Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Won't work in America (Score 1) 630

I heartily agree with resurrecting the CCC and/or WPA. Unfortunately I see two major political obstacles to their return. The first would come from the private construction sector who would argue the government would effectively underbid them on all public construction projects and thereby force them out of that market. The second would be the I could easily see someone like Ta-Nehisi Coates claiming such programs were inherently racist, due to the kind of work being done.

Comment Re:Ahhhh.. fucking synergy again (Score 1) 208

Use vs Utilize does have an actual nuance in some circles. "Use": this device is doing it's intended purpose, ie a butterknife to cut butter. "Utilize": this device is replacing a widget we don't actually have but it's the closest thing at hand that gets the job done, ie a butterknife to turn a flat-head screw.

Submission + - Cleaning Up US Cyberspace (

Gryle writes: Robert K. Knake, at the Council of Foreign Relations, argues that the US government and US-based ISPs should increase their efforts to take clean up or quaratine compromised computers based in the US. Arguing from a Westphalian standpoint, Knake notes the success Finland and Japan have had in reducing botnets and botnet-control servers located within their geographic borders but notes "the controls that would make it more difficult to use U.S. infrastructure to carry out criminal activity could also be used to control speech and repress dissent."

Comment Re:So forgetting a password (Score 1) 796

I think you're describing something akin to a steganographic partition. According to Wikipedia "FreeOTFE and TrueCrypt allow a second encrypted file system to be hidden within another encrypted file system. The goal of this filesystem-within-a-filesystem is to allow the users to have a “decoy” file system with data that is interesting but not overtly sensitive. A person who is arrested or captured with a laptop encrypted using this software could then give up the first file system’s password, with the hope that the decoy would be sufficient to satisfy the person’s interrogators." It's not precisely what you're describing, but close.

Comment Re:Ancillary Mercy? (Score 2) 702

The Sad Puppies evolved. I've followed this whole shebang for the last few years, mostly out of curiosity. The most civil response I saw to Sad Puppies last year was "Recommendations are fine, but you didn't have a large enough list of recommendations, so you're really just slate voting." To counter that, this year the Sad Puppies basically ran a mini-nomination. They put up a website ( where anyone could post a nomination recommendation for whatever they believed was worthy of a Hugo nomination. Ancillary Mercy ended up on the list:

Slashdot Top Deals

I put up my thumb... and it blotted out the planet Earth. -- Neil Armstrong