Please create an account to participate in the Slashdot moderation system


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment How about Satellite communications (Score 2) 229

Why not simply employ a Sat-phone-like device to upload the data on the fly (assuming they can get a signal)? The data can be transmitted before the SD is compromised. Then, it won't matter if the SD is compromised.

In a similar fashion, have an SD card reader for a cellphone for instances where a cell signal can be received (i.e. domestic use).

Alternatively, simply build cell / encryption capability into the camera itself.

-- RD

Comment Let me get this straight.... (Score 1) 228

According to another article on today's /. feed, users of pot, a drug, have lower blood flow to the brain. This, according to the study, is a harmful effect.

This article states that religious thoughts have similar effects on the brain as drugs.

Ergo, religious thoughts are dangerous?

Comment Concurrent Licenses? (Score 1) 170

Given that the copy protection / license management was disabled by the vendor and 38 copies were purchased, I have to wonder if the Navy purchased a 38 user concurrent license vs a per machine license or believed they had done so. If so, the software is responsible for communicating with a license manager to ensure that a maximum of 38 machines can use the software at a given time.

Comment Re:Because it looks like a cover-up (Score 1) 382

Bill Cosby was told he wouldn't be subject to prosecution by to Montgomery County, PA prosecutors. The current prosecutor chose to ignore those promises and it was upheld by the courts.

In that light alone, I think it prudent for him not to testify despite given "immunity".

Comment Simple Solutions (Score 5, Interesting) 81

to the "ghost rides".

Modify the Uber app so that the rider has to confirm the start of the ride on their mobile device.

Reporting of "scary" profile pics should be simple as well - simple snapshot and forward - If proven - the driver takes a hit on their next 5 drives - say $1-2 per drive.

Problem solved.

Comment Re:and they're abandoned in 10... 9... 8... 7... (Score 4, Informative) 163

Delphi was and is not a low-code solution. It is a RAD environment where some really simple apps (i.e. the Fish app) could be built by dropping a few components on a form and linking the properties and writing a couple of events. But, most applications (and visual/non-visual component creation required coding skills.

What killed Delphi was stupid decisions by Borland/Inprise to move away from what they did best and become an "Enterprise" company instead of a developer company. They also concentrated on Windows-only development when other platforms (mobile, web, Linux, Mac) were becoming popular (see first f'up). And, they raised the price so far that even dedicated developers and can't afford it's stratospheric pricing ($2600+) - only Gods and birds can reach it.

The language is a dialect of Object Pascal (not in vogue despite its power). Delphi is the IDE and hasn't changed much over the years. It can now target Windows, Mac, iOS, and Android. Linux server is coming. It is very easy to create a highly complex, cross- platform application in a way that Xamarin can't touch. Performance for business apps is good. But, I have yet to see a real game written using it. And, good luck in getting Delphi into your IT shop these days (at least in the US).

Not until developers can afford it again and work with it to see its power (if they can tolerate the language), it will regain its market share.

Comment Re: meta discussion who is responsible for hacks? (Score 2) 73

Is Apple responsible for users selecting weak passwords? Yes and no.

Forcing a user to use a TFA protocol significantly reduced the danger of a weak or reused password might pose.

Can Apple stop someone from reusing a password (weak or otherwise)? No.

Can Apple force users to use TFA? Yes.

Submission + - Will work for BEER!!!! (

Ronin Developer writes: It would seem that, according to this article, that ancient workers were among the first to announce they would "Work for Beer". Enjoy!

Comment Re:Sign 'I don't agree' on all HR paperwork (Score 4, Insightful) 223

Most WILL NOT issue a severance check UNTIL you sign the separation agreement. They WILL issue you your last paycheck, however - they must do that.

I think requiring companies to pay a 50% salary when a non-compete is in effect is brilliant as they can dictate for whom you can work (and, as such, the ability earn a comparable salary).

If a company determines you are no longer of value to them and they release you (fire/layoff, then the non-compete should be voided entirely. If they still deem you of value but have let you go, they need to provide compensation such as in a layoff with option to recall (as in temporary down-size), they need to pay up or release the obligation.

Comment Dawn of the Machine or Samaritan? (Score 1) 117

It's just a matter of time before they will hook these feeds into an AI (ala "Person of Interest") to process those feeds. Does putting something on the internet without a password make it a public asset? Makes you wonder how long it will take before they will be able to readily access even password protected cameras without a warrant."

Everyday, I walk through the Skyways of Saint Paul. There are cameras every hundred yards or so and at every turn and it's a bit disturbing. Still, the little cretins have managed to put up graffiti in a passageway two days in a row...something new.

Comment Re:QR Codes w/wo Shamir Secret Sharing (Score 1) 167

That's the premise of a Threshold-Based Secret Sharing solution. There are multiple ways to provide a scheme where you need some X of Y shares to recover a value based on WHO is trying to recover the secret.

The simplest is to implement a scheme where N shares are generated and M (where M is less than/equal) to N shares are required to recover a secret.

The same secret can be split into different numbers of shares (or, even splitting a particular share into more shares that get distributed).

Assuming that all the share holders don't meet on Facebook and collude to unlock your secret, you can comfortable distribute the shares and they need not be encrypted (they are useless without the quorum of shares).

Of course, all it takes is one or more share recipients to encrypt the share (or have it encrypted prior to sending it to them using asymmetric encryption) and then it will require those individuals to decrypt the share before your secret can be revealed. It may be, theoretically, harder to compromise an individual AND their share repository vs just the repository.

Slashdot Top Deals

Time sharing: The use of many people by the computer.