Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Actual Results of Crimean Secession Vote Leaked

Dachannien Re:In-window popup autoplaying video ads with soun (557 comments)

You seem to be implying that everyone is always on a computer which they are allowed to modify in any way.

This. I'm at work right now, and the best I'm allowed to do here is run Chrome (the alternative being IE). No Firefox, no NoScript (which is what I normally use at home).

To other posters: I'm aware of, and sometimes read, Soylent News. Thanks for the other various suggestions as well. Sniff you jerks later!

about 4 months ago
top

Actual Results of Crimean Secession Vote Leaked

Dachannien In-window popup autoplaying video ads with sound? (557 comments)

Seriously, DICE? I'm sitting here looking at the first few comments, hoping for a little clarity and maybe even some insightful discussion - you know, Slashdot style - when the window contents scroll up and a video ad, with sound, starts playing.

I am done with this piece of shit website. How do I delete my account?

about 4 months ago
top

Zenimax Accuses John Carmack of Stealing VR Tech

Dachannien Trade secrets, not patents (148 comments)

What we're dealing with here is a trade secret dispute. Zenimax alleges that Carmack was privy to inside knowledge of Zenimax's work on VR tech while he worked there, and now he's allegedly run off with that knowledge and given it to Oculus VR.

Think of it like the formula for Coca Cola - it's not patented, never has been, but it's protected by trade secrets law. If someone works for Coca Cola and discovers/absconds with the formula, and then sells it to, e.g., Pepsi, then that person violates trade secrets laws by doing so. But if Pepsi independently discovers or reverse engineers Coke to discover the formula on their own, without relying on Coca Cola's inside knowledge, then more power to them.

about 5 months ago
top

Snowden Queries Putin On Live TV Regarding Russian Internet Surveillance

Dachannien Re:wouldn't matter if it weren't canned (396 comments)

Perhaps, but there is far more reason to think that Putin is lying, because he's been telling bald-faced lies to the entire world as recently as the past couple of weeks (concerning Ukraine). At least in the US, our politicians tell their lies in a gray area such that fact-checkers give numeric ratings to indicate just how untruthful a statement is. Putin just tells outright lies as if he believed them to be completely true and reasonable himself.

Or, phrased another way: In Soviet Russia, Putin fact-checks you!

about 5 months ago
top

Switching From Sitting To Standing At Your Desk

Dachannien Re:victorian clerks.. (312 comments)

The Executive chair, which should be the most luxurious, is almost always the most uncomfortable but it's always covered in slippery leather.

Clearly, the Executive chair is just for show, since he'll be out at the golf course all day anyway.

about 5 months ago
top

Obama Says He May Or May Not Let the NSA Exploit the Next Heartbleed

Dachannien Re:The President doesn't micro-manage this stuff (134 comments)

This is about technological implementation, and it's part of NSA's purview as a spy agency to explore technologies that further their ability to do their job. Part of that is discovering weaknesses in cryptographic systems which are trusted by the people you want to spy on.

The NSA also plays a counterintelligence role, and they're falling short of that if they don't take action to notify developers of a widely used Internet infrastructure utility that their software contains a critical exploit. If they can exploit it, so can the spy agencies of any other government with the skills to do so.

about 5 months ago
top

Interviews: J. Michael Straczynski Answers Your Questions

Dachannien Maybe someone else will? (67 comments)

The only way to get HD versions of the episodes would be to re-render every single CGI and comp shot, and Warners will never, ever pay to have that done.

I just want to say one word to you, just one word.

Plastics.

I mean Kickstarter.

about 6 months ago
top

Why Darmok Is a Good Star Trek: TNG Episode

Dachannien Re:Darmok and Jalad at Tenagra (512 comments)

Lucy in the sky with diamonds

Colonel Mustard in the ballroom with the lead pipe.

about 6 months ago
top

Is the Tesla Model S Pedal Placement A Safety Hazard?

