Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Slashdot Asks: Do You Want a Smart Watch?

buchner.johannes Re:No (381 comments)

A smart watch is a smart phone with less functionality that you have to wear around your wrist. I don't understand the appeal at all. Everything it does a smart phone does better, only a smart phone is not strapped to one of your body parts.

A smart phone is a laptop with less functionality that you have to put in your pocket. I don't understand the appeal at all. Everything it does a laptop does better.

about two weeks ago
top

Congressman Asks NSA To Provide Metadata For "Lost" IRS Emails

buchner.johannes Re:Just imagine "if" (347 comments)

NSA is the National Backup Service

about a month ago
top

Ask Slashdot: Best Rapid Development Language To Learn Today?

buchner.johannes Re:Python (466 comments)

There are two possible answers to the question: Python and Javascript.

Python is a general-purpose language, with a large number of user areas. It is your best bet for general applicability.
However, if you want to aim for the web market -- which, granted, is huge -- go with Javascript.

That's pretty much all you need to know to make your decision.

about a month ago
top

"Eskimo Diet" Lacks Support For Better Cardiovascular Health

buchner.johannes Re:Eskimo?! (166 comments)

Alaskas perspective: http://www.uaf.edu/anlc/resour...

Although the name "Eskimo" is commonly used in Alaska to refer to all Inuit and Yupik people of the world, this name is considered derogatory in many other places because it was given by non-Inuit people and was said to mean "eater of raw meat."

Linguists now believe that "Eskimo" is derived from an Ojibwa word meaning "to net snowshoes." However, the people of Canada and Greenland prefer other names. "Inuit," meaning "people," is used in most of Canada, and the language is called "Inuktitut" in eastern Canada although other local designations are used also. The Inuit people of Greenland refer to themselves as "Greenlanders" or "Kalaallit" in their language, which they call "Greenlandic" or "Kalaallisut."

Perhaps we are trying to force a term on a group of peoples which never considered themselves as a group of peoples.

about a month ago
top

"Eskimo Diet" Lacks Support For Better Cardiovascular Health

buchner.johannes Re:Eskimo?! (166 comments)

Some Inuit in Canada and Greenland object very strongly, which is as good a reason as we need not to do it.

This whole topic is a bit of minefield, it's fair to say. We can initially divide the Eskimo/Aleut people into three - the Inuit, the Unangax (Aleut), and the Yupik.

The Unangax of the Aleutian Islands don't care to be called Inuit or Eskimo. They see themselves as distinct from Eskimos and don't mind being described as Native Americans; other Eskimo/Aleut people don't identify as being such. The Unangax are easily distinguished by their language (many borrowings from Russian, including the system of verb inflexions) and their religion (most are Russian Orthodox).

The Yupik have no objection to being called Eskimos, and will use that term to encompass both themselves and the Inuit. The main groupings within the Yupik are the Alutiiq of the coast, the Yuit or Siberian Yupik, and the Yup'ik of Central Alaska.

Then we come to the Inuit. The two largest groupings are the Canadian Inuit and the Kalallit or Greenland Inuit, both of which would prefer you not to call them Eskimos. (The Greenlanders are happy with Inuit to mean both themselves and the Canadians.) Ethnically speaking, two smaller groupings - the Iñupiat of the North Slope and the Inuvialuit of the Western Arctic - are also Inuit, although the Iñupiat would rather be described as Eskimo.

I said it got confusing ...

by "suze", from http://old.qi.com/talk/viewtop...
further in http://old.qi.com/talk/viewtop...

The word "Eskimo" is non-PC in Canada, much as it's fine in Alaska. The particular indigenous person of the north who was featured on QI was a Yupi'ik from Alaska - Sarah Palin's husband is one of those as well - and hence "Eskimo" rather than "Inuit" is the term to use. The plural of Yup'ik is Yupiit.

Had the person been an Aleut, then again "Eskimo" might have caused offence. The Aleut are very sure that they are not Eskimos; while they don't object to "Aleut", they prefer one Unangax, two Unangax, three or more Unangan. (Note that most of the Eskimo-Aleut languages have what's called a dual number; this comes between singular and plural and is used when there are two of something. It's rare in European languages; Slovenian and Sorbian have it, and it's on the point of vanishing from Lithuanian.)

