RandyOo writes "I've recently learned that our neighborhood is getting a fiber optic network, with a 100Mbps connection in each subscriber's home. IPv6 connectivity is included, but unfortunately, the only IPv4 connectivity they offer is Carrier Grade NAT, due to the exhaustion of IPv4 addresses in RIPE. I travel a lot, and I've become accustomed to accessing my home network via SSH, VNC, etc. It appears uPNP and PMP are unsupported by CGN. So, without a publicly-routed IPv4 address, I'll be unable to reach devices on my home network from an IPv4-only connection, such as the one provided by my cellular carrier (which also appears to be behind some kind of NAT, by the way). If the ISP isn't willing or able to sell me an IPv4 address, what alternatives do I have? I'd be willing to pay a small monthly fee for, say, a VPN service that would allow me to accept incoming connection requests on a range of ports on their Internet-facing IPv4 address. Does such a service exist?"
Want business-intelligence news delivered to your inbox? Signup for SlashBI Update now.
Nerval's Lobster writes "As we discussed yesterday, Google is bringing a Quickoffice viewer to its new high-end Chromebook Pixel, with full editing ability expected within three months. According to TechCrunch, Quickoffice-on-Chromebooks comes courtesy of Native Client. If Chromebooks prove a hit (and Google ports Quickoffice onto devices other than the ultra-high-priced Chromebook Pixel), could that mean the beginning of the end of Microsoft Office's market dominance of the productivity software space? While Microsoft has been pushing into the cloud with software like Office 365, that's also Google's home territory. But can Google actually disrupt the game?"
eegad writes "I've been thinking a lot about how much information I give to technology companies like Google and Facebook and how I'm not super comfortable with what I even dimly know about how they're handling and selling it. Is it time for major companies like this, who offer arguably utility-like services for free in exchange for info, to start giving customers a choice about how to 'pay' for their service? I'd much rather pony up a monthly fee to access all the Google services I use, for example, and be assured that no tracking or selling of my information is going on. I'm not aware of how much money these companies might make from selling data about a particular individual, but could it possibly be more than the $20 or $30 a month I'd fork over to know that my privacy is a little more secure? Is this a pipe dream, or are there other people who would happily pay for their private use of these services? What kinds of costs or problems could be involved with companies implementing this type of dual business model?"
An anonymous reader writes "It appears that two weeks ago my email address got into the wrong database. Since that time there have been continuing attempts to access my accounts and create new accounts in my name. I have received emails asking me to click the link below to confirm I want to create an account with Twitter, Facebook, Apple Games Center, Facebook mobile account, and numerous pornographic sites. I have not attempted to create accounts on any of these services. I have also received 16 notices from Apple about how to reset my Apple ID. I am guessing these notices are being automatically generated in response to too many failed login attempts. At this point I have no reason to believe any of my accounts have been compromised but I see no good response."
New submitter OlivierB writes "I am moving to a new house in the UK. The house will have very fast broadband but there is only one TV/cable aerial to plug into which is also very inconveniently located in the property. The cable TV provider can move it (for a high fee), but the biggest issue is that their channel packages are just too expensive and not appealing to me. Ideally, I would like access to the UK Freeview channels, and maybe a few extras such as Discovery Channel, Eurosport etc. All of this content would be available via IPTV, which I could watch from an HTPC or simple set-top boxes. Do you have any ideas to share with me?"
skade88 writes "As I get older, I find the little details of my life slip away from my memory after years and decades pass. I find myself wishing I had a way to record at least sound and video of my entire life. It would be nice to be able to go back and see what I was like when I was younger without the fog of memory clouding my view of the past. It would be cool to share with my boy friend and future kids how I was when I was younger by just showing them video from my life. Do y'all know of any good way to do this? I would settle for recording what I see from a first person point of view. There is also concerns that range beyond the technical. If I were to record my entire life, that would mean also recording other people, when they are interacting with me on a daily basis. What sort of privacy laws pertain to this? Even without laws, would others act differently around me because they were being recorded with my life record? How would it make you feel if your friend or family member did this?"
jetkins writes "As the owner of my own mail domain, I have the luxury of being able to create unique email addresses to use when registering with web sites and providers. So when I started to receive virus-infected emails recently, at an address that I created exclusively for use with a well-known provider of tools for the Systems Administration community (and which I have never used anywhere else), I knew immediately that either their systems or their subscriber list had been compromised. I passed my concerns on to a couple of their employees whom I know socially, and they informed me that they had passed it up the food chain. I have never received any sort of official response, nor seen any public notification or acceptance of this situation. When I received another virus-infected email at that same address this week, I posted a polite note on their Facebook page. Again, nothing. If it was a company in any other field, I might expect this degree of nonchalance, but given the fact that this company is staffed by — and primarily services — geeks, I'm a little taken aback by their apparent reticence. So, since the polite, behind-the-scenes approach appears to have no effect, I now throw it out to the group consciousness: Am I being paranoid, or are these folks being unreasonable in refusing to accept or even acknowledge that a problem might exist? What would you recommend as my next course of action?"
