Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

BitCoin Value Collapses, Possibly Due To DDoS

pentalive Re:Well the ultimate value of Bitcoin is (605 comments)

There are places where you can trade your bitcoins for dollars. It is an extra step but you can then go buy food or pay for your operation.

about a year ago
top

Ask Slashdot: Identity Theft Attempt In Progress; How To Respond?

pentalive Re:Your options are (239 comments)

Use a password locker like LastPass, let it geneate the longest, most complex passwords the apps/websites will allow and a different one for each website or app.

about a year and a half ago
top

Disney Wants To Track You With RFID

pentalive Re:Gaming potential (278 comments)

After 2 HOURS in Its a small world, I think I would not be unhappy, I would be catatonic.

about a year and a half ago
top

Disney Wants To Track You With RFID

pentalive Re:Non-issue (278 comments)

Or more precisely knowing that Disney Customer 00123865387 existed that day or hour.

about a year and a half ago
top

Disney Wants To Track You With RFID

pentalive Re:Why is this creepy? (278 comments)

Baloney. I am a conservative and very pro privacy. Get a smaller brush.

about a year and a half ago
top

Disney Wants To Track You With RFID

pentalive Re:Why is this creepy? (278 comments)

And because you told your story here, Others who might not have considered a Vacation at a Disney Resort will now be happy customers. That park employee's action became advertising of the best sort.

about a year and a half ago
top

Disney Wants To Track You With RFID

pentalive Re:Why is this creepy? (278 comments)

Just think citizen, how useful this might be in real life. Skip all kinds of lines. DMV, Supermarket Checkout.

about a year and a half ago
top

Disney Wants To Track You With RFID

pentalive Re:Why is this creepy? (278 comments)

The little boys will get flashy pirate swords. Harry Potter wands available at Oleanders for everyone.

about a year and a half ago
top

Prince of Sealand Dies At 91

pentalive Re:Interesting contradiction (218 comments)

Then why not tax us all at %100 and free house, food, health care, car, energy (gas & electric), bandwidth (Internet and TV)...

(disclaimer: This point of view not the poster's but is espoused to make a point)

about 2 years ago
top

Kurzweil: The Cloud Will Expand Human Brain Capacity

pentalive Re:Brain full by 20? What? (267 comments)

You probably forget the things you don't need, and forget that you actually knew them. It's not a first-in-first-out, but governed by use counts. Use it a lot, keep it. Don't use it much, forget it - room for the next thing.

about 2 years ago
top

Kurzweil: The Cloud Will Expand Human Brain Capacity

pentalive Cloud and Cloud! What is "Cloud"? (267 comments)

So, what is your definition of "The Cloud"? I have seen several kinds of things refered to as the cloud. Things like other people's storage like Dropbox or flickr. Things like other people's cycles like Google Docs. Things like that vertical market application you run in a web browser (like the ticket tracking software where I work).

about 2 years ago
top

Study: Kids Under 3 Should Be Banned From Watching TV

pentalive Re:First sentence is a doozy. (334 comments)

sudo mod me up

You are not in the SUDOERS file. This will be reported.

about 2 years ago
top

Study: Kids Under 3 Should Be Banned From Watching TV

pentalive Re:First sentence is a doozy. (334 comments)

You also make use of context hints. "raed" is taken as read because of the words that surround it.

about 2 years ago
top

Graphics Cards: the Future of Online Authentication?

pentalive Ageing cards change parameters. (178 comments)

I wonder if the specific parameters used to identify a card (note not a user or a machine...) can change as the card ages, as it wears. Heat/Cold cycles, failing bits in memory, changes / updates in drives, malware infecting drivers or firmware... (that last would be -real- fun... suddenly you are not you.)

about 2 years ago
top

The Rapid Rise of License Plate Readers

pentalive Re:Tip tc ch (302 comments)

Your obviously brilliant point is lost on the rest of us who don't read your language. What did you say?

about 2 years ago
top

The Rapid Rise of License Plate Readers

pentalive Re:really? (302 comments)

It's not the innocent places you go in your day to day travels. It is the places the over imaginative detective thinks you are going. You know how sometimes people think they see Jesus in a slice of toast? Well your travels taken in total may just look like crime to that faceless public servant.

about 2 years ago

Submissions

top

Hey Anyone working on this?? Anyone?

pentalive pentalive writes  |  more than 6 years ago

pentalive writes "Somebody Please do this.

