Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment a bot (Score 1) 151

Do what CryptoLocker did - bots can do the site-wide encryption. Have triggers on servers and local devices, as needed. You can pick the type of files to encrypt, which cryptography to use, and where to store the key(s) - hopefully in a safe place off site. Users will be the most vulnerable part of the process. They have to be clear about the techniques to access and save the files. Which brings to mind another can of worms...

Comment Re:Morons are running the USA (Score 1) 649

skids said

This budget is too dumb even for the Heritage Foundation.

Oh, how I wish you were right:

...The proposed cuts hew closely to a blueprint published last year by the conservative Heritage Foundation, a think tank that has helped staff the Trump transition...

http://thehill.com/policy/finance/314991-trump-team-prepares-dramatic-cuts/

Comment Re:Morons are running the USA (Score 1) 649

ausekills said

What folks don't seem to realize is that a lot of DoD funding is science...

You are right, of course. The military was an incubator in the mid 20th century for cybernetics and computer science too. What bothers me is there is striking evidence of an imposed military mentality on them. Even though Vint Cerf claims that the vulnerabilities of the internet were unintentional, I can't help but think otherwise. No matter how useful these resources are, they are designed never to undermine the hierarchy of control. And they can be controlled in amazing and decietful ways. They also have back channels to monitor and statically measure user interaction. It seems virtually any branch of the military, law enforcement, security or intelligence has access to part or all of telecommunications, both metadata and content.

The military developed some awfully powerful tools. I don't think they could let them out the door without really tight military constraints.

Comment Re:Google envy (Score 2) 353

Who needs criminals hacking into the box when you got Microsoft? Seriously, with ads I get, it's obvious Windows has 'Googled' where I go - even my personal data too. Microsoft has turned control over to their sales department. And now, I'm beginning to I suspect I'm an unwitting beta tester for their updates. I'm not their customer, I'm their victim.

Comment Re:How ARM will handle the bloat? (Score 1) 193

A.C. said:

I am curious on how the lean ARM processors would cope up with the Windows bloat. Windows "server" boots the GUI first!

I've heard that the Snapdragon 835 is a big enough muscle. It's got four high-power, low efficiency cores and four low power, low efficiency cores (ARM's big.LITTLE configuration.)

Comment We Do Copyright Wrong (Score 5, Insightful) 27

Last week ISP Bahnhof absolutely slammed the decision to block The Pirate Bay, describing the effort as signaling the "death throes" of the copyright industry.

Kudos to the Swedes for not wanting to be copyright cops. I would feel better about copyright if the laws went back to the US Constitutional constraint of being applicable for only 28 years max, and could only be applied to expression and not the underlying ideas. Then it really would be a tool to incentivise innovation. Nowadays groups like the MPAA, RIAA, and WIPO use copyright weaponry such as DRM and the TRIPS agreement to secure lucrative revenue streams for an unforeseeable future, and while doing so, create a hostile environment for the arts and science, stifling inquiry and free expression.

Comment CRISPR is a great tool (Score 1) 159

Human Gene editing is already happening. In 2016, Dr John Zhang used his spindle nuclear transfer technique to avoid a child being born with Leigh Syndrome. CRISPR may be the greatest health care tool yet.

CRISPR may be used for vain, nonessential and even suspect purposes. Its a brave new world, get over it.

Comment Weather Band Radio Instead. (Score 2) 75

Most smartphones come with a built in FM feature so how about activating it instead, and use it for weather band radio? It's old tech, but it broadcasts for miles, not 500 feet. Its proven, reliable, relatively cheap, and can take advantage of the existing infrastructure. And we get a radio with our phone.

Comment Re:China and South Korea and Russia can do it (Score 1) 88

Maybe Japan's economic woes were the deciding factor in Toshiba's purchase of the plague-ridden Westinghouse Nuclear Division. But with a "hit" of over 6 billion bucks, the deal was definitely not "clean, safe, too cheap to meter." And with plants throughout Europe, the US and South Korea, I won't be surprised if Toshiba is in for even more trouble.

Comment Re:Elon Musk: What's this guy smoking? (Score 1) 251

Lead Butthead said

The man wants to create the borg collective.

I think Elon is regurgitating, and perhaps adding a little "bandwidth" to the singularity that Yuval Harari wrote about in "Homo Deus": a thought collective - global AI interface. Only Yuval thinks the rich may be genetically modifying themselves too, so they really will be different from you and me. Oh, and there may be competing "thought-AI-merge" collectives.

My take on all this: When Elon says that AI threatens to make humans useless, I see a metaphorical monster. When he says there's a need to merge with machines, I see another proverbial monster. Imagine such monsters from a collective super id, on their way to eliminate the competition, annihilating the remains of the sapien hoi polloi. Let us prey now, least we become prey. Its the dawn of another age.

Slashdot Top Deals

"The vast majority of successful major crimes against property are perpetrated by individuals abusing positions of trust." -- Lawrence Dalzell

Working...