Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Ham Radio - Electronics - Coding (Score 1) 515

As a teenage ham radio operator, I took the Motorola microprocessor course at Chapman college in 1978 because the teacher was my friend, N5BO. I learned how to code in 6800 machine language and, eventually also assembler. Fast forward to high school's PDP-11/45 and then afterwards, the PDP-11/44 at the Weisman Institute in Rehovot, Israel for the summer and Los Alamos National Laboratory's photochemistry division's Data General Iron.

The trick was that back then the state of the art of computer programming was so rudimentary that anybody could learn. On top of that, since computers were all designed by electrical engineering majors, all the documentation was written by and for people with such an education and I, having been a ham radio operator since age 13 was one of them, it was very comfortable sliding into programing.

Comment Obviously, no safety problem was demonstrated here (Score 1, Troll) 401

Nobody got hurt. If the commercial aircraft had been damaged, they didn't admit it. You would think that with the degree to which they're desperately trying to control all drone flights, they'd want to boast about any possible extent to which the plane was damaged, so I assume it wasn't. No problem. The entire thing is completely blown out of all proportion.

The fact is, even a giant DJI Phantom Pro 3 or 4 is no larger nor any more dangerous than a large bird of pray and those are regularly sucked through jet engines for the entire time such technology has existed. And yet we don't hear about any mitigation efforts. Why? Because there is NO DANGER.

What there probably IS a danger of on the other hand, is that many sociopathic monsters in government and business continue to want to show their ugly faces in public, even as they are proven to behave as the monsters they are in their public policy decisions and they are probably justifiably worried that one of these days, one of the millions of people they are actively hurting with their greedy decision making will get angry enough to fly a drone up their big noses with explosives to express their discontent. THAT's why we're getting all these dumb drone rules here in the USA. Not because they're actually dangerous to any normal people.

Comment *I'll* be the first customer!!! (Score 1) 386

> it's a product without customers

WRONG! I'm legally blind and I can't wait to be able to get into a driverless car with my seeing eye dog and cruise to the store at 25 mph instead of spending 3 hours walking there! Just $30k?! Shuddup and take my money!

There are millions of old people who can be put into them when they can't see the DMV eye test anymore, too.

Comment "individuals -- including us" -?! (Score 1) 25

I really hate it when a person writes about themselves in the first person plural. For some reason, it just irritates me. How many of you [the poster] are there? If only one, please write like it. It feels like you rubbed my fur the wrong way when you wrote that.

Comment Treason has been committed. (Score 1) 419

The fact that they've already been lying about this, that they've expressed specific interest in prosecuting the whistleblower and that they are now saying it's completely innocent totally ruins their creditability. The notion that this capability exists and yet is not used unscrupulously strains credulity. Does anybody believe that -even if the NSA itself only uses this data responsibly- its use will remain responsible given the kind of psychopathic crap coming out of washington these days?

Just as Obama assures us that "during his administration" Americans won't be indefinitely detained under the NDAA, obviously, whoever forced him to sign that law and request that section be placed into it in the first place anticipates it being used in the (near?) future. This person or group obviously is also responsible for the legally questionable practices outlined here and I don't believe for a second that the expected use has anything whatsoever to do with a so-called fantasy "war on terror". Clearly, those responsible for these policies are preparing to violently take over this country and enslave or kill many of its inhabitants. It is the only logical conclusion from their actions.

Comment What was the problem? (Score 4, Interesting) 194

If I understand correctly, this whole episode began because a local politician visited you in your home and he had the expectation (for whatever reason) that you would pay him USD $30,000 as some kind of protection money for his campaign and your expectation was that politicians are supposed to work for people and not the other way around. Is this a reasonable characterization? If so, how do you think such a large missmatch in expectations came about? Do you think you were overly naive? Or is the political environment in Belize changing? I can easily believe that this might be the normal expected way that people do business down there based on other things I've heard, but I really have no idea. Now that you've had time to reflect, what would you say was responsible for the conflict in the first place?


Using War Games To Make Organizations More Secure 49

wiredmikey writes "Along with budget constraints and disconnect between IT and executive management surrounding information security, results of a recent survey show that a major problem is outright lack of understanding of threats. We all know the best way to get that budget increased, is to get hacked. Unfortunately, that could also result in you losing your job. Some companies, however, are taking creative approaches to both raise awareness and identify potential vulnerabilities. A manager with a large financial services group, for example, says that his company addresses security vulnerabilities by staging a series of what it calls 'war games,' in which a user or group of users is tasked with trying to compromise a system, while another user or group of users is tasked with preventing the break-in. Management needs to understand the security threat and its impact to business, and these 'war games' are an innovative and creative way for IT departments to convince executive management on security needs."

Submission + - TWiki.NET limits free speech of floss project ( 2

gmc2000 writes: "On his blog, a Foswiki community member reports on a recent threat by venture capital company TWiki.NET at the address of TWiki<TM> fork Foswiki: "What they ask is "to stop the confusingly similar use of the TWIKI TM in vague statements". I find that an odd request, as the term 'vague' is highly subjective. If we (the Foswiki project) were to bow to their threats, where will it end? Do we have to remove the T-word completely from the Foswiki site? That sounds close to censorship to me, and (IANAL but) I am sure that is not how trademark law (even in the US) was meant."
The 'threat-o-gram' is directed at two community members personally, volunteers of the Foswiki project. In his reply, one of the adressees says not to be impressed: "We have a decent insurance at //SEIBERT/MEDIA for such cases. That would not cost me a single Penny.". Is this a classic example of a spider-like organisation making the mistake that it can attack a starfish-like organisation by disabling one or two of its 'legs'? Do their threats carry any weight, or are they based on a totally wrong interpretation of US trademark law?"

Slashdot Top Deals

"If you can, help others. If you can't, at least don't hurt others." -- the Dalai Lama