Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment They limit the areas... (Score 1) 65

By limiting the areas that this offer applies to they may be tampering.

"eligible areas, including Atlanta, Baltimore, Boston, Charlotte, NC, Chicago, Dallas, Denver, Detroit,
Miami, Minneapolis-St. Paul, New Orleans, Nashville, New York City and New Jersey, Orange County, CA,
Philadelphia, Portland, OR, Phoenix, Raleigh, NC, San Diego, and Washington, D.C."

The service is not cash and ride it requires a smart phone ($$) and credit card.
Drivers can refuse to give rides .... A demographic review seems to be in order.

I expect this to be given some review especially in how it shows up on the company tax returns.

Comment Re:The gauntlet has been thrown (Score 1) 79

Actually, the effort required to do this hack is quite high and the risks to the patient is quite low from this hack.


I'm with J&J, It's just NOT worth the replacement risks.... General Anesthesia has significant risks, much more than somebody hacking your insulin pump on the subway.

I am with JJ but this does not require surgery to replace.
It is external and connects to the body with an infusion set with standard Luer connector.

I can see a software update to the paired system.
Two devices a blood glucose meter and the infuser.

Comment Re:The gauntlet has been thrown (Score 1) 79

Now people will hack into these just to prove they can.
How many have to die because of J&J being cheap and not fixing them?

So these pumps are where? Google google google.
Cool it is outside the body and connected by a simple Infusion set with standard Luer connector.
That makes it easy to replace.

All these bluetooth family of short distance devices are a risk...
time will tell what JJ does.

Comment Re:recurring? (Score 1) 76

Not just recurring - how about an online order that won't ship (and, by most laws, can't be billed) for 6 weeks, or even a day? The number was valid when you placed the order, but not when it ships...

They can do like many hotels do.
Place a reservation+pad against your credit line. Then when you check out
the charge is processed and any pad returned.

Business travelers especially new kids discover that their card is denied
for dinner across town because the hotel assumed you would eat in and
drink from the mini-bar. The pad/reserve can be 3x or more the room rate
and contain padding for damages (spring break).

Recurring is still an issue.

Comment Can you hear me now? (Score 4, Insightful) 121

OK networking is designed to be routable and redundant.
Now if all traffic must pass through a fort that used to have no signs
or a bit of Utah so hot and far from anyplace that only Octopussy could
think of ...

In all fairness for phones to go down because an Internet backbone failed
tells me that all our phone company laws need revision at all levels.
At one time a POT had obligations of reliability and redundancy that
seem to have flipped to a binary work or is broken.

I recall mothers day calls where you got all signals busy because of
the surge. At least the management was not Uber imposing hidden
surge pricing.

This is an opportunity for good questions at the VP thing tonight.

Comment Common sense should apply. (Score 1) 1

Common sense should apply.

It may be that this is an active attempt to get access to the software and look for flaws....
Nope it is Open.

Meta data???

The more I hear of these demands the more I feel a need to encrypt anything and everything.

Like a bad neighborhood underserved or ignored by the police where everyone answers the
door armed with bigger and bigger guns this just smells like a problem.

Oh wait... the application wants access to location, SMS, Phone, Photos, Camera, Microphone, WIFI, DevID.
It is a communication tool so the list makes sense. But
What if "they" want to man-in-the-middle a bad boy download?
Only on demand updates make sense to me. Norton says it is OK ;-) must be ok.
And now I want bigger encryption guns.

Comment It seems... (Score 1) 1

It seems we are ALL suspects.
And given this we should all demand an attorney when asked anything.

I am curious how specific the search was and how many false positives
were generated. I can see a search for issues of national security
but I cannot see searches like this for civil crimes even drug and paedophilia
panderers and purveyors as hateful as I think these are.

Since paedophilia is a psychiatric disorder they might be searching for
individuals in need of medical or psychiatric help but not providing aid.
That seems wrong.

I am so tempted to add this list of words.

Comment We all have... I would also (Score 1) 254

We all have... I would also comment that in this day and age a modest mapping device installed on squad cars
in metro areas can record data that the city map makers are unable to maintain. Very high leverage in rural areas.

Like the Waze application has demonstrated mapping and traffic feedback is darn easy.

Waze might have a class of users "city+state roads, police" that have +10 reliability
points for reported map errors accidents and obstructions.

Facts like this today are just data. The community can help but the responsibility for valid street markings is a
municipal obligation as they are the only ones allowed under the law to place traffic signs and paint public streets.

