Please create an account to participate in the Slashdot moderation system


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment We need to ELIMINATE electronic voting (Score 1) 172

There is no security, only obstacles in excess of the value of the successful assault.

Anything secure will need non electronic verification, which will fail if voters don't confirm their ballot. Which they won't.

Paper can't be compromised so easily. Writing the numbers down in a public process could work. . We just have to adopt transparent elections.

And in the words of a brilliant realist, "yeah, like that's gonna happen".

Comment Re: My compendium (Score 1) 157

'To have a man who wants to be the leader of the Free World speaking in a rantish and often incoherent fashion, and then constantly being informed by his followers as to what he really meant doesn't inspire confidence'

Thinking that Trump needs to be told what he said is incoherence. His 'rantish and often incoherent' speech is often plain talk, which we are unaccustomed to from politicians.

But keep underestimating Trump. That will work out well. Trust me.

Comment My compendium (Score 1, Insightful) 157

0 - Trump's comment was pure sarcasm, and all those who didn't get it at the moment also don't get Trump, and won;t get why he will win.

1 - Any questions on why you don't get Trump I will not answer. You won't get the answer either.

2 - Every state is attacking every other state's data, and at every level. Some are more successful than others. If you don't think an individual, moderately technology-capable, state is doing this, then they are entirely successful in hiding their efforts, and their success at getting data is unknown, but non-zero. Do not doubt this. Cyberattacks are the single best example of asymmetrical warfare. It is hugely cheaper to defeat Internet security than it is to implement it. Huge payoff.

3 - This is proof that there is no absolute security, only security making it unprofitable to circumvent or compromised security that the compromise is not yet detected.

4 - The DNC hack is unworthy of the FBI's time - they are a private organization. The DCCC hack is also, but because it has the word 'Congressional' in the name, the FBI will be dragged into it.

5 - If the DCCC hack exposes confidential information with a national security exposure, that is a failure of a congressional caucus dealing with sensitive data improperly. More fast and loose with important data? Probably. Consequences? Not likely.

Whoop. Expect more of these.

Comment Re:Router Failure? (Score 1) 91

Wow. You've never done this for a living, right?

Network failures in such a complex, distributed system cause unexpected problems. 'Router' should be thought of in this scenario as 'data flow device', and of course data is at risk.Transaction rollbacks, session timeouts, more than these cause problems that become data loss events.

Not that SWA is without blame here. At work we had a server failure that impacted thousands of virtual machines. What was a storage failure became a corruption failure, and ultimately we lost most of those VMs. Recovery varied from restore image from backup to, for our team, rebuild from source. Total loss of data of 3 years' data. Rebuild the data for only 9 months due to unforeseen limitations. And silence form the technology team. We had to go to C-level execs to be included in the M&M and analysis, and were asked continually why, since we were just customers. Accountability was not even considered until we demonstrated the ultimate costs for *our* real customers. Even now they keep trying to write it off as unpredictable, and we go back to apparent lack of testing, disaster recovery validation, and the abject failure of a three-letter vendor to recover their flagship system from an error induced by their own software update. After pointing out that the only real penalty for their team is to remove team member, we had to say out loud, in front of execs, "and if we do not, will this happen again?" Of course not, they say. And of course, they could not say that they never lead us to believe that prior to the failure.

To this day, and I will reference this on a call in about 2 hours, when they take up my current top issue, it will be blamed on an unexpected failure. And I'll say 'like $%^&* this spring?'. And every one on the call will remember, and know that I called them out again. And even the C-level is reluctant to actually cost the team anything, since this was a failure of routine maintenance, preferred and strategic vendor failure, recovery and data loss prevention failure, and even a system design deficiency resulting in a significant loss and concurrent brand damage/customer dissatisfaction/recovery cost impacts, or to put it simply, everything failed. No one is willing to acknowledge that all this failed. And they may, unknown to me, be in an investigation that will result in changes, but sadly I doubt it.

SWA will, however, be looking into this, since it is not just lost bookings but huge overtime costs, make up flight costs, penalties, and compensation. My niece was flying then and this turned a 6 hour trip into an 11 hour ordeal with lost baggage and a very unsatisfactory experience at the counters, since after all the systems were down and no info was readily available. We won't know about that. And this is a first for SWA, but Continental failed like this a few years ago, and the USAir merger with an airline to be named later resulted in a huge system merge and a failure similarly. Big systems fail big. It is hard to test recovery when it costs so much to replicate the hardware, and the production system is 24x7x365. Glad I'm not in that business any more, though there is nothing like a realistic DR exercise to sharpen your focus and get the blood flowing, and when it actually works, a huge validation.

Comment Re:It's a feature (Score -1, Troll) 304

"After all, your tap water isn't intended to contain arsenic"

Anthropomorphizing tap water isn't working for me. Your tap water is delivered by a corporation (public or not) or via a well or other local source belonging to you, and it is what it is. Filtering and all helps you, good.

Vaping cannot be anything but toxic, and while we're on the subject, chronic exposure to toxins can lead to unfortunate consequences.

It's not benign.

Comment Re:Really? (Score 1) 130

It seems the key field is real-world ID.

You're going to create a new one of those for each transaction also, right? And if they can discern the real-world ID once, they can do it again, so IP address, any of various 'fingerprints', etc will need to be randomized or incremented.

Iterate, and you're safe, until you find our you're not.

Comment Yes, they can (Score 1) 410

Microsoft did this to Novell very well. And Lotus 1-2-3. They didn't have to do it to LANtastic, that died around Windows 7 days from neglect.

Admittedly, they may be out of practice, though I'm pretty sure there was some work done 'to' Quickbooks until Microsoft realized they could both never compete, and more importantly never make money in that industry...

Comment It's taken a while for me to grok this (Score 1) 232

But isn't the government's stand that this is, essentially, discovery, which can be compelled in civil cases...?

So is there criminal discovery in states or federally that would compel a defendant or suspect to surrender incriminating evidence, and how does that not run afoul of the Fifth Amendment?

Comment Re: The Republicans want to make everyone work (Score 1) 1143

Eliminate the Department of Education. I don't believe there is a constitutional basis for it. If for training the workforce, Labor can advocate and try to guide the states.

And Commerce. Trade and treaties could be dealt with at State and Customs, part of DHS.

Then reduce regulation and thereby the size of other agencies.

Slashdot Top Deals