Subscribe: Slashdot: Ask SlashdotSearch Slashdot
http://rss.slashdot.org/Slashdot/slashdotAskSlashdot
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
bailing  cash  data  new  people  read story  read  routers  slashdot slashdot  slashdot  story slashdot  story  things  writes 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Slashdot: Ask SlashdotSearch Slashdot

Slashdot: Ask SlashdotSearch Slashdot



News for nerds, stuff that mattersSearch Slashdot stories



Published: 2017-07-26T13:25:33+00:00

 



Ask Slashdot: Best Option For a Touring Band With Mobile Data?

2017-07-24T23:30:00+00:00

New submitter SEMLogistics writes: I'm working with a well-known rock band, that is not based in the U.S., and has an upcoming U.S. tour this fall. The issue they always run into, however, is when renting a tour bus and traveling with 12 to 14 people, they consistently blow through data allowances set by the bus company. This leads to tremendously expensive overages, and greatly throttled data. "When chartering a Nightliner tour bus, travel companies only typically allow for 10GB data a month. With 12 people, downloading music and streaming movies, we can easily exceed 12GB a day! This leads to thousands of dollars every month in overages!" Slashdot, help! Are there any good mobile hotspot options with unlimited data, and monthly contracts (I haven't found any), or other alternatives than to simply be held a data-hostage?

Read more of this story at Slashdot.

(image)



Ask Slashdot: How Can You Avoid Routers With Locked Firmware?

2017-07-24T07:30:00+00:00

thejynxed writes: Awhile ago the FCC in the USA implemented a rule that required manufacturers to restrict end-users from tampering with the radio outputs on wi-fi routers. It was predicted that manufacturers would take the lazy way out by locking down the firmware/bootloaders of the routers entirely instead of partitioning off access to the radio transmit power and channel ranges. This has apparently proven to be the case, as even now routers that were previously marketed as "Open Source Ready" or "DD-WRT Compatible" are coming with locked firmware. In my case, having noticed this trend, I purchased three routers from Belkin, Buffalo, and Netgear in Canada, the UK, and Germany respectively, instead of the USA, and the results: All three routers had locked firmware/bootloaders, with no downgrade rights and no way to install Tomato, DD-WRT, OpenWRT, etc. It seems the FCC rule is an example of the wide-reaching effect of US law on the products sold in other nations, etc. So, does anyone know a good source of unlocked routers or other technical information on how to bypass this ridiculous outcome of FCC over-reach and manufacturer laziness? The FCC later specified that they were not trying to block Open Source firmware modifications -- so leave your best suggestions in the comments. How can you avoid routers with locked firmware?

Read more of this story at Slashdot.

(image)



Ask Slashdot: Someone Else Is Using My Email Address

2017-07-22T23:34:00+00:00

periklisv writes: I daily receive emails from adult dating sites, loan services, government agencies, online retailers etc, all of them either asking me to verify my account, or, even worse, having signed me up to their service (especially dating sites), which makes me really uncomfortable, my being a married man with children... I was one of the early lucky people that registered a gmail address using my lastname@gmail.com. This has proven pretty convenient over the years, as it's simple and short, which makes it easy to communicate over the phone, write down on applications etc. However, over the past six months, some dude in Australia (I live in the EU) who happens to have the same last name as myself is using it to sign up to all sorts of services... I tried to locate the person on Facebook, Twitter etc and contacted a few that seemed to match, but I never got a response. So the question is, how do you cope with such a case, especially nowadays that sites seem to ignore the email verification for signups? Leave your best answers in the comments. What would you do if someone else started giving out your email address?

Read more of this story at Slashdot.

