Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Getting cut off is what they WANT (Score 1) 141

What we really ought to do is declare free communication a human right (though I pity the person trying to figure out language allowing the suppression of dangerous misinformation, harassment, incitement to violence, etc.), then make damn sure the borders stay 'information porous'.

The U.N. has already partially done this. Unfortunately it's not a binding treaty but rather a recommendatory resolution, but through time and acceptance it's risen to the level of customary international law. It's specifically in the The Universal Declaration of Human Rights, Article 19, which states:

Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

It is very broad and open to a large amount of interpretation, but you find that in all international laws. Removing or restricting access to dissenting political bodies access to the information would be a pretty clear cut violation of this. Once again those, this isn't an enforceable or binding treaty and several significant countries oppose it becoming one (not surprisingly, primarily China and Russia).

Separately, I disagree with government attempting to censor misinformation. I know it's a huge problem, but when the government gets involved at that level it sets a dangerous precedent of authority against people who disagree with the government or statements made by the government. Ideally I'd want to support no form of government censorship at all (leaving individual site censorship up to the operators of the site), but there are to many possibilities for direct and blatant harm to individuals through harassment, threats, posting private information, etc. for the only repercussion to be loss of access to a public site.

Comment There are no silver bullets (Score 1) 109

I don't know who's dumb enough to be surprised that any technology can singularly solve a problem as large as privacy.
Tor solves the network connection problem, moderately well. There's more to privacy than that, and it's ridiculous to expect Tor to solve that all by itself.

Big surprise! If you use tor to log into facebook, facebook knows who you are! Where's the outrage?!?!

Comment Re:What is wrong with SCTP and DCCP? (Score 4, Informative) 84

SCTP, for one, doesn't have any encryption. QUIC integrates a TLS layer into it, in a way that avoids a lot of connection setup time. The best you could do in SCTP is to put it under DTLS, which won't be as fast. Second, SCTP has horrible fragmentation behavior -- NDATA was supposed to help, but didn't make it in. It uses TCP's congestion window system over the entire association, while QUIC also has pacing. And looking at RFC2960, you'll see the names: Motorola, Cisco, Siemens, Nortel, Ericsson, and Telecordia. Generally someone has to pay engineers to make the standards.

As for the article, the UDP vs TCP discussion is a red herring. AFAICT, QUIC's use of UDP is for compatibility with existing IP infrastructure.

Comment Dude, stop assuming entitlement (Score 1) 479

PhD in industry here, I interview a candidate a week.

I'll keep it simple. Every time that you didn't feel like you did well in an interview question, go home and study to get better at those questions.

Unless you're applying to a research lab, realize that you're applying to jobs that you're probably underqualified for. Your PhD says that you haven't been making production quality code for a few years.

E.g. Learn the damn stl containers. It takes a fucking weekend. They have very similar APIs and are mostly sensible. Just because you finished a PhD doesn't mean that you're done learning, much the opposite.

Comment Re:Dial up can still access gmail (Score 4, Interesting) 334

There's an offline gmail chrome app that lets you work that way. Also, turn on two-factor for them. They can receive the number via SMS, and it'll help prevent them from being phished. Once set up, it's easy to understand how to do it, and they only need do it every month. (There are a few email providers that provide 2-factor).

gmail can check a pop3 account on your behalf, and you can set your 'from' address (I haven't checked the constraints on what you can set it to...). So there's not necessarily a need to change email addresses to use gmail.

if gmail is blocked, then you're in an unusual situation where nobody here can give you good advice without knowing more about what's going on.

I'm advocating gmail here for three reasons:
(1) Really good spam filters and phishing warnings that can help keep out scams
(2) Two-factor authentication
(3) Easy setup with a chromebook.

With the last, they can keep all their stuff on drive (and you can just log into drive to help them), and you can chromote in to see their desktop and help. Even video-chat while chromoting.

Comment You're unlikely alone (Score 1) 274

If enough of them have young kids (and your 40+ years - 10 puts many of your peers in the mid-30s), then they'll be going through the same stuff, only have less experience. Come in as the voice of wisdom and experience. It's useful!

Just don't spend too much time talking about old systems. Some older programmers do that, and it just distances themselves unnecessarily. Having used an older system isn't a technical merit, it's just saying that you're old. Interesting anecdotes, special features, and spectacular failures of old systems, however, are fun to hear.

Comment One AMI image, ec2, and shell scripts (Score 3, Informative) 80

Here's how I ran my PhD simulations on EC2:
- The AMI downloads a manifest file at startup.
    - The manifest has one record per line, two fields per record: the s3 URL of a .tar.gz to download, and the path to download it
- The AMI then runs a shell script (/etc/ that's been put there by a manifest entry

Shell scripts upload new files to s3 (e.g., /etc/ and have ec2 run new VMs. When the VMs are loaded, they're running everything I need, ready to go.
Other shell scripts stopped/started experiments on these VMs.
Other shell scripts shut down the VMs when I'm done.
The scripts did little more than scan the appropriate machine list from the ec2 tools and ssh into them with a specific command.

At the end, I had some of the experiment-specific scripts quickly have git clone/pull in files I was changing quickly per experiment.

All of it worked really well for me. Nothing fancier than the ec2 command-line tools, bash, ssh, & git necessary.

Comment robots.txt, seriously (Score 1) 533

It's 2012, why does this search engine stuff come up all the time, when it's *so* easy to fix? If they want to publish the names, but not have them come up when people are searching for individual people, shove the list in robots.txt. Not complicated. A moron can figure out robots.txt

Slashdot Top Deals

"If the code and the comments disagree, then both are probably wrong." -- Norm Schryer