By Roblimo from
Slashdot's if-you-want-liberty-you-need-to-work-for-it department:
Go to
Stop the Secrecy.net and you'll see that this is something that requires action
now, not someday, It's about the
TPP, or Trans Pacific Partnership, a trade agreement that could place major restrictions on how we use the Internet. This is far from the only attack on Internet freedom we need to fight against, just one the
EFF (and others) feel is one of the worst ones in play right now. Mild-mannered Steve Anderson, founder and Executive Director of
OpenMedia.ca, is today's interview guest. He's Canadian, but OpenMedia.ca doesn't stop at Canada's southern border. Steve and the rest of the group want U.S. citizens to have the same Internet freedoms they want Canadians to have -- as well as people all over the world, because Internet
balkanization hurts all Internet users. Including you. And worse, this is not the only problem with the TPP. Did you notice, in the TPP link above (to Wikipedia), that parts of this trade agreement are secret? So even if you want to protest against it, you might end up holding a sign that's mostly blank. This is a "Call your
Congressional representatives" situation. Unless you're in Canada, in which case it's a "Call your
Member of Parliament" situation. Ditto if you're in another TPP country. In any case, it's going to take a lot of calls, letters, emails, and faxes from people like us to overcome some of the heavy money that wants the TPP to go through. (
Alternate video link.)
Read Replies (0)
By Unknown Lamer from
Slashdot's now-throw-some-money-at-openafs department:
An anonymous reader writes
"Red Hat announced their pending acquisition of Inktank this morning. Sage Weil and a team of researchers at University of California Santa Cruz first published the architecture in 2007. Sage joined DreamHost after college and continued development on Ceph until DreamHost spun off a Inktank, a company focused solely on Ceph. In Sage's blog post on the acqusition,he says 'In particular, joining forces with the Red Hat team will improve our ability to address problems at all layers of the storage stack, including in the kernel.' Sage goes on to announce that Inktank's proprietary management tools for Ceph will now be open sourced, citing Red Hat's pure open source development and business models.
Ceph has seen wide adoption in OpenStack customer deployments, alongside Red Hat's existing Gluster system."Ceph looks pretty cool if you're doing serious storage:
CERN has a 3 Petabyte "prototype" cluster in use now (Only tangentially related, but still interesting, is how CERN
does storage in general).
Read Replies (0)
By Unknown Lamer from
Slashdot's firing-squads-make-a-comeback department:
Daniel_Stuckey (2647775) writes
"The state of Oklahoma had scheduled two executions for Tuesday, April 29th. This in spite of myriad objections that the drugs being used for both lethal injections had not been tested, and thus could violate the constitutional right to the courts, as well as the 8th Amendment: protection from cruel and unusual punishment. After much legal and political wrangling, the state proceeded with the executions anyway. It soon became clear that the critics' worst case scenarios were coming true — Oklahoma violently botched the first execution. The inmate "blew" a vein and had a heart attack. The state quickly postponed the second one. 'After weeks of Oklahoma refusing to disclose basic information about the drugs for tonight's lethal injection procedures, tonight, Clayton Lockett was tortured to death,' Madeline Cohen, the attorney of Charles Warner, the second man scheduled for execution, said in a statement. Katie Fretland at The Guardian reported from the scene of the botched attempt to execute Lockett using the untested, unvetted, and therefore potentially unconstitutional lethal injection drugs."sciencehabit also points out a
study indicating that
around 4% of death row inmates in the U.S. are likely innocent.
Read Replies (0)
By Soulskill from
Slashdot's can't-sync-your-stone-carvings-over-dropbox department:
An anonymous reader writes
"After many years I now have a backup of all my digital data in (at least) two physical locations. But what do people recommend to back up my physical data? And then how to prove my identity? I call it the 'gas leak problem,' because a gas leak in my town caused an explosion that leveled a house. If it had been my house, it would have destroyed all my paperwork that proves who I am. If I'd come home from work and found my house was now a pile of rubble, how would I prove I lived there, knowing my key no longer fits the smoldering lock? If I'd left my wallet at home, my bank cards would have been destroyed so I couldn't withdraw money or book into a hotel. Or if I'd left my phone at the office, I wouldn't know anyone's number to call, or get anyone to vouch for me. What preventative steps can you take? Since having this nightmare, I've exported my phone's VCF file to an online repo, made online notes of all my bank account numbers and passport ID, I keep ICE numbers with me at all times (separate from phone/wallet), and I've hidden a spare mobile phone and house key in a box in a nearby field. But there must be more to do!"Read Replies (0)
By Soulskill from
Slashdot's or-annoying-or-frustrating-or-etc department:
An anonymous reader writes
"Those of us who spend our days sitting in front of a screen trying to make computers do our bidding know how difficult programming can be. But from an outside perspective, there's not much to indicate difficulty. Most of us have heard somebody compare our job to digging ditches, or some other manual labor, meant to contrast easy (sitting around and typing) versus hard (muscle-wearying work). Now, Peter Welch has written an amusing essay to help combat that point of view, titled Programming Sucks. He compares bridge building to a big software project. Here's a small part of it:
'You start by meeting Mary, project leader for a bridge in a major metropolitan area. Mary introduces you to Fred, after you get through the fifteen security checks installed by Dave because Dave had his sweater stolen off his desk once and Never Again. Fred only works with wood, so you ask why he's involved because this bridge is supposed to allow rush-hour traffic full of cars full of mortal humans to cross a 200-foot drop over rapids. Don't worry, says Mary, Fred's going to handle the walkways. What walkways? Well Fred made a good case for walkways and they're going to add to the bridge's appeal. Of course, they'll have to be built without railings, because there's a strict no railings rule enforced by Phil, who's not an engineer. ... Would you drive across this bridge? No. If it somehow got built, everybody involved would be executed. Yet some version of this dynamic wrote every single program you have ever used, banking software, websites, and a ubiquitously used program that was supposed to protect information on the internet but didn't.' Welch goes on to gripe about all the ways in which programming is almost awesome, but ends up being annoying."Read Replies (0)