Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Cost Transfer -- Lockout (Score 1) 498

Look: some people (celebs) potentially have sophisticated opponents and truly need high security. They know who they are, and should willingly deal with complex passwds. Why impose them on the rest of humanity? People should decide for themselves.

Forcing strong passwds is just laziness and avoiding implemention of other security measures like rate-limiting, IPgeo, lock-out, oh yes, and hashing passwds! Yes, lockout can cause DoS but I'd like the notice and after unlock would have complexity to be able to do without.

Comment Re:Breakthroughs are NOT plannable projects (Score 1) 474

Disturbingly harsh, especially as we are all just trying to discuss and understand. Hyperbolic criticism and "ad hominem" get in the way, and appear intentional.

The point of removing blockages leading to breakthroughs is very likely valid where it applies. I do not believe it applies to CPU/GPU performance because there has been plenty of competition (Intel, ARM, AMD, Alpha, PowerPC, Transmeta ...) who have gone back to various levels of "scratch". I have not seen or heard of anything that might qualify as a major blockage such as a patents. Sure someone out there might have a great new idea, but that is what competition is intended to bring out.

Comment Breakthroughs are NOT plannable projects (Score 5, Insightful) 474

The poster asks a question that assumes breakthroughs can be planned just like any other development project. But breakthroughs are not, or rather, those that can be planned and worked already have been. The computer science field has been operating awash with funding for at least 55 years.

I'm not saying there are no breathoughts out there, what I'm saying is that our current project methodology has already discovered all it can, and most future breathoughs will come from some other methodology.

The target, CPU/GPU power is also not especially compelling -- compared to the past, there is much less pressure to increase performance, and considerable uncertainty how the increase will be helpful.

Comment Not just entering US, but also leaving (Score 1) 514

The US entrance controls are obvious -- immigration and customs officers you must satisfy. Unlike some countries (AU), there are no obvious exit controls. But the US has always exerted jurisdiction over _exports_ so CBP officers can and do stop people leaving the US to inspect for prohibited exports. Just about any comp/phone might be seized because it contains crypto (5A002, 5A992 unless you have the resources to press the Mass Market exemption).

Even if CBP are being less @$$hole-ish (seriously, a job requirement), they can certainly claim electronics could be carrying data (mostly instructions) that are prohibited export.

Comment Training for the more experienced (Score 1) 197

In any technical field, conferences are the "Training" component for the more experienced, just as classes/CBT are for the less experienced. "When you stop learning, you start dying".

A bigger problem is "bean-counteritis", an endemic loss of vision and courage in management position-holders. Entrepreneurialism and indeed all capitalism is based on taking selected risks. If you only bet on documented sure things, poor returns are guaranteed.

Comment Re:Exactly (Score 1) 163

Yep. Do you have any idea how big a 100+A relay is? (~1 cm contacts) The cooling? And you'd need a duplex for std N.American service (230V hot-hotinv). Look at a 50A AC relay. Smaller & fewer for UK/EU. But meters are buss-bar straddle devices. You have to physically pull the meter out of it's socket to cut power.

Now a malefactor certainly could interfere with the power usage signals, and potentially confuse higher (optimizing) layers of the grid load-balancing system. Even that should not result in a brownout, let alone a blackout.

Comment KNOW YOUR RIGHTS ! (Score 1) 313

This story is prehistoric, overbooking has been an algorithmically optimised practice by the airlines for at least 40 years. No recent news, but in 2011 the US increased the legally-mandated compensation for "involuntary denied boarding compensation" in 14 CFR 250.5 .

The loophole is the airlines try to get their victims to agree to substantially less, mostly by never giving the written notice they're required to, or by obfuscating it. Go google/duckduckgo it.

Comment Stingray = US felony (Score 2) 25

This device is the very essence of cracking, unauthorized access to a computer system, namely the targetted cellphone and others in the vacinity. A violation of 13 USC 1030. It is testimony to the corruption of our legal system that the perpetrators, so-called Law Enforcement Officers, are so brazen as to use these devices openly without fear of prosecution.

Comment Unauthorised Access is already a US felony (Score 1) 212

Doh! Accessing a computer without the owners permission is a felony under 18 USC 1030 . Even if the vendors did not access/test their botnet, they are accessories-before-the-fact. DDoS on open, public ports may or may not be covered as contrary to 18 USC 1030 , however accessing all the little 'bots most certainly is.

Comment C O P Y R I G H T ??? (Score 1) 157

What if it were legislated/court ruled that an individual has a copyright interest in any and all data that is personally identifiable? Certainly a company recorded it, but _MY_ click created it. They of course can use it as necessarily intended (implied consent), but cannot copy and send it anywhere else without explicit (annual?) consent. Database holders might have the right to strip personal identifiers and average data from users (min 12?) then use the aggregates as they wish.

Slashdot Top Deals

I just need enough to tide me over until I need more. -- Bill Hoest