Man Booted From Southwest Flight and Threatened With Arrest After Critical Tweet
I've used South West Airlines for more than 3 decades. Unless the people responsible for kicking off an unhappy passenger are corrected in public, I will no longer include South West Airlines in my travel plans, nor will I authorize use of their services for my employees.
When I have an unhappy customer, I don't demand they delete their rant, I ask them how I can fix it for them. Sometimes it's not what I'd like to do, but it is what I must do to make my customer happy. I never have, and I never will ask a customer to remove a negative comment. I will ask what can I do to make this right, and if there is any way I can meet the expectation, I will.
#Eyes on YOU SWA
Ask Slashdot: Hungry Students, How Common?
Hmm. Much depends on where you live. If you are on the west or east coast, with great public transport, then I agree.
If however, you live in Texas, where public transportation is treated as a poor joke, and one in bad taste at that, and vast metroplexes, then maybe not so much.
It's funny, because the buss routes through the "poor" side of town are 40% less than on the "rich" side of town. On the poor side, you are expected to walk as much as 6 miles to a "transportation hub", while on the "rich" side, there are no routes longer than a mile away from any business or residental section.
Million Jars of Peanut Butter Dumped In New Mexico Landfill
The issue here isn't that CostCo is being numb, the issue is that people can sue CostCo if they claim to be sick from the peanut butter. Even if the food bank gives it away, and the person that gets it gives it away, the chain is still there, and CostCo is still in the sights of a plaintiff as a target for a suit.
This is pretty much why railroads will shred brand new cars if they were in a derailment. It's easier accounting to pay the manufacturer for the car than to risk 100,000 or more in liability because the car "might have been" damaged in the derailment leading to the suit. Hmmm. $40K for the car an know that's the end of it, or risk potentially $100K+ payouts for decades after from someone that might not even be born yet? It's simple math.
Snowden Says No One Listened To 10 Attempts To Raise Concerns At NSA
He's a sysadmin at the NSA, which means he's supposed to be maintaining their servers -- not looking through classified materials.
That's a problem the NSA needs to look into. Unauthorized people seeing classified data is a problem.
So if he were to report to his superiors about his concerns with any of these highly classified programs, he'd be admitting to looking at information he should never touch.
Another problem for the NSA to look into.
If he did anyway, he would have been shit-canned immediately and investigated.
Third time's the charm, right? Right?
So, it sounds like a complete pile of horseshit to me.
Except so far no one is saying "yeah, we looked into his complaints, they were completely baseless."
By the way, my tag line is the same tag line I've used for most of the years I've been reading Slash Dot.
Oil Train Explosion Triggers Evacuation In North Dakota
Ordinarily tracks next to a derailed train are closed, being considered unsafe until a track inspector or officer OKs it's use.
EU Committee Votes To Make All Smartphone Vendors Utilize a Standard Charger
I have a HD camcorder. The charger is proprietary. It dose the amazingly complex thing of supplying 8.4 VDC at 1.5 amps. The battries are proprietary too. They supply 7.4 VDC at 890mAh.
Not common (and I think I know why) but not out of the realm of cobbling up something to match. However, any aftermarket parts just don't work. Why? Because they don't have the all holy and copyright/trademarked "protection" of geniuine equipment which would "degrade" my user experience. Never mind that a simple battery for this camcorders costs retail $190USD, while the price of the parts is nearer to $12.
And while we are about tilting at windmills, let's go after ink cartridges. I wouldn't mind paying $400 for a printer, if I could get ink packs for it for less than $130 per month to print about 200 pages.
Ask Slashdot: How Do You Fight Usage Caps?
The barrier to entry for competition in the US is the last mile from the home to the internet hub. This may of course be more than a mile, but usually it's right around that. Cable companies have pumped billions of dollars per large city into their infrastructure. AT&T same. They are not about to allow competition in their areas if they can (legally or under the table) prevent it. Some of the dirty tricks used by incumbent telco operators is to have a "third party" buy up internet cooperatives once they become medium to large (more than 1000 subscribers), then bankrupt them, forcing the current customers to either pay much higher fees for less service via the incumbent, or do without internet all together if the incumbent decides a portion of the co-op is too expensive to build out to.
As far as radio frequency spectrum, look at what most of them already have in inventory versus what they have in use. The incumbents are stock piling spectrum to keep it out of the hands of competitive companies that require it to provide better service at lower cost. The FCC needs a rule that if 50% of the spectrum is not in at least 80% use, the spectrum is taken away and put back up for auction.