(image)



Ask Slashdot: Ubuntu 18.04 LTS Desktop Default Application Survey

2017-07-21T14:00:00+00:00

Dustin Kirkland, Ubuntu Product and Strategy at Canonical, writes: Howdy all- Back in March, we asked the HackerNews community, "What do you want to see in Ubuntu 17.10?": https://ubu.one/AskHN. A passionate discussion ensued, the results of which are distilled into this post: http://ubu.one/thankHN. In fact, you can check that link, http://bit.ly/thankHN and see our progress so far this cycle. We already have a beta code in 17.10 available for your testing for several of those: - GNOME replaced Unity - Bluetooth improvements with a new BlueZ- Switched to libinput- 4K/Multimonitor/HiDPI improvements- Upgraded to Network Manager 1.8- New Subiquity server installer- Minimal images (36MB, 18% smaller) And several others have excellent work in progress, and will be complete by 17.10: - Autoremove old kernels from /boot- EXT4 encryption with fscrypt- Better GPU/CUDA support In summary -- your feedback matters! There are hundreds of engineers and designers working for *you* to continue making Ubuntu amazing! Along with the switch from Unity to GNOME, we're also reviewing some of the desktop applications we package and ship in Ubuntu. We're looking to crowdsource input on your favorite Linux applications across a broad set of classic desktop functionality. We invite you to contribute by listing the applications you find most useful in Linux in order of preference. Click through for info on how to contribute.

Read more of this story at Slashdot.

(image)



Ask Slashdot: Is Password Masking On Its Way Out?

2017-07-19T00:05:00+00:00

New submitter thegreatbob writes: Perhaps you've noticed in the last 5 years or so, progressively more entities have been providing the ability to reveal the contents of a password field. While this ability is, in many cases (especially on devices with lousy keyboards), legitimately useful, it does seem to be a reasonable source of concern. Fast forward to today; I was setting up a new router (cheapest dual-band router money can, from Tenda) and I was almost horrified to discover that it does not mask any of its passwords by default. So I ask Slashdot: is password masking really on its way out, and does password masking do anything beyond preventing the casual shoulder-surfer?

Read more of this story at Slashdot.

(image)



Ask Slashdot: What Are Some Developer Secrets That Could Sink Your Business?

2017-07-18T00:05:00+00:00

snydeq writes: In today's tech world, the developer is king -- and we know it. But if you're letting us reign over your app dev strategy, you might be in for some surprises, thanks to what we aren't saying, writes an anonymous developer in a roundup of developer secrets that could sink the business. "The truth is, we developers aren't always straight with you. We have a few secrets we like to keep for ourselves. The fact that we don't tell you everything is understandable. You're the boss, after all. Do you tell your boss everything? If you're the CEO, do you loop in the board on every decision? So don't be so surprised when we do it." What possible damaging programming dirt are you keeping the lid on? Some of the points the developer mentions in his/her report include: "Your technical debt is a lot bigger than you think," "We're infatuated with our own code," and "We'd rather build than maintain." If you can think of any others not mentioned in the report, we're all ears! This may be a good time to check the "Post Anonymously" box before you submit your comment.

Read more of this story at Slashdot.

(image)



Ask Slashdot: What Are The Lesser-Known Roles Of The IT Department?

2017-07-17T07:30:00+00:00

chadenright writes: On the same day that I was hired into a new IT position, my new employer also bought a pair of $1,500 conference phones from a third-party vendor, which turned out to be defective; I've spent a chunk of the last two weeks arguing with the vendor. During the process I've learned that, as the IT guy, I'm also the antibody of the corporation and my job is to prevent not just malware and viruses but also junk hardware from entering my business's system. As a software engineer who is new to the IT side of things, I have to ask, what else have you learned about IT? What fresh hell has this software engineer gotten themselves into? Leave your best answers in the comments. What are the lesser-known roles of the IT department?

Read more of this story at Slashdot.

(image)



Ask Slashdot: What Software (Or Hardware) Glitch Makes You Angry?

