Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re: FINALLY! (Score 1) 121

The only "Intel inside" that were allowed in our house are in the wife's Macs... I'll buy Intel when they are the only option left.

AMD 8088, AMD 386, AMD K6-2, Athlon S754, Phenom II X2 560 Black Edition, FX-6300 Black Edition, an AMD A8 and A10-8700P laptop.

All but the first three are still in working order. Looking forward to building a new Ryzen desktop later this year.

Comment Fake news, they aren't spending billions (Score 1) 7

This story has to be fake. I read here on Slashdot (in the comments) that the phone companies built their networks decades ago and since then they've just been raking huge profits. They aren't spending tens of billions of dollars every year constantly upgrading for better, faster service. That's why we're all still using AMPS and GPRS to load WML pages over WAP. 3G and 4G never happened and neither will 5G. It's all profit for the phone companies, Sprint doesn't spend billions on upgrades constantly. Slashdot told me so.

Submission + - Scientists Seek To Reinstate Pluto As A Planet - And Many More

Rei writes: After several years of publicly complaining about the "bullshit" decision at the IAU redefining what comprises a planet, New Horizons programme head Alan Stern and fellow planetary geologists have put forth a new definition which they seek to make official, basing planethood on hydrostatic equilibrium. Under this definition, in addition to Ceres, Pluto and other Kuiper Belt objects, large moons like Titan and Europa, as well as our own moon, would also become planets; "planet" would be a physical term, while "moon" would be an orbital term, and hence one can have a planetary moon, as well as planets that orbit other stars or no star at all (both prohibited under the current definition).

The paper points out that planetary geologists already refer to such bodies as planets, citing examples such as a paper about Titan: “A planet-wide detached haze layer occurs between 300-350 km above the surface; the visible limb of the planet, where the vertical haze optical depth is 0.1, is about 220 km above the surface”

Submission + - The Alternate Facts of Cable Companies ( 1

mirandakatz writes: New York's attorney general sued Spectrum earlier this month, essentially alleging that the cable company had blatantly lied about the internet speeds it was providing to customers. At Backchannel, Susan Crawford offers some much-need analysis of why this happened in the first place, and what if all means. Crawford writes that "in a world in which Spectrum faces little to no competition, now expects even less regulation than before, and has no need to spend money on better services, the lawsuit won’t by itself make much of a difference. But maybe the public nature of the AG’s assault—charging Spectrum for illegal misconduct—will lead to a call for alternatives...We’d get honest, straightforward, inexpensive service, rather than the horrendously expensive cable bundles we’re stuck with today."

Comment Almost at that income, with a year to go. Quadrupl (Score 1) 314

My income has quadrupled since I started, and I'm not too far from $125K today, with a year of school left to go.

One nice thing about WGU is that many of the classes end in industry certifications such as Cisco CNNA and Linux Professional Institute (LPI) Certifications. I have about eight professional certifications from WGU courses right now. In about two weeks I'll have my Cisco VNNA Security. Listing those certifications on LinkedIn absolutely does get recruiters calling.

Then when I have interviews, it's me, with fresh knowledge about the subject (and a respected certification) vs the guy who padded his resume claiming "networking knowledge" because he set up his Linksys. At my last interview, I was asked how a piece of data travels the network. When it became clear I knew everything end-to-end, when I could talk about the details of how a packet is processed inside the router, and how switches decide where to forward frames, the interview team was very impressed. They offered me a job at nearly twice the salary I had been making. A lot of that networking knowledge I learned at WGU.

Similar for other topics - the other guy *said* he knew Windows servers and Linux. I said I knew Windows servers and Linux *and* had certifications from Microsoft and LPI to back it up.

Comment Not sure if I understand what you're saying (Score 1) 150

I'm not sure I understand what you mean here:

> The problem is that citizens then become virtual prisoners in their country, because if they leave their basic rights don't have to be respected when they try to cross the border.

Are you talking about when a citizen is coming back home? I did say in my post citizens have a right to come home, in general*, and they don't (shouldn't) have to give up other rights to do so. On the other hand, citizens of Syria don't have a *right* to come to the United States - they are invited subject to conditions.

Do you mean if the US searches Syrian citizens, Syria may retaliate by being rude to US citizens? Too late - Syria hasn't respected human rights for many decades.

* For a few countries known to sponsor or harbor terrorists and such, I have no problem with a policy of "if you choose to go to Syria, be forewarned a) Syrians may chop your head off and b) the US will search you thoroughly when you return." You can decide whether you're willing to risk your life and a search before you travel to a hotbed of violence and terrorism like Syria.

Comment Agreed (general policy) (Score 1) 150

I agree. As far as I know, there is little to be gained from a policy of searching phones.

I can think of some rare circumstances in which it might be the most efficient way to resolve a doubt, perhaps with consent. Consider a young man, maybe 20 years old, is wanting to visit and bring a $50,000 of cash across the border. He says the cash is for his business buying medical lab equipment at auction in one country and bringing it to the other. Given the total circumstances, his story seems suspicious. A quick look at his Facebook and a glance at his text messages may establish whether he appears to actually be in the medical lab equipment business, or if it looks more likely he's intending to run drugs. That's an unusual type of case though, and could probably be handled with a consent search ("sir, this pile of cash looks suspicious, mind if I look at your phone for a minute?)

