Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Should Docker Move To a Non-Profit Foundation?

lseltzer Let the man make his money (47 comments)

If he thinks he can make it successful as a commercial enterprise, why shouldn't he?

about two weeks ago
top

Let's Call It 'Climate Disruption,' White House Science Adviser Suggests (Again)

lseltzer so the hockey stick graph is bullshit after all? (568 comments)

(This is the graph that has been all shaft and no blade for the last 12 years or so.) Didn't the "overwhelming scientific consensus" believe in that not too long ago?

about 5 months ago
top

Declassified Papers Hint US Uranium May Have Ended Up In Israeli Arms

lseltzer Isn't this story ancient? (165 comments)

I think this has been known for many decades

about 5 months ago
top

Apple Reportedly In Talks With Comcast For Separate Apple Streaming Path

lseltzer Re:CDNs do not violate Network Neutrality (150 comments)

Nothing comes *from* your network. It comes from Apple directly to the Comcast local offices and there to the last mile.

about 6 months ago
top

Apple Reportedly In Talks With Comcast For Separate Apple Streaming Path

lseltzer It's just a CDN (150 comments)

Private lines from Apple to Comcast endpoints, just like what Akamai, etc do

about 6 months ago
top

Apple Reportedly In Talks With Comcast For Separate Apple Streaming Path

lseltzer MOD UP! (150 comments)

Furthermore, the Internet as we know it today would not be able to function without CDNs. The only people who would be empowered would be those conducting DDOS attacks.

about 6 months ago
top

A Math Test That's Rotten To the Common Core

lseltzer This is a vocabulary problem (663 comments)

The "part I know" stuff shows up later in the test (Question 5) in a much clearer context. It looks to me as if this is a phrasing that schools are expected to teach. That said, the test doesn't seem to me to be written at a first grade level

about a year ago
top

Ed Felten: Why Email Services Should Be Court-Order Resistant

lseltzer We're talking about governments (183 comments)

Governments are supposed to have the ability to compel disclosure of confidential information, subject to legal protections. If you don't like the Snowden example, consider a less controversial criminal example, like a kidnapping in process. The point is that the 4th amendment allows for reasonable searches and seizures. Claiming that all searches and seizures are attacks is to deny the legitimacy of even uncontroversial law enforcement. Incidentally, even Lavabit complied with other government requests for data.

about a year ago
top

Cost of Healthcare.gov: $634 Million — So Far

lseltzer Re:Look at the contract data (497 comments)

I dug into it some more, and I'm pretty sure that some of that money is for other work done for Medicare

about a year ago
top

Cost of Healthcare.gov: $634 Million — So Far

lseltzer Look at the contract data (497 comments)

It's not all their Federal work. It's all work for the Centers for Medicare and Medicaid Services, which is the group implementing and managing healthcare.gov.

about a year ago
top

Researchers Infect iOS Devices With Malware Via Malicious Charger

lseltzer Re:Physical Access (201 comments)

Not that I'm all that worried about this attack, but the confirmation dialog would have to present some identifying information about the device, so the approval could probably be social-engineered.

about a year ago
top

Google Uses Reputation To Detect Malicious Downloads

lseltzer Re:Microsoft calls this SmartScreen (61 comments)

Right, if you distribute software then you should sign the files and the reputation of the file will follow the reputation of the key.

about a year and a half ago
top

Google Uses Reputation To Detect Malicious Downloads

lseltzer Re:Microsoft calls this SmartScreen (61 comments)

Like I said, it's on Windows 8. On Windows 7 SmartScreen only has reputation on sites, not files. A file that Microsoft has never seen before can rightfully be judged as suspicious. If it's something you know is OK, for instance because you compiled the program, then you know more than they do.

about a year and a half ago
top

Google Uses Reputation To Detect Malicious Downloads

lseltzer Microsoft calls this SmartScreen (61 comments)

It's only in Windows 8, but Microsoft does the same thing.

about a year and a half ago
top

Steve Jobs' First Boss: 'Very Few Companies Would Hire Steve, Even Today'

lseltzer Re:In all fairness with this economy. (420 comments)

I think you overstate the point, but has it ever been easy to get a job as a contemptuous 19 year old college dropout? That's the person who would have a hard time getting a job now.

