Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Meh (Score 1) 826

I work for a foreign corporation. They don't care whether or not I have a SSN (I'm an LLC as far as the US gov't is concerned). If I didn't have the magic ID card, they wouldn't give a damn. I do the work, they pay me. Staying out of US tax court is my problem, not theirs.

I'm starting to see more people in my profession (engineering) working for overseas bosses because of the onerous tax and other regulations placed on contractors in this country. I'm sure more will follow.

Comment Re:Great... (Score 0, Flamebait) 457

You assume you know the scooter guy's thought process.

He paid his Medicare taxes because he was forced to. Of course he is going to use the system to the max after being forced to pay in.

I purposely use tax funded services to the max even though I am against them.

Do you think because the government steals from me that I won't take that money back??

Foolish Socialist. You have much to learn.

Comment Some (Score 1) 646

I can think of some I watched back then on the 50s, for loose, very loose, definitions of science fiction, although the last two in the list were pretty good, more..hmmm..science fantasy/horror.

Flash Gordon (One of my cats is named after Ming...the Merciless, Flash Gordon's nemesis. He's a rather aggressive and "catcho" tomcat)

One Step Beyond
Kraft Mystery Theater

There's probably more, and certainly a ton of sci fi movies from back then, but those are the TV shows I remember readily.

Comment j2me Re:This is not going to end well (Score 1) 419

A huge range of physical phones can run java j2me based software without needing to determine device configurations etc. Sun says there are about 2.5 Billion j2me/midp enabled handsets out there.

Unfortunately the various carriers then balkanized this 'code once run everywhere' capability in order to try to capture cashflow from developers (independent testing. certification, and signing anyone?) and customers (all the many app stores).

Submission + - Open access to exercise data?

identity0 writes: A recent Slashdot article about heart rate monitors in schools got me thinking about getting one for my own exercise. It turns out there's a wide range of features, from calorie rate, pedometers, GPS, and PC connectivity. Being a geek, I wanted one that would let me look at my exercise data, and I'm curious what experiences Slashdotters have had with them. Some download data to a proprietary application, so I'm wondering if there are open source alternatives or the data format is easily readable. Others upload data to an online app, and I'm wondering if the data can be pulled off the site or it's forever trapped on their servers. While I'm not paranoid about my data being shared or an open source zealot, I would like to know that I can access my data in the future. Whatever method you guys use to monitor your exercise, I'd love to hear it!

Submission + - Google Sidewiki impacts your Customer Satisfaction (satisfactionsecrets.com)

adele2009 writes: "Google's new universal commenting system called Sidewiki is about to cause a major change to customer satisfaction, marketing, product launches, and public relations. Any company or organization that has a web site is impacted. Every organization will need to develop a social media strategy and strengthen their customer satisfaction strategy."

Comment you mean FUD right? ... (Score 1) 340

Can you provide a link to substantiate your claim? I had trouble finding anything definitive.

Also for everyone's reference here is a more complete quote of Jefferson:

If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but the moment it is divulged, it forces itself into the possession of every one, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole of it. He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me. That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density at any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation.

Comment Not so stupid... Re:How stupid you can be (Score 1) 117

Ever notice how there was never one part of the map overlapping another? At any point there was always only ever the floor and the ceiling - at various levels, and able to raise/lower (lifts/doors anyone?). In that important sense it was 2D; a 2D map 'extruded' as a special case into 3D - not an arbitrary collection of 3D geometry. Oh and the sprites, they were bill-boarded 2D also.

Not so stupid, depending one what you mean.

Comment wrong end of the stick... (Score 2, Insightful) 201

I read the summary as them finding a way to create a p2p network of 'customers' (clients who pay to be in your p2p network where you deliver paid content) and protecting yourself from the 'customers' who 'collude' (e.g. hacked client s/w?) with non paying client s/w to allow non paying customers to get the content. I don't think it's about subverting an existing network, it's about protecting a network from subversion. If so then the techniques could presumably be used for other purposes, poisoning surveillance perhaps.

Comment cryptwitter - is there an app for that? (Score 1) 116

Maybe they/we need a crypto-twitter app?

  • Make minimal assumptions of the phone capabilities.
  • Don't rely on 'external' certificate / cert providers etc, roll your own.
  • Don't rely on the device libraries, you cannot afford to trust even the phone.
  • Phone app to include some kind of cert to authenticate itself to the service (at least make an effort).
  • ssl based coms
  • http or sms transport
  • some kind of distributed multiple redundant backend; tor-ish and resistant to dns spoofing
  • certificate based authentication of the servers to the client
  • structure social network/email/bbs style systems over that underlying safe communication channel.
  • Ensure the system and legals are structured so that breaking into it to read the clear text comes under DMCA 'circumvention of technical measures to control access to copyright material' - about the most draconian laws there are.

Does something like this exist?

Comment how about a restricted sanbox api... (Score 1) 149

If the phone had a real preemptive time sharing OS and an appropriately restricted API (enforced time/space/cpu quota, only screen, touch, and sound access) then it would be a trivial exercise to know a prog was 'safe'. At the moment they have a broad API and Apple's idea of safe and your might well not be the same (location data anyone? what exactly is the app going to do with the network access it's asking for...).

Slashdot Top Deals

We don't really understand it, so we'll give it to the programmers.