The indigenous people of Baffin Island and such like places absolutely are Inuit, although "an Inuit" or "lots of Inuits" are always going to be wrong since "Inuit" is the plural. One Inuk, two Inuuk, three or more Inuit.

While the people of the central Arctic would prefer Inuinnaq to Inuit, they won't get especially upset at the more general word. As for indigenous Greenlanders, the preferred term is Kalaallit, singular Kalaaleq. (There's no dual in Greenlandic.)

Wikipedia is not informative on why/where it is considered offensive. https://en.wikipedia.org/wiki/... But it has a nice map of the tribes.

about a month ago
top

Google Engineer: We Need More Web Programming Languages

buchner.johannes Re:Why? (309 comments)

1. Portability to devices of various sizes and OSs
2. Ease of Accessibility for the end user
3. Security - Attack Vector of installing software

about a month and a half ago
top

TrueCrypt Cryptanalysis To Include Crowdsourcing Aspect

buchner.johannes Re:Crowdsourcing (131 comments)

tc-play is not a replacement, because it is Linux/BSD only. Can't have dmcrypt on Windows.

about 2 months ago
top

TrueCrypt Cryptanalysis To Include Crowdsourcing Aspect

buchner.johannes Re:Crowdsourcing (131 comments)

I think eedwardsjr meant "make it free software" even though she/he typed "open source"

about 2 months ago
top

TrueCrypt Cryptanalysis To Include Crowdsourcing Aspect

buchner.johannes Open Source it (131 comments)

If TrueCrypt devs really gave up because they think it is pointless, then they should open source the code (BSD, Apache2, GPL, MIT). There is no reason not to, unless they had contributers who passed away.

So finally, was the duress canary activated or not? If it is "still there" as according to that tweet, that should mean it was not activated.

Btw, tc-play is not a solution, because it is Linux/BSD only.

about 2 months ago
top

Terran Computational Calendar Introduces Minimonths, Year Bases, and Datemods

buchner.johannes Re:It's like Swatch .beat Internet time all over (209 comments)

Complicated totally unfamiliar representation of date and time for the "information age"?

Why is it unfamiliar, it is almost the same as current representation:
YY.MM.DD,HH.MM.SS TC+7H
RFC3339 is
YYYY-MM-DD HH:MM:SS+07:00

And that May 31st corresponds to 5.20. is logical, as there are fewer days in their month.

about 2 months ago
top

Happy 95th Anniversary, Relativity

buchner.johannes Re:95 years but (120 comments)

Eh, it's all relative.

Except for the speed of light. That is absolute.

about 2 months ago
top

New IE 8 Zero Day Discovered

buchner.johannes Zero-Day allowing the attacker run arbitrary code (134 comments)

"Zero-Day exploit allowing the attacker to run arbitrary code"

I thought these words should be history based on the implemented NX bit, sandboxing, multiple lines of defense and Data Execution Prevention features of MS Windows after XP.

Why do all these features fail, when they are specifically designed for exposed code like IE? Or does this warning assume the worst case, where all these other features are turned off?

about 2 months ago
top

Curiosity Rover May Have Brought Dozens of Microbes To Mars

buchner.johannes Re:What goes around comes around (97 comments)

Not just that, but by ignoring any bacteria that might have survived the trip from Earth to Mars aboard Curiosity (and presumably earlier probes all the way back to Viking) they could potentially be ruling out other strains of the same bacteria that may have made the trip by means such as impact ejecta.

You can always later on send new probes to another part of Mars that do not have these strains, and get a sample from there. Mars' conditions are not exactly to make these bacteria thrive globally.

about 2 months ago
top

Curiosity Rover May Have Brought Dozens of Microbes To Mars

buchner.johannes Re:What goes around comes around (97 comments)

It just occurred to me that even if we were to find only bacteria whose ancestor's hitchhiked their way to Mars from Earth on one of our probes, that would be a remarkable find in itself. It would demonstrate that life could have existed on Mars at one time even if we don't find any native Martian bugs.

A mars rover is encapsulated during travel, so bacteria do not experience UV radiation and solar wind they would on other bodies (meteoroids).

about 2 months ago
top

Controversial TSA Nudie X-Ray Machines Sent To Prisons

buchner.johannes When you go to prison (108 comments)

You should only lose one right: Freedom.

