Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Google Plans Major Play In Wireless Partnering With Sprint and T-Mobile

grep -v '.*' * Re:Finally. A Google plan I can get behind (101 comments)

My ISP has only ONE JOB: connect me to the web without getting in the way.

Assuming that they use lasers for communication to Sprint and T-Mobile: all it takes are a few half-silvered mirrors somewhere as a R/O tap and SpGoogle(TM) is ready for your business! Use the web as much as you want and they'll make sure your data goes exactly where it's supposed to.

But I just don't know where they are going to place the sharks that are attached to all of those lasers. Guarding the Google Barge, perhaps?

Oh, that's been moved or depreciated, you say? That's just what they WANT you to think. You haven't seen Google Cloak, have you? (Well, for that matter NO ONE has -- but that's kinda the point.)

Now, tie that with their autonomous cars that "no one wants" and you've got: -- KnightRider! All it needs now is RoboCop to change the flat tires.

5 days ago

Ted Cruz To Oversee NASA and US Science Programs

grep -v '.*' * Re:Wonderful (496 comments)

Between the two of them Muslim scholars and Catholic monks are pretty much single handedly responsible for salvaging much of the collective knowledge of the classical world.

THIS. This is the only use I can think of for religion, in saving knowledge for the future. (See? It's not totally bad!)

"[In the time of] the classical world" - So, what have you done for me lately?

(Yes, cap-Science isn't enough all by itself either. The real Golden Rule works, too. But I'd still rather all of us try to figure things out than assume everything was completely determined for us millennia ago.

Of course, that's the trick: science is how all of nature and the universe works, religion is how humans should live and relate with each other. Completely different domains. Guess that's why I'm an introvert!)

about two weeks ago

NASA's New Horizons To Arrive At Pluto With Clyde Tombaugh's Ashes

grep -v '.*' * Re:It's a first... (108 comments)

I did not know that -- it's very sweet; good for them.

Now, I do have an off-topic question: When God finally arrives and brings back everyone from the dead:

a) Does that also include cremations? (Probably so -- just add water.) Dismemberment? (Super Glue.)
b) Will He do it more than once? I can just see Gene waking up in the shadow of the moon, and then immediately expiring because of the non-existent atmosphere and cold. So is this a one-time thing, or does God hit Ctrl-Alt-Del repeatedly until it finally works?
c) God brings back to Earth all of the travelers that have managed to escape Earths' gravity. (Sounds kinda like a shepherd -- "That's not your yard, get back over here. Stupid sheep.")
d) God doesn't bother. "You really want to leave? Have at it." (Wonder if any lawyers will take it up with Him since their potential clients are missing out.)
e) Does that also include video-game characters? NetHack, Mario, Gordon Freeman, etc? (What about PacMan and GLaDOS?) And what about Sweetie?

Enquiring minds want to know

about two weeks ago

The Mystery of Glenn Seaborg's Missing Plutonium: Solved

grep -v '.*' * Re:Pu 241 has 14 year half life (85 comments)

Pu 241 has 14 year half life [while] Pu-239 has a half life of 24,100 years.

So? Just add 2 and you're all done within 14 years -- problem solved.

If it's good enough for finance, it's certainly good enough for science.

about two weeks ago

Anthropomorphism and Object Oriented Programming

grep -v '.*' * Re:Less accurate statement (303 comments)

You can shorten something so far for clarity, but if you go to far you end up with less clarity.

I see what you did there!!

... I only wish it had been intentional.

how sometimes you make a program a little more verbose so that a different programmer coming across the code later can understand it.

Oh, like comments? You can write insanely complicated code and as long as it produces the results you had intended, it's correct. But it helps the programmer behind you if you then also write "War and Peace" describing how it works. "It's Magic" is too short.

about three weeks ago

How Identifiable Are You On the Web?

grep -v '.*' * Re:Why don't browsers clean it up? (160 comments)

Is there a reason why browsers like Firefox return everything?

"All the better to track you with, my dear..." -- the NSA

(... aka The Big Bad Wolf. And do you really think your house of bricks is that opaque?)

about a month and a half ago

Just-Announced X.Org Security Flaws Affect Code Dating Back To 1987

grep -v '.*' * Re:In before the trolls (172 comments)

Open Source ... merely guarantees that all of the bugs can be found.