Just to help — I retain NO rights to this idea It belongs to whomever implements it first (if it can even be done...) I am more of a system administrator, not the Sith Coder I would need to be to do this.

Someone make a hypervisor that can boot my system and give me a menu of available virtual machines to run. Upon choosing a virtual machine, run that machine but also wait and see if I press a key combination to indicated I want to either A) Start another virtual machine or B) Close a running virtual machine. (I prefer Alt-Sys Request)

The hypervisor should be able to run a virtual machine setup by one of the "Big Players" like Virtual PC, BOCHs, VMware. In fact you should be able to create new virtual PCs while running a guest OS.

I know I could just run windows 2k or something then run Virtual PC on top of that — but I want to save resources for my running virtual PCs not have them hogged up by the host OS.

Anyone working on this? Anyone want to work on this?"
top

pentalive pentalive writes  |  more than 7 years ago

pentalive (449155) writes "Most games available now require you to leave the CD in the CD-ROM drive, Most machines available today can boot from CD-ROM? Why doesn't anyone market games that boot directly from their CD-ROM (using something like Ubuntu behind the scenes as the OS). I don't play FPS or MMORG (I play roller coaster tycoon mainly), you who do, do you play Diablo and also edit "that report" in word at the same time? Doom and Excel? Put the CD in and reboot the machine to play the game, Who cares what OS it runs when it's "working". What do you think? good idea?"
top

pentalive pentalive writes  |  more than 7 years ago

pentalive (449155) writes "This severe syndrome affects all most all of our youngest citizens. You may have known one or two individuals afflicted with the syndrome discussed. This article gives details and some hope for treatment."

Journals

top

Apologies to Niemöller

pentalive pentalive writes  |  more than 2 years ago

First they came for the smokers, but I did not smoke. I did nothing. Then they came for the HFCS soda drinkers, but I was diabetic. I did nothing. Then they came for the diet soda drinkers, artificial sweeteners supposedly cause cancer, I did nothing. Then they came for the delicious but makes to too fat foods, I enjoyed salads, I did nothing. Then they came for the fish eaters, with stories of mercury,

Tonight's dinner: Bread and Water. (And they are looking at the bread suspiciously)

Each food taken, is liberty taken. When they decide for us, we are made children who can n

top

Clyde's Cloud Computing

pentalive pentalive writes  |  about 4 years ago

I don't like cloud computing. It's 'My Data" on "Not My Machine"

Before Local Cloud:
I have a bunch of machines
and a nerd who herds them.
I am his boss,
I control him.
I own my data.
I have to pay to replace broken machines.

After Local Cloud Computing:
I have a bunch of machine
and a nerd to herd them
but he doesn't report to me-
I can't control him.
He owns my data
Part of the Fee is insurance to fix machines that Might break.

Another Thought on Cloud computing.

Andie's Company outsources to Clyde's Clouds. Andi has medical information.
Bob's Company outsources to Clyde's Clouds. Bob runs a marketing company.
Edward the Evil Haxorz hacks Clyde's clouds and steals Andie's medical information.
HIPAA burys Clyde's Clouds in fines. Clyde flees the country.

Where is Bob's Data?

top

A Net Nutrality Bill of Rights

pentalive pentalive writes  |  more than 6 years ago

A bill of rights.

Article 1
As an ISP you may carry packets or provide content/services not both.

To avoid the temptation to throttle your competitor's service

Article 2
You may not inspect the packets in any way. Not for content. Not for type. Not for Address.

All packets are equal, It does not matter where they go, or what they are for.

Article 3
You may charge according to bandwidth but you must provide the promised bandwidth for the price.

This allows for competition.

The best solution, I think, would be to charge for packets per minute. each minute the ISP would handle the number of packets promised for you then drop the rest. At the end of the minute your account is charged the current fee. If you pay a low fee and only get 1000 packets a minute (344 mb/sec divided between up and down).