There are a lot of judgement calls in these kinds of things, and looking at someone's phone *will* tell you a lot about what kind of person you're dealing with, but in general I don't think it should be routinely. Probably in most cases only consensually, when there is reason to check somebody out a bit, you could give them the option of speeding up the process by letting someone look through their phone rather than waiting to hear back from more official inquiries into their background.

Comment There are a few specific things they do (Score 1, Interesting) 314

> I care about me and my family and we're not doing so hot.

I'm very sorry to hear that. I've been there - I lived in a vacant lot under a tarp for a while, then moved into a dilapidated mobile home I shared with a roommate (rent $125/month). A few years later I was evicted from a house when I couldn't pay the rent. That was about 15 years ago.

> the gains since 2008 have all gone to the upper class, of which I am not.

Several years ago I learned that there are a few specific things that rich people do to get amd stay rich. I was surprised to learn that over 80% of millionaires never made more than $100,000 / year. I've tried to apply some of those principles and while I've not been very good at applying them consistently, I rarely very have to *worry* about money anymore. Now I'm concerned mostly about making less progress than planned toward becoming a millionaire so I can retire comfortably.

Actually I found out there are two distinct groups of "rich people" - roughly those who are financially comfortable and those who have more than $100 million dollars. The mega rich almost always give up everything else in their life to obsessively pursue money. Screw that, I don't want to do that. The people who have a few million get there by much more reasonable steps such as using a written budget with automatic saving as the first item. I can do that.

> My kid just hit college and she'll not only spend her life making somebody else rich but the first 10 years paying them for the privilege.

Ouch! You say she just started college. My college career was interrupted 25 years ago, so I'm just about to graduate now. At WGU (a state school) tuition and fees is $6,000/year. I get student loans of $3,000/year. The other $3,000/year is covered by the tax credit, my employer's tuition reimbursement, and me paying a bit of cash each year from working. I'll graduate with total student loans of $12,000. Well, I would have, but when I got some extra money (outside of my normal paycheck) I paid off $6,000, so I'll graduate with $6,000 in debt. With the degree I chose, that's about 2 1/2 weeks of income. You *could* talk to your daughter about debt and double check if the plan she has is something she's going to be happy about five or ten years from now. She doesn't *have* to have significant debt to get a college education. Of course she can go into major debt if she wants to.

Comment As soon as you're invited to visit, I agree (naked (Score 3, Interesting) 150

I don't think border patrol should be searching phones, we agree on that. We disagree on the reason why.

> So while I can't run for US president, if I visit

If you visit, sure, no unreasonable search. Just as I treat visitors in my home respectfully, as I'm sure you do in your home.

Consider when a couple of thuggish looking guys, strangers, show up at my door one night. Not only am I not required to invite them in, but because my wife and 2 year old daughter are inside, I have a responsibility to my wife and daughter to NOT bring potentially dangerous people in. It is my duty to take some care regarding who I allow inside.

If you want to, you can throw a nude party in your house, and say "if you want to join the party, you need to be nude". Or you can throw a sober party, and say "if you want to come to my party, don't show up drunk." I can choose whether I want to come in under those conditions or not. You haven't violated my rights by setting ground rules for your party.

When someone standing at the border requesting entry, a country has no obligation to let them in. They in fact have some degree of responsibility to exercise a degree of care about who comes in and what they bring with them. Perhaps the government has no right to search X, for any X, but they DO have the right to say "no you can't come in", or impose any conditions they feel are proper before granting entry.

Once you're in the US (and while your outside the US), your rights as a human being should be fully respected.

On the other hand, it would be wrong for me to block your entry into your *own* house, saying "in order to go home, you have to get nude." That's the case of US citizens. Unlike people who wish to visit, peope have a right to enter their own home.

That said, I thinking searches the phones of visitors as a general policy is just a bad idea. I think it's inefficient, ineffective, and a bit rude.

Submission + - Google releases open source file sharing project 'Upspin' on GitHub (

BrianFagioli writes: Today, Google unveils yet another way to share files. Called "Upspin," the open source project aims to make sharing easier for home users. With that said, the project does not seem particularly easy to set up or maintain. For example, it uses Unix-like directories and email addresses for permissions. While it may make sense to Google engineers, I am dubious that it will ever be widely used.

"Upspin looks a bit like a global file system, but its real contribution is a set of interfaces, protocols, and components from which an information management system can be built, with properties such as security and access control suited to a modern, networked world. Upspin is not an 'app' or a web service, but rather a suite of software components, intended to run in the network and on devices connected to it, that together provide a secure, modern information storage and sharing network," says Google.

Comment Re: Except for those arrests for conspiracy... (Score 1) 505

None of those are relevant to *this* case. All you're saying is that sometimes people lie, so you won't believe anything unless you want to.

And for the record, I don't expect to convince you of anything. You're literally incapable of agreeing with me on that issue no matter what.

Submission + - Microsoft: no plans to patch known bugs before March ( 1

troublemaker_23 writes: Microsoft says it will not issue any patches for known bugs before its March updates. There are two known remotely exploitable bugs — Google issued details of a bug in the Windows graphic device interface library that can be exploited both locally and remotely to read the contents of a user's memory. Plus a zero-day exploit, one that implements a SMB3 server and affects clients connecting to it was disclosed earlier in February. Microsoft put off its February updates for unknown reasons.

Slashdot Top Deals

"Dump the condiments. If we are to be eaten, we don't need to taste good." -- "Visionaries" cartoon