2017-07-16T07:54:00+00:00

This question was inspired when Slashdot reader TheRealHocusLocus found their laptop "in the throes of a Windows 10 Update," where "progress has rolled past 100% several times and started over." I pushed the re-schedule dialogue to the rear and left it waiting. But my application did not count as activity and I left for a few moments, so Windows decided to answer its own question and restart (breaking a persistent Internet connection)... I've had it. Upon due consideration I now conclude I have been personally f*ck'd with. Driver availability, my apps and WINE permitting, this machine is getting Linux or pre-Windows-8... That's mine, now let's hear about the things that are pushing you over the edge this very minute. Phones, software, power windows, anything. There's a longer version of this story in the original submission -- but what's bugging you today? Leave your best answers in the comments. What software (or hardware glitch) makes you angry?

Read more of this story at Slashdot.

(image)



Ask Slashdot: Why Do So Many of You Think Carrying Cash Is 'Dangerous'?

2017-07-13T22:40:00+00:00

An anonymous reader writes: Recently, I asked Slashdot what you thought about paying for things online using plastic, and the security of using plastic in general; thank you all for your many and varied responses, they're all much appreciated and gave me things to consider. However, I got quite a few responses that puzzled me: People claiming that paying for things with cash, and carrying any amount of cash around at all, was somehow dangerous, that I'd be "robbed," and that I shouldn't carry cash at all, only plastic. I'm Gen-Y; I've walked around my entire life, in all sorts of places, and have never been approached or robbed by anyone, so I'm more than a little puzzled by that. So now I ask you, Slashdotters: Why do you think carrying cash is so dangerous? Where do you live/spend your time that you worry so much about being robbed? Have you been robbed before, and that's why you feel this way? I'm not going to stop carrying cash in my wallet but I'd like to understand why it is so many of you feel this way -- so please be thorough in your explanations.

Read more of this story at Slashdot.

(image)



Ask Slashdot: How Do You Read Code?

2017-07-12T22:50:00+00:00

New submitter Gornkleschnitzer writes: The majority of humans read silently by rendering a simulation of the printed words as if they were being spoken. By reading that sentence, chances are you're now stuck being conscious of this, too. You're welcome. As a programmer (and a reader of fanfiction), plenty of things I read are not valid English syntax. When I find myself reviewing class definitions, for loops, and #define macros, I rely on some interesting if inconsistent mental pronunciation rules. For instance, int i = 0; comes out as "int i equals zero," but if(i == 0) sometimes comes out as either "if i is zero" or "if i equals equals zero." The loop for(size_t i = 0; i < itemList.size(); ++i) generally translates to "for size T i equals zero, i less than item list dot size, plus-plus i." I seem to drop C++ insertion/extraction operators entirely in favor of a brief comma-like pause, with cout << str << endl; sounding like "kowt, stur, endel." What are your code-reading quirks?

Read more of this story at Slashdot.

(image)



Ask Slashdot: How Safe, Really, Is Paying For Things Online?

2017-07-09T01:34:00+00:00

An anonymous reader writes: Due to the rash of intrusions into electronic payment systems lately, I've decided to go back to paying cash for everyday purchases, groceries, fuel, and anything else I pay for in person (which also has the positive effect of making balacing my checkbook every month that much easier). The question I have is: For the monthly bills it's just not practical to pay in person (utilities, for instance), how safe are those? Five minutes of research is telling me that mailing paper checks isn't any more secure than online electronic payments and in fact may be even less secure, but short of literally showing up at the electric company, phone company, ISP, and so on, and paying them cash in person, I can't see any other way to pay them. So how safe is it right now, honestly? I'm always interested in how Slashdot readers secure their own personal finances -- but how high is the danger that a remote malefactor will hijack and then drain your bank account? Leave your best answers in the comments. How safe, really, is paying for things online?

Read more of this story at Slashdot.

(image)



Ask Slashdot: Are We Living In the Golden Age of Bailing?