Well it seems like Closed Source "merely guarantees that all of the bugs can be found" by crackers. (NO, they're not hackers.) They seem to do a pretty good job of finding and exploiting problems withOUT any copy of the source for reference.

(Well, I presume they don't. Maybe Bill Gates has a whole independent second fortune that we don't know about. Or: how DID Balmer afford to pay $2B for a bunch of guys walking around while bouncing a ball?)

about a month and a half ago

Negative Online Reviews Are Not Defamation (At Least In Canada)

grep -v '.*' * Re:Common Sense Prevails (62 comments)

...but where's the profit in that?

It's like you expect the schools to larn thuse kids sumfin and then expect the graduates to actually think logically for themselves. If we did that -- THEN where would we be?

about 2 months ago

Ask Slashdot: Making a 'Wife Friendly' Gaming PC?

grep -v '.*' * Re:Don't fight it (720 comments)

There seems to be a double standard where people are expected to make ... sacrifices

Wife: Huh? There's no double standard here. Just fix it up or you won't have dinner or sex for a week or four. Then I guess you'll have lots of time to sleep on the couch to play with your (ermm) games.

about 2 months ago

How the World's First Computer Was Rescued From the Scrap Heap

grep -v '.*' * Re:Except... (126 comments)

Colossus absolutely was general purpose ... No, it wasn't

So which of you two are going to tell Colossus that?

about 2 months ago

The Schizophrenic Programmer Who Built an OS To Talk To God

grep -v '.*' * And God responds back... (452 comments)

Eliza says: "So you say you feel the need to worship me. Tell me more."

GLaDOS says: "Well it's about bloomin' time. Go reattach that part that fell off me already."

Clippy says: "You appear to be writing a holy book. Would you like to change my appearance to one of my 666 skins before I begin to hel...p? "

about 2 months ago

Highly Advanced Backdoor Trojan Cased High-Profile Targets For Years

grep -v '.*' * I don't NEEED no stickin' source code.... (143 comments)

Researchers have unearthed highly advanced malware ... spy on a wide range of international targets in diverse industries

Oh my! Evil people are actively breaking into computers! Just imagine what they could do if they actually had the source code to what the targets run.

It's only by using proprietary software are we able to keep ourselves safe like this.

about 2 months ago

Alva Noe: Don't Worry About the Singularity, We Can't Even Copy an Amoeba

grep -v '.*' * Don't Worry About the Singularity... amoeba (455 comments)

Ha! Appropriate /. tagline while reading: Pound for pound, the amoeba is the most vicious animal on earth.

about 2 months ago

How "Big Ideas" Are Actually Hurting International Development

grep -v '.*' * It takes government to save every village (92 comments)

It takes a government to save every village in the world...

Ideas that work well ... oftentimes only apply to the specific area which was studied. ... charitable development needs to stop thinking big and start working incrementally, village by village

But wait! Homogenizing problems is what the government excels at! It's "too hard" to examine all of the individual situations*, and they'll all match up in the wash, so let's come up with a single, proven solution that solves things for everyone, everywhere, always. Any Unforeseen Consequences, if they exist, have a short Half-Life.

I really hadn't considered that NGOs had succumbed to this, I thought it was just something in the culture in D.C. and elsewhere. (Space aliens from Mars with their mind control, still pining for our Earth women, maybe.)

So is this a self-limiting thing of politics, the gathering of people and ideas together for a common cause? In order to reach a consensus you have to flatten out the facts SO MUCH that in some situations you miss the problem completely or even aggravate it?

(This does not bode well for the upcoming One World Government. Maybe the Illuminati invented the internet for this very reason?)

*) Unless one of the members needs to profit from a particular situation; then we'll make an exception.

about 2 months ago

Google Launches Service To Replace Web Ads With Subscriptions

grep -v '.*' * Re:Ads (319 comments)

They all must be blocked.

No no, you quoted it wrong: "They should all be destroyed."