Not
  - security of your personal well being
  - privacy
  - respect to the human
  - torture (psychological or physical)
  - physical punishment.

The punishment is withdrawing freedom, not becoming a sub-human. Once you leave prison, you should be considered a typical citizen again -- you served your sentence, so it must not carry on forever.

That said, punishment is known to not be efficient, and not a deterrent for others (as most crimes are not driven by thinking long about the consequences). So modern prisons focus on re-constituting the citizen to full capacity. Because it works better than punishing.

about 2 months ago
top

Journalist vs. the Syrian Electronic Army

buchner.johannes Re:GENOCIDAL? (43 comments)

The armed, "Syrian" opposition, that seeks to topple him? Not so much. These are the Wahabbist fighters sponsored by US and Qatari dollars - who'd implement whippings and stonings for teaching girls to read.

The Syrian opposition consists of multiple parties, the one you describe being a small fraction. The sad thing is that they do not agree with each other substantially.

You are making Assad sound like a defender of his country. No doubt that is what he thinks. But he and his army have committed atrocities

The U.N. commission investigating human rights abuses in Syria confirms at least 9 intentional mass killings in the period 2012 to mid-July 2013, identifying the perpetrator as Syrian government and its supporters in eight cases, and the opposition in one.[526][527]

By late November 2013, according to the Euro-Mediterranean Human Rights Network (EMHRN) report entitled “Violence against Women, Bleeding Wound in the Syrian Conflict”, approximately 6,000 women have been raped (including gang-rape) since the start of the conflict - with figures likely to be much higher given that most cases go unreported.[528][529][530]

According to three eminent international lawyers.[531] Syrian government officials could face war crimes charges in the light of a huge cache of evidence smuggled out of the country showing the "systematic killing" of about 11,000 detainees. Most of the victims were young men and many corpses were emaciated, bloodstained and bore signs of torture. Some had no eyes; others showed signs of strangulation or electrocution.

find this and more here: https://en.wikipedia.org/wiki/...

Indeed, not genocide, but: When the political opposition started to demonstrate, and Assad began to detain, torture and kill them systematically, these people begged the international community to step in and support peaceful demonstration. These educated, intellectuals, potential leaders -- who could have formed a new Syria -- are dead now. We left them to die. That is precisely why only the radicals are left.

about 2 months ago
top

7.1 Billion People, 7.1 Billion Mobile Phone Accounts Activated

buchner.johannes Re:Sanity check (197 comments)

Speaking of sanity check, more people have cell phones than access to clean toilets. That, indeed, is crazy.

about 2 months ago

Submissions

top

Btrfs becomes stable, releases v3.12

buchner.johannes buchner.johannes writes  |  about 7 months ago

buchner.johannes (1139593) writes "Btrfs is the next-gen filesystem for Linux, likely to replace ext3 and ext4 in coming years and filling the space between ZFS and Reiser4. Btrfs offers many compelling new features but development has been a long time coming in the "unstable" status leaving many users unsure whether to entrust their data to. Since August, their web page declares Btrfs as stable. Have you tried it since? What has been your experience with Btrfs? Fedora users probably are already using it on a daily basis."
top

My primary work is

buchner.johannes buchner.johannes writes  |  more than 2 years ago

buchner.johannes (1139593) writes "My primary work is
  [a] developing software for a company
  [b] developing software for a research institute
  [c] research
  [d] management or consulting (not coding)
  [e] I'm unemployed
  [f] something else"
top

WebM license made GPL and Apache compatible

buchner.johannes buchner.johannes writes  |  more than 4 years ago

buchner.johannes (1139593) writes "Google updated its licensing terms for WebM, which is now a pure BSD license, with a standalone patent grant.

Using patent language borrowed from both the Apache and GPLv3 patent clauses, in this new iteration of the patent clause we've decoupled patents from copyright, thus preserving the pure BSD nature of the copyright license. This means we are no longer creating a new open source copyright license, and the patent grant can exist on its own.