Dachannien Re:Tesla (394 comments)

and has found the accelerator...which is usually non-functional because I'm out of gear.

It's not non-functional. It makes you sound awesome!

about 6 months ago
top

Creationists Demand Equal Airtime With 'Cosmos'

Dachannien Re:Demand all you want (667 comments)

(The Soviets saw Star Wars as a complete joke.)

Not true. Gorbachev was scared shitless over SDI, and it was really the only big sticking point in negotiations that could have reduced nuclear weapon stockpiles far more drastically in the 1980s than what actually happened. The Soviets responded to the threat of SDI by ramping up production of ICBMs and nuclear warheads, on the theory that it would be cheaper to overwhelm SDI with ridiculous numbers of targets than to try to devise a technological countermeasure or to produce an SDI of their own.

For reference, I highly recommend this book.

about 6 months ago
top

Interviews: Ask J. Michael Straczynski What You Will

Dachannien Re:Babylon 5 (276 comments)

Also, none of the movies were particularly good. The series is, full stop, better than star trek; But the movies were meh at best.

Are you kidding? B5: In the Beginning was amazing, to the point where I'm torn when introducing someone new to the series whether to show them ITB first or just start with the Season 1 pilot.

That said, Legend of the Rangers, with its Tae-Bo based human interface scheme, was horrible.

about 6 months ago
top

Interviews: Ask J. Michael Straczynski What You Will

Dachannien Re:Pleeeeeeeease? (276 comments)

I would totally buy its brains out. I'm warming up my Kickstarter account as we speak.

about 6 months ago
top

WikiLeaks Cables Foreshadow Russian Instigation of Ukrainian Military Action

Dachannien Re:Well ... what do you expect (479 comments)

As I recall it, Saddam said the UN inspectors were welcome, as long as there were no American inspectors there, because he was convinced they were CIA spies.

No, Saddam didn't want the inspectors there because he didn't want actual evidence to get out that he didn't have WMDs. He was more afraid of Iran than he was the US, and he said as much after he was captured and before he was executed.

about 7 months ago
top

Face Masks Provide Chinese With False Hope Against Pollution

Dachannien Orange alert?! (156 comments)

The capital is on its sixth day of an 'orange' smog alert â" the second-highest on the scale â" with the air tasting gritty and visibility down to a few hundred meters.

You mean it can get worse?!

about 7 months ago
top

Netflix Blinks, Will Pay Comcast For Network Access

Dachannien Ctrl-C Ctrl-V (520 comments)

OMFG, Timothy, did you really just copy and paste that paragraph without bothering to edit it? You didn't even bother to cut out the stock quotes from the middle of it.

about 7 months ago
top

Drive-by Android Malware Exploits Unpatchable Vulnerability

Dachannien Cognitive dissonance (120 comments)

Vulnerable devices are any device that is running a version earlier than 4.2 (in which the vulnerability was patched) which is a staggeringly large amount of the market.

The vulnerability is in Android itself rather than the proprietary GMS application platform that sits atop the base operating system so it is not easily patched by Google.

But apparently not so difficult as to make it impossible? Is there something I don't understand here, or was this summary just horribly written?

about 7 months ago
top

Scientists Create Pizza That Can Last Years

Dachannien Re:Nutritional value ? (225 comments)

I still have a collection of really tiny Tabasco bottles. One with every meal, you know.

An old Army Special Forces sergeant once explained to me that before an op, they would take a bunch of MREs apart and toss out all the extra things they didn't need, like duplicate silverware and such, and pack the rest up to take with them. But they always made sure to take some Tabasco, because with a little bit of that, "you could eat the crotch out of a dead camel."

about 7 months ago
top

More Bitcoin Exchanges Forced Out of Sync After Massive DDoS Attack

Dachannien Re:Is this the begining of the end for BTC (135 comments)

It's not just the exchanges that have to have confidence behind them. The exchange (or, at least, some Bitcoin owner out there) has to have confidence in the short seller as well. This is because the short seller borrows BTC to sell on the exchange. The short seller is then expected at some point to pay back the lender in BTC to cover the loan. Because of the additional routes for anonymity that Bitcoin provides, the short seller could abscond with the non-BTC currency as long as they can launder it, leaving the lender high and dry.