about a year and a half ago
top

Massachusetts May Try To Tax the Cloud

lseltzer Re:Other than revenue, what's the motivation? (172 comments)

Why do they need a motivation other than revenue? In fact, revenue should always be the only motivation for taxes. When the government tries to do social engineering through the tax code they always botch things.

about a year and a half ago
top

Hockey Sticks Among Carry-On Items TSA Has Cleared For Planes

lseltzer where do you store it? (276 comments)

It won't fit under the seat in front of you or the overhead bin.

about a year and a half ago
top

Bill Gates Says Windows Phone Strategy Was Inadequate

lseltzer I think he's talking about Windows Mobile (268 comments)

In the context of the article he's talking about Microsoft's *old* phone strategy. Windows Mobile was basically an attempt to do the Blackberry thing with Windows. It could have done worse, but obviously it didn't succeed, which is why they dumped it for Windows Phone. I don't think he's criticizing Windows Phone.

about a year and a half ago
top

Samsung Amps Up Its Multi-Window Android Upgrade

lseltzer It's "Samsung," not "Android" (229 comments)

Nobody uses the term "Android" when pitching to consumers, but Samsung is particularly aggressive about differentiating their software. If all the distributions competed only on hardware it would be a boring market.

about a year and a half ago

Submissions

top

Lavabit case undermines claims NSA had Heartbleed early

lseltzer lseltzer writes  |  about 5 months ago

lseltzer (311306) writes "If the NSA really did have Heartbleed "for years" as was claimed recently by Bloomberg news, they wouldn't need to go after Lavabit. They wouldn't even want to. A column on ZDNet argues that the way the Lavabit case played out, and other circumstances, strongly indicate that the NSA did not have access to Heartbleed"
top

Apple may no longer support older OS X versions

lseltzer lseltzer writes  |  about a year ago

lseltzer (311306) writes "Has Apple changed their policy on security updates for versions of OS X older than the current one? Apple has released Mavericks and disclosed the 50+ vulnerabilities fixed in it, but they have not released an update for Mountain Lion. Therefore, Mountain Lion users have 50+ unpatched vulnerabilities. The company has no policy on product lifecycle, but they have always released security updates for at least the prior version of OS X. The new approach indicates that they want to make the OS X lifecycle like the iOS one: There is only one current versions and if you want any support you will upgrade to it."
Link to Original Source
top

Unlocked Phones: How and Why to Do It

lseltzer lseltzer writes  |  about a year and a half ago

lseltzer writes "Many news stories recently have discussed the politics of unlocked phones, but if you want to use one what are the practical implications? Who sells unlocked phones? What carriers let you unlock theirs and activate others? BYTE explores these issues and tells you why you might want an unlocked phone and how you'd go about buying one and getting service for it."
Link to Original Source
top

Three Felonies A Day: The Aaron Swartz Story Happens All The Time

lseltzer lseltzer writes  |  about a year and a half ago

lseltzer writes "The tech community has been outraged and energized by the persecution of Aaron Swartz, but it's not a new story at all. In Three Felonies A Day, attorney Harvey Silverglate gives many stories of innocent people hounded by Federal prosecutors to ruin, prison and — like Swartz — suicide. In recent decades, federal criminal law has developed so as to give prosecutors overwhelming power to trample the innocent. "Even the most intelligent and informed citizen (including lawyers and judges, for that matter) cannot predict with any reasonable assurance whether a wide range of seemingly ordinary activities might be regarded by federal prosecutors as felonies.""
Link to Original Source
top

Steve Wozniak Describes the Apple II

lseltzer lseltzer writes  |  more than 2 years ago

lseltzer writes "It's 35 years since the Apple II was released. In the May 1977 issue of BYTE, Steve Wozniak wrote a technical description of the system. BYTE has put the article up in HTML and republished it. Woz describes the integral graphics, memory architecture, BASIC interpreter, standard peripherals and explains "The Story of Sweet Sixteen". Schematics and source code listings are included."
Link to Original Source
top

