Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment "Second Covers" (Score 4, Interesting) 58

UFOs are often convenient cover for secret Re:Carl Saganflight tests.

That gives the government an incentive to encourage UFO nuts.

A lot of the cold-war-era "conspiracy theories" sound like "second cover" stories. That's a psychological technique for diverting investigation into some large-enough-to-be-worth-the-effort secret project. Works like this:

Plant TWO cover stories. The first is plausible but misdirection. The second is fruitcake-nuts (but ideally has aspects that look attractively like actual artifacts of the project being hidden). Somebody investigating what is going on first hits the first cover. If he accepts it, fine. If he notices it doesn't quite fit and digs deeper, he finds the obviously screwy second cover. Oops? Now what?

The tendency of the more rational is to reject it - but bounce back to the first cover and give up there. The less well-hinged may report the second cover (much to the glee of the security people). Few are going to keep digging past both to discover some approximation of what's really going on - and if they DO get there and talk about it in public, if they happen to have said anything related to the second cover story (or even if the HAVEN'T), they can be debunked by painting them as having accepted the self-evidently tinfoil-hat-grade second cover story and propagating a variant of it.

The "conspiracy theories are always wrong and insane" meme is very convenient for this as well (as it is for any actual conspirators B-) )

Comment Re:Carl SaganUFOs are often convenient cover for s (Score 1) 58

UFOs are often convenient cover for secret flight tests.

Wasn't there a not too long ago release of government info-or-whatever about the Roswell incident?

Story was that one of the things they were testing there was the reentry mechanism for the upcoming (and still very cold-war-secret-military-tech) mercury launches, by lifting various model reentry vehicles to the edge of the atmosphere using weather balloons and dropping them . Not all that good a model of the heating, but a great way to check whether it would end up flying heat-shield-first until it was at low-atmosphere terminal velocity and time for the 'chutes.

Video showed a mercury capsule heat-shield, with retro-pack still attached, upside-down on sawhorses-or-the-like in a hanger. Looked very much like the canonical flying-saucer artwork of the era, and the picture was given as an explanation for the story of a passerby seeing what looked like a flying saucer in a hanger.

Comment Re:Being pedantic (Score 1) 378

... the felonious taking of the property of another from his or her person or in his or her immediate presence, against his or her will, by violence or intimidation.

What Alphabet did is by definition Robbery.

If they'd given, or promised, a Christmas Bonus, then yes it would be robbery.

If the (or their predecessors) had led the workers to expect bonuses only by voluntarily giving them in the past, but had never written contract terms or otherwise promised the bonuses for this year, then the hypothetical missing bonus was never the property of the workers in the first place.

Comment Re:'"We are looking into the matter" (Score 2) 137

Hell they probably would have accepted the offer for a free pen test. Instead many orgs react rather violently if they dont know about it and you did it.

An unexpected, unauthorized, "free pen test" is indistinguishable from a bad-guy cracking attempt, and must be treated as if it's a real threat. This causes ENORMOUS extra costs as the victim has to batten the hatches, examine everything for corruption and/or possible persistent threat instalation, compare working databases to backups and examine the differences vs. update audit trails, and so on.

Not to mention the concern that it might be a real attempt by the DHS, or a rogue group within it, to hack the election.

Comment Re:Being pedantic (Score 2) 378

If your company removes money from you and gives it to someone else, that is called Robbery.

But if the company just doesn't give you a Christmas/End-of-Year gift that they had been voluntarily giving previously, it may be a disappointment but it isn't Robbery.

= = = =

It may also be really stupid move on the company's part, though. It's going to cost them a bunch in employee satisfaction, and thus performance, over the next year or more.

Of course, if they were thinking of replacing a bunch of the employees with H1Bs or the like, tweaking them off so they perform poorly could then be used in claims that they were not good performers and thus needed replacing.

Comment The Math, aka Big Freaking Deal (Score 1) 37

We have this:

AT&T To Cough Up $88 Million For 'Cramming' Mobile Customer Bills

And this:

Through the FTC's refund program, nearly 2.5 million current ATT customers will receive a credit on their bill within the next 75 days, and more than 300,000 former customers will receive a check.