As you noted, regulations, law enforcement, and substantial recordkeeping on the part of brokerages keep this from being particularly successful in normal equities trading. If nothing else, a brokerage might require a short seller to keep cash on hand sufficient to cover the short sale, and then call in the debt if it looks like their cash on hand is coming close to being insufficient to cover. (Some brokerages let you use a margin account for this as well, if you have good credit.) The short seller would then be unable to run off with the cash because the brokerage would not release the funds until the short sale is covered. This is a solution that some Bitcoin exchanges might have problems with, because they would be keeping government-issued cash on hand in a customer account as well as BTC, which opens up several other cans of worms.

about 7 months ago
top

DDoS Larger Than the Spamhaus Attack Strikes US and Europe

Dachannien Re: Why are network providers allowing FORGED pack (158 comments)

Filtering ingress packets with RFC1918 source IPs may be useful in some circumstances, but it doesn't help in amplified attacks.

The source in these cases will always be a legitimate uninfected machine that is just doing its job (such as a DNS or NTP server). The source IP will be whatever IP the requester expects to see, such as the destination IP of the initial request.

In amplified attacks, the forgery occurs in the initial request packets, all of which have the source IP of the DoS target, which must always be an actual external IP. This is where egress filtering is useful, because none of these requests should have an IP outside of the subnet serviced by the egress filter.

about 7 months ago

Submissions

top

Lodsys Files First Shot off Bow of iPhone Devs

Dachannien Dachannien writes  |  more than 3 years ago

Dachannien (617929) writes "Patently-O and Ars Technica report that Lodsys has filed suit in the Eastern District of Texas against seven iPhone developers, asserting that the defendants are infringing two patents. Apple had previously indicated their belief that all iPhone developers are protected by a licensing agreement that Apple had made with the patents' former assignee, Intellectual Ventures. But Lodsys insists that the defendants are nonetheless liable for infringement. Still an open question is whether Apple will go beyond the mailing of strongly worded letters in defending third-party iPhone devs."
Link to Original Source
top

Virgin Mobile cites Creative Commons in defense

Dachannien Dachannien writes  |  more than 6 years ago

Dachannien (617929) writes "The AP reports that Dallas teenager Alison Chang was photographed flashing the peace sign at a church event, and the photo was later posted on Flickr by the photographer, church youth counselor Justin Wong. Imagine her surprise when the photo appeared on billboards and web ads touting Virgin Mobile Australia's text messaging service with the taglines "Dump your pen friend" and "Free text virgin to virgin" appearing near her image. Chang and Wong are suing Virgin Mobile Pty Ltd., Virgin Mobile USA, and Creative Commons Corporation for libel, invasion of privacy, and copyright infringement. For its part, Virgin Mobile stated its belief that the photos, published on Flickr under a Creative Commons license, were used in compliance with that license, although it's not clear how they complied the attribution requirement on a billboard or banner ad."
Link to Original Source
top

Dachannien Dachannien writes  |  more than 7 years ago

Dachannien (617929) writes "The AP reports that one of the four camera cars that played the role of KITT, the talking car in the 1980s TV series Knight Rider, is for sale. The owner has spent the last ten years restoring the '82 Trans Am, and is now asking the low low price of $149,995. Quoth the article: "Although it cannot achieve the 300 mph speeds that KITT reached, soar 50 feet in the air or throw smoke bombs, key features of the star car are intact. Perhaps most important, the red scanner light on the nose glows and makes a humming noise." The car also isn't street legal, but we can only hope that the micro jammer still works."

Journals

Dachannien has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>