2017-07-07T20:40:00+00:00

An anonymous reader shares a report that makes a case of us living in an era where bailing has become just too common: It's clear we're living in a golden age of bailing. All across America people are deciding on Monday that it would be really fantastic to go grab a drink with X on Thursday. But then when Thursday actually rolls around they realize it would actually be more fantastic to go home, flop on the bed and watch Carpool Karaoke videos. So they send the bailing text or email: "So sorry! I'm gonna have to flake on drinks tonight. Overwhelmed. My grandmother just got bubonic plague..." Bailing is one of the defining acts of the current moment because it stands at the nexus of so many larger trends: the ambiguity of modern social relationships, the fraying of commitments (paywalled), what my friend Hayley Darden calls the ethic of flexibility ushered in by smartphone apps -- not to mention the decline of civilization, the collapse of morality and the ruination of all we hold dear. [...] Technology makes it all so easy. You just pull out your phone and bailing on a rendezvous is as easy as canceling an Uber driver. There are different categories of bailing. There is canceling on friends. This seems to follow a bail curve pattern. People feel free to bail on close friends, because they will understand, and on distant friends, because they don't matter so much, but they are less inclined to bail on medium-tier or fragile friends. Then there is professional bailing. This tends to have a hierarchical structure. A high-status person will frequently bail on a lower-status colleague, but if an intern bails on a senior executive, it is a sign of serious disrespect. What do you folks think?

Read more of this story at Slashdot.

(image)



Slashdot Asks: Your Favorite Ride-Sharing App?

2017-07-05T22:00:00+00:00

There are many ride-sharing applications on the market but only two get all the media attention: Uber and Lyft. As many of you know, Uber has had a tumultuous year marked by a high-stakes legal fight with Alphabet over Google self-driving car trade secrets, a investigation by the U.S. government into the company's use of a software tool that helped its drivers avoid detection in parts of the country where the service wasn't allowed to operate in, and a sexual harassment investigation that resulted in 20 employees being fired. Uber's CEO Travis Kalanick resigned due to many of these scandals and investor pressure. Despite all of this, Uber continues to do well. Last week, the company announced it hit 5 billion rides across 6 continents, 76 countries, and 450+ cities. Meanwhile, Lyft, which is only available in the U.S., just announced it hit one million rides a day. The company also says it's seen 48 consecutive months of ride growth and is on track to hit an annualized ride rate of 350 million. Our question to you is this: what ride-sharing app is your favorite? Have you found yourself gravitating more towards Lyft due to Uber's messes, or does that not matter much to you? Bonus: do you have a favorite ride-sharing app that's not Lyft or Uber?

Read more of this story at Slashdot.

(image)



Ask Slashdot: Is Logging Long Hours a Recipe For Burnout or the Only Way To Get Ahead?

2017-07-03T18:40:00+00:00

An anonymous reader writes: Over the weekend, I came across this story on Bloomberg that illustrates a common dilemma that many of us face ourselves: are we sure we're working enough? From the article: "Earlier this month, venture capitalist Keith Rabois set off a Silicon Valley firestorm about what it takes to succeed. When another tech investor wrote on Twitter that working on the weekends and burning out isn't cool -- and doesn't work -- Rabois fired back. "Totally false," he said. Rabois cited icons like Elon Musk, Mark Zuckerberg and Bill Belichick as proof that dogged dedication (usually measured by long hours) was the only way to reach the top of your field. Lots of people objected to this assessment, for reasons ranging from VC privilege to its gendered implications." I was wondering where Slashdot readers find themselves in this debate.

Read more of this story at Slashdot.

(image)



Ask Slashdot: Best Way To Isolate a Network And Allow Data Transfer?

2017-06-22T00:05:00+00:00

Futurepower(R) writes: What is the best way to isolate a network from the internet and prevent intrusion of malware, while allowing carefully examined data transfer from internet-facing computers? An example of complete network isolation could be that each user would have two computers with a KVM switch and a monitor and keyboard, or two monitors and two keyboards. An internet-facing computer could run a very secure version of Linux. Any data to be transferred to that user's computer on the network would perhaps go through several Raspberry Pi computers running Linux; the computers could each use a different method of checking for malware. Windows computers on the isolated network could be updated using Autopatcher, so that there would never be a direct connection with the internet. Why not use virtualization? Virtualization does not provide enough separation; there is the possibility of vulnerabilities. Do you have any ideas about improving the example above?

Read more of this story at Slashdot.

(image)