Here is the WebM license FAQ. Time to make a GPLv3 fork?"
Link to Original Source

top

Ethics of producing Non-malicious Malware

buchner.johannes buchner.johannes writes  |  more than 4 years ago

buchner.johannes (1139593) writes "I was fed up with the general consent that Linux is oh-so-secure and has no malware. After a week of work, I finished a package of malware for Unix/Linux. Its whole purpose is to help whitehat hackers point out that the system can be turned into a botnet client, by simply downloading BOINC and attaching it to my user account, helping scientific projects. It does not exploit any security holes, but loose security configurations and mindless execution of unverified downloads: I tested it to be injected by a PHP script (even circumventing safemode), so that the web server runs it, hell I even got a proxy server that injects it into shell scripts and Makefiles in tarballs on the fly, and adds onto windows executable for execution in wine (Z: is /). If executed by the user, it can persist itself in cron, bashrc and other files. The aim of the exercise was to provide a payload so security people can 'pwn' systems to show security holes, without doing harm (such as deleting files or disrupting normal operation).
But now I have a problem: I am unsure of whether it is ethically ok to release this toolkit, which, by ripping out the BOINC payload and putting in something really evil, can be turned into proper Linux malware. On the one hand, the way it persists itself in autostart is really nasty, and that is not really a security hole that can be fixed. On the other hand, such a script can be written by anyone else too, and it would be useful to show people why you need SELinux on a server, and why verifying the source of downloads (checksums through trusted channels) is necessary.
Technically, it is a nice piece, but should I release it? I don't want to turn the Linux desktop into Windows, hence I'm slightly leaning towards not releasing it. What does your ethics say about releasing such grayware?"
top

Common charger for mobile phones coming in the EU

buchner.johannes buchner.johannes writes  |  about 5 years ago

buchner.johannes writes "The EU Commission and companies agreed on common charger for mobile phones:

Incompatibility of chargers for mobile phones is a major inconvenience for users and also leads to unnecessary waste. Therefore, the Commission has requested industry to come forward with a voluntary commitment to solve this problem so as to avoid legislation. As a result major producers of mobile phones have agreed to harmonise chargers in the EU.

Discussed before here and here. The text continues:

Industry commits to provide chargers compatibility on the basis of the Micro-USB connector. Once the commitment becomes effective, it will be possible to charge data-enabled mobile phones from any charger compatible with the common specifications.

"

Link to Original Source
top

Your average disturbance timescale?

buchner.johannes buchner.johannes writes  |  about 5 years ago

buchner.johannes (1139593) writes "In your office, your work is disturbed or interrupted on average after (e.g. people walking in, calls, etc.)

  — less than 5 minutes
  — less than 15 minutes
  — less than 30 minutes
  — less than 2 hours
  — more than 2 hours
  — depends on how fast slashdot throws out stories"

Link to Original Source
top

Jake looking for developers

buchner.johannes buchner.johannes writes  |  more than 5 years ago

buchner.johannes writes "Jake is the new kid on the block for team collaboration. Developed by students in Vienna, this serverless, open-source, cross-platform versioning tool is aimed for non-developers. What makes Jake unique is that the communication is done over XMPP, and that the look-and-feel is very native (unlike most Java apps).
We turn to Slashdot as we look for developers interested in picking up the work, forking it, contributing or reusing concepts in other projects. Slashdot already discussed the need for a painless, easy-to-use tool once. About Jake shows a small comparison to other tools."

Link to Original Source
top

Bittorrent reverse hash database

buchner.johannes buchner.johannes writes  |  more than 6 years ago

buchner.johannes writes "Story at: http://twoday.tuwien.ac.at/jo/stories/305252/
This is probably the first reverse hash database for torrent files.

When watching torrent traffic as an network administrator, you might want to know if the data is legal and complies to your policies.
On the other hand, if you see a torrent loading in your network as a user, if you know what it is, it might be _very_ interesting to join it, as the speed can be expected to be very high.
Database at: http://stud4.tuwien.ac.at/~e0625457/bittorrent/hostedsummary.html"

Link to Original Source

Journals

top

Jake looking for developers

buchner.johannes buchner.johannes writes  |  more than 5 years ago Jake is the new kid on the block for team collaboration. Developed by students in Vienna, this serverless, open-source, cross-platform versioning tool is aimed for non-developers. What makes Jake unique is that the communication is done over XMPP, and that the look-and-feel is very native (unlike most Java apps).
We turn to Slashdot as we look for developers interested in picking up the work, forking it, contributing or reusing concepts in other projects. Slashdot already discussed the need for a painless, easy-to-use tool once. About Jake shows a small comparison to other tools.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...