It is frequently stated that the US has the worst internet at the highest costs in the world. This is incorrect. It's only about the 8th worst, it just affects the most people.
The Legal Purgatory at the US Border: Detained, Searched, and Interrogated
I have an encrypted loop back file that auto-mounts upon log in, requesting first the account password via getty, then the disk password in .bashrc
Interesting thing to note kids:
Never use mass transit without pulling out your "Sunday go to meetin'" laptop. You know the one I mean.
The one that, first thing you do, is to DOD wipe the drive (Thanks DBAN!), then load the OS (Linux, of course.)
If you mount a drive over a directory that already has files in it, you can't see the files in the original directory.
So, in my encrypted directory, I have many many files of Porn that I bought the files. Carefully recorded in an invoice.txt file in the directory
along with the bank account .pdf showing the credit card transaction, banal stuff like my tax returns, the in box for the email address I hand out when I -know- they are going to spam me, browser history when I don't care when someone sees what I'm browsing, megabytes of files created by /dev/urandom and dd. That sort of thing. If I'm asked about the "gibberish" /dev/urandom files, I tell 'em the truth. They are there to confuse people that somehow get access to my system. They are completely worthless, and in fact, can be deleted. Here, let me delete them for you just to prove the point. Oh, you don't want me to? OK. But really, it's just
gibberish. Nothing to see. Honest Injun!
On the base directory, I used to have my "real" files. Now I do something far sexier than that dodge. I used to just not give the loop back encrypted drive
a password, it would fail to mount, and I'd have my real files.
The key takeaway here is "Give 'em something to titillate them while at the same time hiding your real private files. Sensitive files belong in a encrypted cloud drop box outside of ANZAC treaty partners. Remember to delete history on that kiddos. Not ALL history, just that which shows you accessed a drop box."
I have to wonder though. Why am I more afraid of my own government than I am of "terrorists"?
I don't want to hurt anyone, and I don't have a "statement" to make that requires more than a few harsh words to select people behaving badly.
The below has been my tag line almost since I opened a Slashdot account. Sad to say, it's more true now than it ever was before.
First California AMBER Alert Shows AT&T's Emergency Alerts Are a Mess
AT&T - for all that it's the same name as the precursor of the inventor of the telephone system and many innovative systems, is sadly not even a pale ghost of it's former glory. What they are is group of clue avoiding MBAs cum lawyers running a reconstituted monopoly to maximize shareholder profits and piss off customers. They are worse than that barking dog that just won't SHUT UP, they are a drag on innovation, competition, and customer service. While they do a great job of "servicing" their customers, it's not in a way that is appreciated or desired by those same customers. Besides, they use crunchy peanut butter as lube. With no "reach around". (I know how disgusting a mental image that is. Sorry, but that's about what I feel about them.)
If I had the power, anyone at AT&T (Indeed, ANY telco) above lower management would be forever barred from working anywhere near telecommunications, internet, or anything more advanced than a grill for flipping burgers. Even that I would consider high risk; food poisoning, you know.
America: Highest Internet costs, Lowest Internet speeds. Go figure.
NSA Utah Data Center Blueprints Reveal It Holds Less Than Thought
On what is kept. If it really is just the metadata and not the conversation, then the storage requirements are not all that large.
For Landlines, there is a unique identifier applied at the switch. I mis-remember what it's called, but in South Texas, it usually started with BAPA- blah blah blah for several digits.
For cell phones, there is the OMEI/UDID/ESN. Normally around 14 to 20 digits, usually 15.
Next, called number, same info.
Last, call duration.
I believe it's long been known that using particular words in a telephone conversation would raise a flag. I don't know if that's true or not. If so, lets consider this scenario:
Call metadata captured and stored - always.
Call voice session saved to a temporary storage area.
Voice data is analyzed for key words using automation. (Think about when you call your credit card company, and can input your CC number by voice)
If no keyword flags are raised, delete the conversation after X time (or immediately, who knows?)
If keyword flag is raised, score by number of keywords, flag conversation for human review, preserve all data.
After human review, who knows?
What I think: If preserving our freedom comes at the price of invading all of our privacy, then the terrorists have been gifted with a victory they could have never won for themselves. We have destroyed our freedom with the illusion of security, and now have neither freedom nor security. To draw a parallel, how is having the TSA able to squeeze my balls protecting me? "Dude - don't touch my junk!"
