstitutional attempt to destroy anonymous Internet access.
Submitting to this blackmail is treason. Keep your country free, Keep your WiFi free.

Variables don't; constants aren't.

Working...