So, $88000000/(2500000+300000) = $31.43. Thanks guys, I'll try not to spend it all in one place.

Comment Re:What is pushed aside? (Score 1) 75

When there is an abundance of information clamoring for attention, something has to give. That something is attention span. As more and more infromation demands our attention, each bit of information receives a smaller amount of our attention

. We've become like hummingbirds, flitting from one information source to the next.

No longer do we take the time to digest the information we gather.

Of course the problem comes in when you can't filter out fake news sites such as msnbc. If you just go from source to source, you get screwed.

Comment Re:Servers (Score 0) 107

It's aimed at servers, so its pretty safe to say it will be running 48 Apache threads with the socket code pretty much always in cache.

Or 48 other *identical* threads servicing multiple users for the same thread type.

Eh? Maybe you missed the whole IT thing that's been going on for like 40ish years but servers are used for a few things other than just apache.

Comment Glitchless streaming. (Score 3, Interesting) 158

Can you name one thing that your customers actually want that is actually being prevented by network neutrality regulations?

Glitchless streaming.

Streaming (things like audio, video, phone calls) requires relatively small and constant bandwidth (though compression adds variability) but isn't good at tolerating dropouts or variations in transit time. When it does get dropouts it's better to NOT send a retry correction (and have the retry packet risk delaying and/or forcing the drop of another packet).

TCP connections (things like big file transfers) error check and retry, fixing dropouts and errors so the data arrives intact, though with no guarantee exactly when. But they achieve high bandwidth and evenly divide the bandwidth at a bottleneck by deliberately speeding up until they super-saturate the bottleneck and force dropouts. The dropouts tell them they've hit the limit, so they slow down and track the bleeding edge.

Put them both on a link and treat the packets equally and TCP causes streaming to break up, stutter, etc. Overbuilding the net helps, but if the data to be tranferred is big enough TCP will ALWAYS saturate a link somewhere along the way.

Identify the traffic type and treat their packets differently - giving higher priority to stream packets (up to a limit, so applications can't gain by cheating, claiming to be a stream when they're not) - and then they play together just fine. Stream packets zip through, up to an allocation limit at some fraction of the available bandwidth, and TCP transfers evenly divide what's left - including the unused part of the streams' allocation.

But the tools for doing this also enable the ISPs to do other, not so good for customers, things. Provided they chose to do so, of course.

IMHO the bad behavior can be dealt with best, not by attempting to enforce "Network Neutrality" as a technical hack at an FCC regulation level, but as a consumer protection issue, by an agency like the FTC. Some high points:
  - Break up the vertical integration of ISPs into "content provider" conglomerates, so there's no incentive to penalize the packets of competitors to the mother-ship's services.
  - Treat things like throttling high-volume users and high-bandwidth services as consumer fraud: "You sold 'internet service'". Internet service doesn't work that way. Ditto "pay for better treatment of your packets" (but not "pay to sublet a fixed fraction of the pipe").
  - Extra scrutiny for possible monopolistic behavior anywhere there are less than four viable broadband competitors, making it impractical for customers to "vote with their feet".

Comment IQ and attention to detail are different things. (Score 1) 168

"How hard is to remember to unload your weapon before packing it?" I guess there's no I.Q. check for firearms purchases, maybe there should be.

IQ and attention to detail are different things.

Also: Even the best-trained, most reliable, gun user can have a lapse when in a hurry, as in when packing for a flight.

That's why firearms training stresses redundancy, with rules like "A gun is loaded as soon as you put it down and look away". Or "Don't point (even an "unloaded") gun at anything you don't want to destroy."

The phenomenon is referred to as "a visit from the Ammo Fairy". That entity is similar to the Tooth Fairy, but instead of leaving a coin under you pillow it leaves a round in your chamber. B-)

Slashdot Top Deals

Real Programmers don't write in FORTRAN. FORTRAN is for pipe stress freaks and crystallography weenies. FORTRAN is for wimp engineers who wear white socks.

Working...