Ask Slashdot: Explaining Cloud Privacy Risks To K-12 Teachers?
About all you can do if you can't get someone to listen (and I'll bet you can't, and I'll tell you why) is to refuse to give your permission for your child to use the Internet as school. So why won't they listen?
When I left, there was a ~4 million dollar budget to renew and expand the email system (All teachers and staff, all kids, plus all parents, maybe e-mail for life like some colleges do, mail boxes that hold more than 512 megabytes and anti-virus). Google came in and moved everything to Google for under $200,000, expanded coverage of users as we'd wanted, and freed up 3 staff members that were doing nothing but email for other tasks. Hard to argue that $3.8 million bucks that suddenly pops up for other uses isn't a good thing, especially when a lot of other money was cut off. What's going through the superintendents head goes something like this: "Someone worried about privacy -something I don't understand but sound like it's not that important- for kids versus like, 3.8 million I can put toward fixing X, or maybe keeping those 1,000 classroom teachers I was going to have to lay off..."
Are Booth Babes Going Away? (Video)
Booth babes (of either sex and orientation) are a red flag that the company you are dealing with would like to grab your attention using the nether regions of your body rather than engaging your mind with a fantastic product. Easy tip off that they are more interested in flash over substance that will leave one looking foolish for having selected their product.
Look - don't buy.
Transgendered Folks Encountering Document/Database ID Hassles
Pet Peeve: Coders that bring up the earliest record in history. If a customer with 7 years of history calls up with a problem, likely it's with the latest order, not one they made 7 years ago.
That said, a database should treat all information in it as frangible. Nothing is ever written in stone, and all input can never be 100% validated by rules. The best you can do is say "Did they really go from Male to Female?" or "Customer unique identifier change is not supported on this version. See your supervisor for how to proceed."
Ask slashdot: Which 100+ User Virtualization Solution Should I Use?
What about Open Stack? For production, don't oversubscribe RAM. For a play ground, isolate them to one physical machine and let that machine over subscribe. I'm guessing but you can host about 20-25 virtual servers per compute node, you'll need a physical management machine, and if you do a lot of different images/want backups, you'll need a machine with a bunch of disk space or a iSCSI appliance. The open stack doc will tell you which iSCSI system will work.
Rep. Mike Rogers Dismisses CISPA Opponents "14 Year Old Tweeter On the Internet"
It took me all of three minutes to isolate his Flash Cookie.
My my my. Just LOOK at what he's been doing!
U.S. Senate's Big Immigration Bill Seeks Centralized Database For H-1B Jobs
From the really crap work I've seen by "ThoughtWorks" developers, this can only be a Bad Thing.
I mean, when a developer can't even properly craft a curl statement to correctly test his own work... well, ---FACEPALM---
Maintaining a Publicly Available Blacklist - Mechanisms and Principles
Better solution: Stop trying to force email to be a reliable and concurrent source of information. It has never been reliable nor has it ever been concurrent protocol. Check the default settings for sending email - try every hour for up to 5 days before giving up. Wait one day before sending a trouble report.
That email now generally DOES deliver results in almost real time is no excuse to think it will ALWAYS deliver in real time. If your communication either critical and/or time sensitive, then email is the wrong tool to use.
Ask Slashdot: Open Source For Bill and Document Management?
Any open source library management software that does ebooks should help you out. Here's a list:
GoPro Issues DMCA Takedown Over Negative Review
I was about to purchase 30 GoPro cameras for the charities I support. I'm glad this came thought now rather than two days from now. I've canceled my orders for their cameras. Going forward, I will refuse to purchase their equipment or anything with their IP in it.
Ask Slashdot: What Is a Reasonable Way To Deter Piracy?
Here's my take: If I find value in a tool, I'm quite willing to pay for it to use it.
If I find no value in a tool, then I quit using it and delete it.
People that use your tool but refuse to pay for it are willing to invest a lot of effort in to circumventing any kind of DRM you might wish to use.
Consider their time and effort as a non-fungible expression of the worth of your tool. Simply take the high road and ignore them.
For an example, see the "Audio-Grabber" project.
At worst, limit updates to only paying users. As "haters gotta hate", deadbeat users are just another fact of life. It isn't worth worrying about them. Put your effort into pleasing those that pay you.