Compilers ought to have switches that deliberately branch to the error cases they're trying to optimize away. Getting rid of a divide by zero? Force the error instead so it gets attention. Coder forgot to declare volatile variables? Make local static shadow copies of static variables for comparison at every reference. And so on. Development environments ought to be helping with this stuff, not confounding developers.
Mostly from Rachael at Card Services, calling about my account. I press 1 to speak with an agent and ask which account, and they hang up on me. I'm glad the car extended warranty calls have stopped. Now if I could end Rachael's calls, the political surveys and Newt Gingrich's calls to my cell phone I'd be a pretty happy camper. Newt doesn't want to hear what I have to say anyway.
This is worthless pandering. The fact is that there is no way for the receiver of a spoofed CID call to complain. The number on the Caller ID doesn't identify the caller, and the caller won't identify themselves. If you can't identify the caller, you can't complain. If you can't complain, the callers can't be held accountable. The system is broken, and therefore so are all the laws that assume the system is working. Fix the system first, then write new laws if they're needed.
alphadogg writes: The Department of Homeland Security has spent $3 million over the past few years on research aimed at bolstering the security of the Internet's routing system.
Now, as this research is being deployed across the Internet, DHS wants government agencies and their carriers to be among the earliest adopters of the new Resource Public Key Infrastructure (RPKI) system that it helped create.
DHS considers the RPKI system to be a much-needed first step in securing the Internet's core routing protocol, which is called the Border Gateway Protocol (BGP). In addition to its support of RPKI, DHS also has spent around $1 million on research and software development aimed at adding security directly to BGP.
RPKI helps improve routing security by adding a layer of encryption to the communications between Internet registries and network operators. With RPKI, network operators can verify that they have the authority to route traffic for a block of IP addresses or routing prefixes known as Autonomous System Numbers.
CWmike writes: Verizon Wireless said Wednesday that it will launch its faster Long Term Evolution (LTE) wireless network in 38 cities, reaching 110 million people, on Sunday, with the initial focus on business users who deploy LTE over new $100 USB modems connected to laptops. What's less clear is when actual smartphones will be sold by Verizon that are ready for advertised LTE download speeds of 5Mbit/sec. to 12 Mbit/sec. That speed is about 10 times faster than what Verizon currently offers. Verizon CEO Ivan Seidenberg recently said LTE smartphones will be launched by February, while Verizon CTO Tony Melone today said they would be ready by mid-2011, although he added that his timeline should not be taken as 'any different' from Seidenberg's. More information on devices and release dates will be announced at next month's Consumer Electronics Show, Melone said.
I will take my neighborhood civic association website down before I spend my personal, volunteer time to make it ADA compliant. It's not that I don't want it to comply, but there's simply no budget to hire people who know how to do this right, and I can't put the extra time in to do this myself.
sluggyproxy writes: A wealthy man took his laptop in to a local computer store to have a virus removed. According to police, the store owner was able to convince the man that the virus was in fact a symptom of a much larger plot in which he was being menaced by government intelligence agencies, foreign nationals . . .
angry tapir writes: "Facebook has purchased most of drop.io, an online content-sharing service, but the social-networking giant sounds more interested in acquiring the company's developers than its technology. Drop.io is a service that lets users create a "drop" where they can share documents, videos and other digital content. The user can set a time for how long the drop will exist, decide who can view the content, set permissions for who can alter the content and share content in a variety of ways, including on Facebook."
shmG writes: When someone buys something at a store, they assume they own it. A recent court ruling says that isn't so with software — and that means that unlike a used car, you can't resell it. The U.S. Court of Appeals for the Ninth Circuit ruled in Vernor v. Autodesk that an individual who purchases and then resells secondhand software is not the "owner" of that copy of the software. Therefore, that person cannot resell it if the license agreement accompanying the software restricts such resale. "What if you have a Honda Accord with software running the navigation and radio systems? If Honda were to put in a software licensing agreement, what's the difference between that and regular software? It would mean you wouldn't be able to resell the Honda Accord. You could do this with anything that runs software — microwaves, TVs, cell phones,et cetera," Halpern said.
steveha writes: The New Bern, NC Sun Journal newspaper reports that some local voters have seen the e-voting machine record the exact opposite of the voter's request. There is a button to vote a straight Republican ticket, and when pushed, it voted a straight Democrat ticket. A local voter observed this behavior four times in a row; the fifth time, the button worked correctly. If ATMs were this unreliable, no bank would use them. Why is this level of failure acceptable in voting machines?
thecarchik writes: Denso has modeled the next iterations of a "smart traffic light" system. It would use messaging between vehicles and the traffic-light controller to let the light make better decisions about when to change, to maximize overall vehicle throughput. And that, in turn would reduce the number of minutes cars spent idling at traffic lights, cutting their emissions and their fuel usage. In other words, cutting red-light time helps you go green. Denso's proposed system uses short-range wireless transmitters (think your WiFi router) in cars and elements of the road infrastructure. The field is broadly known as V2V (for vehicle to vehicle) communications.