(The laughter at the end there needs a LOT more bass, and a whole lot more "Ha"s. He got it wrong too.)

about 2 months ago

Aereo Files For Bankruptcy

grep -v '.*' * Re:innovation thwarted (137 comments)

Supremes: a bunch of senile old luddites. Lesser judges ... judge du jour

Now now, be very careful there or someone'll attempt to go all GitMo on your a$$.

Why? Because you might be telling the truth there. And then they'll escort and torture (sorry, "interview") you until you finally tell them exactly what they want to hear.

Understand? Not what you said -- or not even perhaps the truth as you know it -- but what they expect and want you to say; the truth that they want to hear.

And then they'll stop -- who continues to torture a person once they've finally told everything they know?

(Because if they did, you might change your story yet again and that might make them ACTUALLY upset with you.)

about 2 months ago

Aereo Files For Bankruptcy

grep -v '.*' * Re:innovation thwarted (137 comments)


No ... Lesser judges wouldn't let them.

"There's nothing new under the sun."
--- Proverb

... "and it's our job to make sure it STAYS that way."
--- entrenched corporate interests.

"...unless we own or can completely control them."
--- entrenched corporate interest lawyers.

about 2 months ago

Aereo Files For Bankruptcy

grep -v '.*' * Re:innovation thwarted (137 comments)

They were either a CATV system or not a CATV depending on the way the ... judge du jour

So: the judges weren't all consistent with each other throughout the legal system. I'd like to sue them over this but unfortunately I have no standing to do so, and even if I tried the courts wouldn't even begin to listen to me.

If only there were a company around that had a nonsensical judgement against them that could perhaps start working on this (... if only they weren't broke.)

about 2 months ago



Article: The Secret Life of Passwords

grep -v '.*' * grep -v '.*' * writes  |  about 2 months ago

grep -v '.*' * (780312) writes ""We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts."

Interesting article on people choosing their own NOT "fully safe" passwords.

For years I've used self-generated passwords as reminders or motivation. (As opposed to Stapling Batteries to Horses!) A very long time ago one of my passwords was "hYTTagt?" — have You Talked To a girl today? I'm shy, so that was a good prompting reminder.

Now, with a password manager, they're all randomized garbage to whatever the respective system will accept.

(What do you mean you want exactly 9 Latin character symbols each with exactly 2 strokes? Who the hell writes systems like that now-a-days? Do you think you're avoiding a SQL Injection Attack? (See: Bobby Tables.) )"

Link to Original Source

A black hole laser. No, really.

grep -v '.*' * grep -v '.*' * writes  |  about 3 months ago

grep -v '.*' * (780312) writes "I've heard of everything now.

"A single phonon is too weak to observe, but the phonons inside the black hole bounce back and forth between the inner and outer horizons, triggering the creation of more Hawking phonons each time, much like a laser amplifies light. Physicists call this effect a black hole laser."


NOW I'm sure that "everything has been discovered""

Link to Original Source

Homeland ICE Mission Creep, anyone?

grep -v '.*' * grep -v '.*' * writes  |  about 6 months ago

grep -v '.*' * (780312) writes "Now that all of the terrorists have been caught, no kids are waiting near the border, and Ebola is fully contained, U.S. Department of Homeland Security's Immigration and Customs Enforcement, or ICE, is on the hunt for those notorious killers, destroyers, and child-rapists of IP who have released "The Expendables 3" early.

I'm so glad that everything else is completely under control in Immigration and Customs Enforcement. On the other hand they just could be after Jet Li (Chinese) or Arnold Schwarzenegger (Austrian), so I guess that's OK after all. /sarcasm.

PS — don't tell me about Arnold's new citizenship — *I* know a foreigner when I see one. He talks funny, y'all."

Favorite unexpected comment/slang/denigration phrase?

grep -v '.*' * grep -v '.*' * writes  |  about 10 months ago

grep -v '.*' * (780312) writes "I just ran across a new turn-of-a-phrase: "kitten-chewing software vendor." (They were maligning a software vendor for an $8K per seat application upgrade charge from XP to W7.) Now that may or may not be justified — my point here is that the word imagery was more shocking than the upgrade charge. (Then again, maybe I'm just jaded.)

