Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:What we've learned from Bitcoin (Score 1) 221

Accountants LOVE the idea that every coin you spend is traceable.
  A BitCoin like crypto currency is likely in the offing as a supplement to cash and bank transactions
Backed by the full faith and credit of the US it is likely to be one of MANY co-existing currencies. (Just like we have now! [on paper.])

Comment WRONG! Make the NSA SHARE its data. (Score 1) 324

That it stupid, short sighed and unworkable. You can't un-see goat.se.

Instead, make them SHARE and just learn what you can.

We will have different uses for the data, but its just data, that WE unknowingly paid for.

The last time that happened we got Google Maps. The time before we got the internet.

Comment Only work if documents we on computer. (Score 1) 57

As things stand, I doubt that the NK is that advanced. It doesn't need to be. There were NO COMPUTERS when the first A-Bomb was dropped or when V2s flew.

The purpose of an atomic bomb atop a rocket is to get near enough to a target and detonate.

It does not need any sophistication to do so,

it just needs enough propellant, a crude guidance system (like a cheap GPS [use existing infrastructure,] some actuators for targeting and detonation,) air bursting at height seems to generate a big blast.

Comment a long shot get mac os X on their hardware (Score -1, Offtopic) 513

Fuggedaboudid. If it wasn't made by Apple, it is NOT running OS X. Apple doesn't care what YOU think or need. Apple cares about what THEY need, which is your cash. (I don't blame them. Its like being able to drop a Ford engine block into a chevy chassis. Its not happening unless you're really willing to do it, by hand, by yourself, without any support from either company.)

Macs are mostly there for people to build applications for the Apple ecosystem, which is primarily iOS anyway.

Comment YES. YES, YES!!! (Score 2) 216

Its about time. What really pisses me off about the NSA isn't that its just a warmed over version of Pointdexter's TIA (Total Information Awareness) but the secrecy.

Forget about privacy. That toothpaste been squeezed out of the tube for years.

WE'RE paying for all of this in all the ways possible and we're not seeing any benefits.

Why not?

Because its all supposed to be a big secret.

SCREW the NSA's sense of entitlement to OUR data.

Comment Hardware is just petrified software. (Score 1) 105

I fail to see the difficulty, or the divide, since hardware is a question of petrifying some software to enhance the operation of certain algorithms.

I remember reading articles several years ago by Chuck Moore about what he was doing to control a silicon foundry to produce chips which would hard wire some algorithms in silicon while leaving the rest as software implementations in Forth.

TILs (Threaded Interpreted Languages) lend themselves very well to this.

The level of interpretation, and the repetition of interpiling, depends on what you define and cache as interpreted code. That is only one step away from petrifying it in silicon.

Comment The request was anything but polite... (Score 1) 279

"when asked politely by my national security adviser and cabinet secretary to destroy the files they had, they went ahead and destroyed those files"

They knew they didn't have the only copy so they figured "WTF It's the only way we're going to get out of this basement so, screw it, we can always pick up a spare copy at our destination."

The security adviser should have told the cabinet secretary about the reach of the internet, but he didn't bother. LOL :-)

Comment Uh, this is actually brilliant. (Score 1) 101

"some entity other than their owners" but what if YOU own and enforce it.

"Publish" all of your data to a backup drive, apply DRM to "secure it*" and issue take downs to any intruder (like the NSA) to force them to remove it or face litigation and hassles from the sheriff.

All you need to do is have a warning page/file at the lowest lever on the backup drive and then encrypt your backup.

*) "Secure it" can be as flimsy as the original DVD DRM. The point is to insure the protection of the law, however unwilling the law might be to provide it.

Slashdot Top Deals

Genetics explains why you look like your father, and if you don't, why you should.