Cybersecurity Takes The Offense

lseltzer lseltzer writes  |  more than 2 years ago

lseltzer writes "Cybersecurity, as in attacks on major government and civilian infrastructure technology assets, always seems to be focused on defensive measures, but interest is growing in a more active, offensively-focused approach. Fighting a defensive war is a losing approach. It needs to be clear to the attacker that their own assets are at least as vulnerable as ours. Are we already doing this? I hope so, but I'm not so sure."
Link to Original Source
top

Is This Patent Full Of Crap?

lseltzer lseltzer writes  |  more than 2 years ago

lseltzer writes "People in tech like to rant on patents specifically and generally and how stupid they are, but usually don't consider the actual rules followed by patent attorneys and the US PTO. An interview in BYTE with Andrew Schulman, a software patent litigation consultant, gives an intro on the reasoning employed by them. You may remember Schulman as the author of Undocumented DOS and other books which exposed undocumented APIs in Microsoft's products and their use of those APIs. He got a law degree and changed careers."
Link to Original Source
top

2012 Will Be the Year of the Android Tablet

lseltzer lseltzer writes  |  more than 2 years ago

lseltzer writes "The iPad has dominated the high-end tablet market so far, but that is about to change. At CES in Las Vegas in a couple weeks you will see tablets running Android 4.0 (Ice Cream Sandwich) everywhere and at prices that will make an iPad a lot harder to justify. The competition from the OEM model in the Android markets will massively shift market share away from Apple, just as it has done in the smart phone market."
Link to Original Source
top

10 Things that suck about Java

lseltzer lseltzer writes  |  more than 3 years ago

lseltzer (311306) writes "There was a time when important people claimed that Java was the future of computing and major industry companies — even Microsoft bought into it. Now Java has degenerated into an unpleasant legacy technology that causes way more problems than it solves."
Link to Original Source
top

Will Cyber World War I be outsourced?

lseltzer lseltzer writes  |  more than 3 years ago

lseltzer (311306) writes "Like so many other things in life, the Internet will change the way we go to war, and it already has. The few alleged "cyberwar" actions we've seen were likely waged in part by government contractors. It makes sense for the US to adopt this model."
Link to Original Source
top

The Crimes of the Chinese, Foxconn, Steve Jobs and

lseltzer lseltzer writes  |  more than 3 years ago

lseltzer (311306) writes "Mike Daisey's monologue performance challenges Apple customers and techies in general to think about the abusive conditions under which their products are made. "The facility is a high-tech Dickensian workhouse where underage (down to 13 year olds) are made to perform simple, repetitive actions over and over again through brutally-long shifts." Daisey describes the environment at Foxconn in Shenzhen during the string of suicides there. But how much of this argument is true and how much is just polemic? IS a bad job better than no job at all? Millions of Chinese seem to think so."
Link to Original Source
top

Why Microsoft Should Open Up Windows Update

lseltzer lseltzer writes  |  more than 3 years ago

lseltzer (311306) writes "In Vista and Windows 7 use of Windows Update is much more common and complete than in XP. But updating applications is still a case-by-case PITA. Microsoft should make Windows Update a pluggable service so that users can have one place to go to update all their software. Apps could publish update servers to WU. Microsoft wouldn't have to be involved in the creation or distribution of the updates at all."
Link to Original Source
top

Today is Windows 3.0's 20th Birthday

lseltzer lseltzer writes  |  more than 4 years ago

lseltzer (311306) writes "May 22, 1990 saw the release of Microsoft Windows 3.0. In many ways it was the turning point for Windows, the version at which you could see Windows being generally useful. With Windows 3.0 the Windows "ecosystem," as Bill Gates termed it, was born, an ecosystem which caused the extinction of many other operating systems."
Link to Original Source
top

Mozilla Unblocks Microsoft Firefox Code

lseltzer lseltzer writes  |  more than 4 years ago

lseltzer (311306) writes "After receiving clarification from Microsoft, Mozilla has unblocked Microsoft's Firefox extensions. Updates to Microsoft's advisory on the relevant vulnerability make clear that Firefox users are affected and should apply MS09-054 even though it's labeled as a "Cumulative Update to Internet Explorer." Sounds like the whole thing was largely a miscommunication. It also sounds like Mozilla got a lot of complaints, especially from enterprises, about the fact that users can't override their blocklisting mechanism."
Link to Original Source

Journals

lseltzer has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>