Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - SPAM: Quicken Bill Pay is No Longer Safe to Use 1

Bruce Perens writes: I don't usually make security calls, but when a company makes egregious and really clueless security mistakes, it's often the case that the only way to attract their attention and get the issue fixed is to publicize it. This one is with Quicken Bill Pay, a product of Metavante (not Intuit). It's from personal observation rather than an expert witness case, and the company has been unresponsive through their customer support channel.
Link to Original Source

Comment Abandoning Time-Worn Processes Leads to Atrophy (Score 5, Insightful) 156

Scientists determined that those people who made use of machine washing rather than hand washing had diminished hand strength and neurological motor communication necessary for fine motor control. Seamstresses who bought thread rather than using the spinning jenny were similarly impaired. But worst off were teamsters who used the internal combustion trucks rather than teams of horses and used forklifts and other mechanical devices rather than loading their vehicles by hand. Their overall body strength was much reduced.

Comment Identity Access Management (Score 2) 63

It must be supported by auditing and reporting.

This is totally true and feasible in the enterprise. I work for a company that sells a product that aggregates all existing accounts, and then periodically sends out emails to managers saying, "Here's a list of accounts belonging to your team." The manager has to approve each one or revoke them. That way, there is accountability down the road if it turns out there were lingering accounts that shouldn't have been accessible or exploitable. Can also be used to certify the accounts on each remote application by the application "owner" or administrator.

These certifications are then reviewed by third-party auditors to validate their completeness. Several other vendors offer similar variations of this functionality.

Comment All communication is monitored (Score 4, Interesting) 186

There is literally no way you can communicate with another person where you can be assured that your communication is not monitored. Even face-to-face communication in code is compromised, if the other party is compromised. Cell phones only work by collecting a lot of data about the caller and the caller's recipient. If CBS is only now figuring out that D.C. is a hotbed of cell data leakage, they are fantastically bad at their jobs.

Comment Re:"Human Colleague"... Nope, You Just Don't Get I (Score 1) 407

Clarke did very little writing on robot brains.

Um, I'll have to assume that you weren't around for April, 1968, when the leading AI in popular culture for a long, long, time was introduced in a Kubrick and Clarke screenplay and what probably should have been attributed as a Clarke and Kubrick novel. And a key element of that screenplay was a priority conflict in the AI.

Comment Re:"Human Colleague"... Nope, You Just Don't Get I (Score 1) 407

Well, you've just given up the argument, and have basically agreed that strong AI is impossible

Not at all. Strong AI is not necessary to the argument. It is perfectly possible for an unconscious machine not considered "strong AI" to act upon Asimov's Laws. They're just rules for a program to act upon.

In addition, it is not necessary for Artificial General Intelligence to be conscious.

Mind is a phenomenon of healthy living brain and is seen no where else.

We have a lot to learn of consciousness yet. But what we have learned so far seems to indicate that consciousness is a story that the brain tells itself, and is not particularly related to how the brain actually works. Descartes self-referential attempt aside, it would be difficult for any of us to actually prove that we are conscious.

Comment Re:"Human Colleague"... Nope, You Just Don't Get I (Score 1) 407

You're approaching it from an anthropomorphic perspective. It's not necessary for a robot to "understand" abstractions any more than they are required to understand mathematics in order to add two numbers. They just apply rules as programmed.

Today, computers can classify people in moving video and apply rules to their actions such as not to approach them. Tomorrow, those rules will be more complex. That is all.

Comment Re:"Human Colleague"... Nope, You Just Don't Get I (Score 4, Insightful) 407

Agreed that a Robot is no more a colleague than a screwdriver.

I think you're wrong about Asimov, though. It's obvious that to write about theoretical concerns of future technology, the author must proceed without knowing how to actually implement the technology, but may be able to say that it's theoretically possible. There is no shortage of good, predictive science fiction written when we had no idea how to achieve the technology portrayed. For example, Clarke's orbital satellites were steam-powered. Steam is indeed an efficient way to harness solar power if you have a good way to radiate the waste heat, but we ended up using photovoltaic. But Clarke was on solid ground regarding the theoretical possibility of such things.

Comment VMWare is a GPL Violator (Score 2) 32

VMWare is a GPL violator and got off of its most recent case on a technicality. Any Linux developer can restart the case.

The Linux foundation is sort of like loggers who claim to speak for the trees. Their main task is to facilitate the exploitation of Open Source rather than contribution to it.

Slashdot Top Deals

Marvelous! The super-user's going to boot me! What a finely tuned response to the situation!

Working...