In fact the ISP could have a preference setting that lets you change the number of packets/price as you desire. Need to download that Linux ISO? Kick up your "packets per minute" to a higher rate.

With this sort of plan there are no "ohoh used up my bandwidth for the month on the 15th" or "Oh oh look at the bill - I must have went over my bandwidth limit." moments to deal with.

Article 4
This will be the extent of any law regarding Net Neutrality.

No giving government that nose under the tent to start it's own censorship. Remember no inspecting of packets at all. Not for content. Not for address.

Perhaps we don't need article 1 if article 2 is rigorously enforced.

top

A note on Privacy from CKWop

pentalive pentalive writes  |  about 9 years ago

A poster CKWop gets the privacy point just right!

"People often retort by saying "I have nothing to hide, so I don't care if they collect the data". Yes, I'm sure the Jews had nothing to hide from the government in 1920s. Only ten years later, their census data was being used to round them up and murder them."

top

Statement of Though.

pentalive pentalive writes  |  more than 9 years ago

1) Trusted Computing - BAD

Trusted computing will destroy the ability of the "little guy" to enter the software market. It will remove the ability from the rest of us to write and enjoy our own software, or gift software from others.

Some of the implications of trusted computing and email and documents are chilling, including a 1984 type ability to "dissapear" other people's documents.

Unfortunatly Trusted computing may be a reaction to copyright violation, or copyright violation may be a convenient excuse. Either way Its comming and it will ruin computers for those of us who program.

Copyright Violation

I think it's ok to move music to new media for your own personal use. Where the trouble begins is where music is shared.

I belive one should abide by the restrictions one agrees to when one obtains a performance. If one agrees not to copy then one should not copy.

Some artists don't mind if you give away thier work, the Greatful Dead for instance, others do.

I also think the use of the labels "Pirate" and "Thief" don't help the discussion, unfortunatly "Copyright Violator" is too long and cumbersome.

Pop Up Adds (and pop behind adds and...)

Ok we asked for these when we insisted on blocking banner adds. I for one would rather have the banner adds. (Well not the blinking flashing ones)

SPAM

I think spam should not be illegal, but it should be more highly regulated. Spam should be easily filtered and should be marked as to subject. After all at some time I may want to re-finance my home, sometimes not. I wouldn't mind spam at all if I could filter for things I am looking for and filter out uninteresting things.

Each spam should, by law have the following things: and actuall actionable address for the sender, and for the business advertised, and a correct filterable subject.

People reciving Spam missing any of these thing should be able to sue both the sender and the business for a very large sum. A print out of the offending spam-mail should be all that's needed.
And the right to sue should be transferable, If I get a spam that's actionable I should be able to donate the spam to EFF who would then sue in my behalf.

Thanks.

Comments are enabled.

top

The Antispam emai client

pentalive pentalive writes  |  more than 10 years ago The ANTI-SPAM email client!

To send an email I have to have money in my stamp box. I get that money by paying the post office for e-postage. They give me a code which I enter into my email program.

When I send email each item takes a few cents from the stamp box, calls the post office computer to get a "stamp", they agree on the ammount and the stamp is put in the header of my mail.

I fire up my email client, it gets my mail, extracts the "stamps" verifies them with the computer at the post office which "cancels" them. Any mail with no stamp goes in a bucket for a few days (User preference) and is then either trashed or sent back to the sender with "NO STAMP -Not Read by recipient", The email would explain how to get a client for the new system. If the email is sent back it may be reflected by the recieving system- this is detected and the returned email is just trashed to avoid loops

Mail sent with a fake stamp would be fraud, counterfieting but would be treated as mail with no stamp by the mail client

If an email does have a stamp - half the value goes into my stamp box, the other half goes to the post office for the use of their computer. (yes the post office makes a bit to sell the stamp and makes a bit when I read the mail)

I could also have a whitelist - when email is recieved from someone on my whitelist it is placed in my inbox and the post office is not bothered. The whole value of the stamp is (A- returned to sender or B- retained in my stamp box which do you think would be safer for fraud?)

For the tinfoil chapeu crowd - If the sender is on my white list the Post office is not notified at all and the email is as secure as email is today. If not well I suppose the post office could figgure out from canceled stamps who is sending email to whom.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>