So, what's your favorite new or old phrase? Mine is still: "No good deed goes unpunished", although "Just because you're paranoid doesn't mean they're not out to get you" is looking better and better. (The "I'm from the government and here to help you" joke just seems to be a lost cause.)

Now: ID-10-T error is good too, although I've lately come to realize that there are some smart people who like things other than computers and just want their immediate problem solved so they can move on to their other fun, non-computer stuff. That's was a surprise — fine, but there also seem to be a lot of ID-#-T people too, where # seems to be their IQ, or at least their interest in anything that I can detect."

Link to Original Source

Crypto decoding software and keys moved to hardware

grep -v '.*' * grep -v '.*' * writes  |  about a year ago

grep -v '.*' * (780312) writes "Beyond Broadband Technology will soon help deliver entertainment content and data securely to consumers.

“It provides a totally secure communications path” that uses a “downloadable conditional access system,” or DRM (digital rights management), with its hardware specifically designed so only a licensed user can access the content.

An outside expert given access to the BBT system says it appears to be a real innovation. “It is a fundamental step forward,” says Jim Turner, the former technical director of ATIS,

The BBT “core” patent is very broad. (Well, aren't they ALL now-a-days? And yes, it points to managing an on-line card game. I too don't yet know what they're extrapolating.)

“Were ready to prove what we’ve done is unique and nobody has done it before. It exists and it is in secure microchips and the implications are very interesting.”

So: anybody got a 16mm camera and an 8-track recorder they're not using?"

Link to Original Source

Open Source Assists Crime

grep -v '.*' * grep -v '.*' * writes  |  about a year ago

grep -v '.*' * (780312) writes "("Source Code" and "Open Source" are equivalent ... right? :-) )

Just listen to this (senior security strategist) expert:

Concern is brewing that the bad guys [will] use knowledge of Acrobat source code to intensify already widespread attacks revolving around corrupted PDFs.

"Having the source code to an application is like having the blueprints to a product," says ... an IBM company, "having access to it expedites the vulnerability identification process — leading to more weaknesses being identified and used for cybercrime."

So: source code is bad, you should hide it at all costs, if not completely prevent it altogether. Gotcha.

Unfortunately I can't find the opposing text I read on crypto design long, long ago. Basically it argued that the best crypto design is completely published where everything is open and described, down to key generation and even possible starting encryption values. In addition, sample in-the-clear and coded messages and keys are given — Every Single Thing you need to encode and decode the given messages, as well as how to mint your own keys.

Here, instead of being somehow hidden and secret, everything is disclosed to everybody. Now, source code isn't crypto design, but the same rules really ought to apply. Disclose everything. Yep, the "bad guys" might find and utilize something first, but at least the "good guys" now have a chance of finding the same problem. But that goes against the trade secrets and 3rd party company contracts and NDAs though, and after all — THAT'S what's really important.

That would also create a problem for the PMs: programmers would now be wasting time producing (hopefully) secure code instead of implementing new sell-able features. And who wants to pay for features not on the box? Hell, when was the last time you saw:

* New! Now Actually Works as Described AND Implied

... on anything?

The analogy: Blueprints for a safe and lock are completely described. A compete, actual working model is given as well. This exact same safe design is then used in production.

Car analogy: describe everything about your engine, frame, and suspension design. PM / Lawyer anti-assists: ... but forget about publishing the trade-secret microcode, we'll just sell the Automobile Diagnostic Tools to interested monkeys^W parties with enough money ^W^W approved credentials every year. (You DID update the ROM year-stamp so the older OBD-II machines will refuse to read it, right?)

Interesting juxtaposition: It's just a terrible, horrible thing when closed-source code becomes available, yet open source (by definition) does it all of the time, and the agreed-upon absolute best design (in another field) is when everything is completely described and above-board with no hidey holes.

Why, it's almost like closed-source is using obscurity-by-design and hiding all of their marginal cases they're not interested in fixing. After all, if you can't see the problems they don't exist — right?

Please Compare and Contrast. This WILL appear on the final."

Link to Original Source


grep -v '.*' * has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?