Submission + - SPAM: Authors of encrypted-messaging app in legal battel with government 1

mi writes: Open Whisper Systems — whose Signal app pioneered the end-to-end encryption technique now used by many messaging services — was subpoenaed for information about one of its users earlier this year, according to legal correspondence released Tuesday. The American Civil Liberties Union, which represented the company, said the small San Francisco firm didn't produce the user's name, address, call logs or other details requested by the government.

“That's not because Signal chose not to provide logs of information,” ACLU lawyer Brett Kaufman said in a telephone interview. “It's just that it couldn't.”

It could not, because it does not collect that information — and can not collect it because of how their software is written.

Link to Original Source

Submission + - SPAM: Yahoo! searched users' emails for the Feds 1

mi writes: Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events.

Supposedly, this represents the first case to surface of a U.S. Internet company agreeing to a spy agency's demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

Link to Original Source

Submission + - Cory Doctorow on the next iPhone's missing headphone jack (

harrymcc writes: It now seems all but certain that the next iPhones, to be announced next month, will ditch the standard headphone jack. Fast Company's Mark Sullivan talked about the switch with author and EFF adviser Cory Doctorow, who thinks it could lead to music companies leveraging DRM to exert more control over what consumers can do with their music.

Comment Well it is critical but (Score 1) 279

It is critical but

The big "but" is what laws would they enforce that are not well served today.

Voter fraud has yet to be shown to be a real problem.
Perhaps because all the metrics are measured by German VW engineering services.

The current laws on computer hacking make the breaches of HC and the DNC servers
totally illegal. But wait the hackers were from off shore and the US has no jurisdiction.

Flaws in systems and applications are not getting fixed because TLAs at times see their
knowledge of flaws a bits of power and are unwilling to disclose to vendors for repair.
Flaws that are seen as power by domestic TLAs are in fact national risks that need
prompt and aggressive repair. To some degree the Win10 roll out seems to be
a strong move to fix some issues but the anniversary update is changing some rules
that are effective contract issue from a year ago perhaps managed by John Deer and CAT.

In some cases the allegations are more politics than anything.

Comment Re:Time to release OS/X to OEM's? (Score 1) 472

Perhaps it is flamebait, but it brings up an interesting (to me) question. At this stage of the game, Apple makes most of its money off of its mobile devices. Sure, it still sells Macs - and people still like and buy them. But .....

Yep a bit of flamebait but the truth is a very large numbers of web developers
work on a Mac and the result is a Mac is a very pleasurable device for web content.
The current versions have AC WiFi and a GigE hard wire network links that
allow developers to push or pull source as fast as any.

Same is true for consumer web surfing where MAC retina seems to be
the touchstone for content.

I have a modern HiDPI display with a 6th Generation Intel® Core i7 Processor and
darn nice graphics driving 3200 x 1800 IPS but applications and font rendering flat out suck
at times on Win10. I should note that Win10 has improvements but... it ain't all soup yet.
Applications I need and want are on the naughty list for HiDPI, you can see one such
list here:
I looked at the history and many of these applications also fell flat when Apple came out
with retina displays and a year+ later fixed thing.

I did try a modest Intel® Core i7 system as a server and sent it back because it kept dying.
One would have thought that Intel could make a motherboard that ran fine with a new i7
but for many months it was a mystery. I will grab another in a couple months -- while it
worked it was fast as stink so I still want one but I want one that works. BTW: The fix sounds real
so I am shopping again.

Windows 10 is another consideration. Win10 revived a couple old laptops where graphics
drivers and thermal power management stunk on Linux.

Then there is the secret sauce in all new generation BIOS to boot 6th generation processors.

Yes I want an update but there are more moving parts being juggled than is easy to count.
I wonder if others can see any clues in macO sSierra (now in beta).

I forgot the FBI and other TLA's out there.... I wonder what secret demands have been made
if any.

Comment Re:Conspiracy Theory Coming (Score 1) 195

They also have low specific energy, poor charge retention, and high cost of manufacture. And, indeed, are very heavy.

They might be worth considering for some specific solutions, but it's clear it won't do for most of them (e.g., car-batteries).

Exactly so.
Not portable that is sure however as a local to home storage filled from roof/ carport solar
or charged off peak at a discount off peak rate.
The high cost of manufacture could be resolved with demand and manufacturing patents.

The very heavy aspect makes them less desirable for theft especially when installed in an underground vault.

There does seem to be a need for distributed storage on the grid and there does
seem to be a need for better host to host cross sectional distributed routing for networking.
The notion of centralized everything is driven by cash and greed of those owning component
parts of the infrastructure. These components are coveted and need to be challenged.

Slashdot Top Deals

This is clearly another case of too many mad scientists, and not enough hunchbacks.