New submitter capsfan100 writes "At Christmas I got an $89 Android tablet by MID. The 7" tablet has sufficient RAM, etc. The battery, however, was rather pathetic out of the box. It's already fading, so we know where this is headed — decent tablet, but it constantly needs the plug. How would you take this 'old' tablet and turn it into a rockin' stereo component? Is there a ROM build out there titled Pimp My Tablet Into An MP3 Player? The current music app can look up lyrics on-line. I'd like to keep that feature. Any ideas on a good app for syncing music videos with my *ahem* random music collection? Any fun, off-beat party apps this middle-aged suburban dad hasn't heard of? Since the Android security nightmare is so well documented, I'd rather not use services that require passwords. I also need top-notch security and monitoring software so I can see what my kids and their friends are doing with it next year when I'm not home while keeping them anonymous and safe on-line. As for my living room stereo system, how best to mount a sleek MP3 tablet? I was thinking velcro, but it would ruin the feel. Maybe a wall-mount arm like my HDTV has? We want to be able to unplug it and move around the room, so I'll need to upgrade the speakers to wireless. Any thoughts there? I'm not afraid of the command line — indeed, I insist on one — but no Gentoo-type projects, thank you. Just a good sleek and secure ROM for optimal tunage with all the top apps the kids are using today."
Nerval's Lobster writes "Earlier this month, a very public argument erupted between Tesla Motors CEO Elon Musk and New York Times reporter John Broder, who claimed in a Feb. 8 column that his electric-powered Model S sedan had ground to a halt on a lonely stretch of Connecticut highway, starved for power. Musk retaliated by publishing the data from Broder's test drive, which suggested the reporter had driven the vehicle at faster speeds than he had claimed in the article (which would have drained the battery at a quicker rate) and failed to fully charge the car at available stations. Musk seems to have let the whole thing drop, but the whole brouhaha raises a point that perhaps deserves further exploration: the rising use of sensors in cars, and whether an automobile company—or any other entity, for that matter—has the right to take data from those sensors and use it for their own ends without the owner's permission. (For his part, Musk has claimed that Tesla only turns on data logging with 'explicit written permission from customers.') What do you think, Slashdot? Do we need the equivalent of a 'Do-Not-Track' option for cars?"
New submitter sc30317 writes "My house got robbed on Friday, and all of our electronics got stolen. Everything. Now, I have to go out and buy all new electronics with the insurance money. We had five TVs (don't ask), three laptops, a Bose Sound dock with iPod, a digital camera, and a desktop stolen. It's looking like I am going to get around $10K from the insurance company to replace everything. What would you do if you had to replace ALL of your technology in your house at once? I'm thinking: replace TVs; nice Desktop; new speakers; and new, cool stuff I don't know about (suggestions welcome). I already added a DVR security system, so hopefully the new things won't get burgled! Looking for suggestions to utilize my money in order to get the best stuff. Also, no Windows computers allowed in my house."
An anonymous reader writes "Recently, I had found out (through my log files) that my wireless router was subject to a Wi-Fi Protected Setup (WPS) brute force PIN attack. After looking on the Internet and discovering that there are indeed many vulnerabilities to WPS, I disabled it. After a few days, I noticed that I kept intermittently getting disconnected at around the same time every day (indicative of a WPA deauthentication handshake capture attempt). I also noticed that an evil twin has been set up in an effort to get me to connect to it. Through Wi-Fi monitoring software, I have noticed that certain MAC addresses are connected to multiple WEP and WPA2 access points in my neighborhood. I believe that I (and my neighbors) may be dealing with an advanced Wi-Fi leech. What can I do in this situation? Should I bother purchasing a directional antenna, figuring out exactly where the clients are situated, and knocking on their door? Is this something the local police can help me with?"
First time accepted submitter d33tah writes "In the summer term of my final year of IT's bachelor's course in my university, every student is obliged to develop his own project; the only requirement is that the application would use any kind of a database. While others are thinking of another useless system for an imaginary company that nobody would actually use, I'd rather hack up something the FL/OSS community actually needs. The problem is — how to figure out what it could be?"
An anonymous reader writes "Over the years, Slashdot has had many stories of non-technical entrepreneurs in need of programmers. Now I found myself in an almost opposite situation: I am a programmer with a fledgling mass-market product that needs marketing. I know Slashdot's general sentiment towards marketing. Without being judgmental one way or the other, I must say that for a product to reach the widest possible audience in a given time period, marketing is a necessity. Short of doing everything myself, I see a couple of options: 1. Hire marketing people, or an outside marketing firm; 2. Take in willing partners who are good at marketing (currently there are no shortage of people who want in). With these options, my major concerns are how to quantify performance, as well as how to avoid getting trapped in a partnership with non-performing partners — I already have a tangible product with a huge amount of time, money, and effort invested. Budget is also limited. (Budget is always limited unless you are a Fortune 500 business, but for now that's more of a secondary concern.) So here is my question to Slashdot: how do you address these concerns, and in a more general sense, how would you handle the situation: technical people with a product in need of marketing?"
Tooke writes "I've developed focal hand dystonia from playing clarinet. It affects my right pinky (and my ring finger, but to a lesser extent). My pinky isn't totally unusable when typing; however, it isn't nearly as agile as it used to be. When I must press a key with it, I tend to keep the whole finger rigid and move my entire hand instead. I also use my ring finger to press the P and semicolon keys (on QWERTY) which is a bit awkward but better than using the pinky. Thus my question: are there any keyboard layouts that are optimized to reduce right pinky/ring finger usage? I switched to Programmer Dvorak a few years ago, but Dvorak seems to make me use my right hand significantly more than my left. I'm considering mirroring the letter keys so my left hand would be used more. I also came across the Workman layout which looks interesting. I might try using that after switching the numbers and symbols around to be more like Programmer Dvorak. Has anyone been in a similar situation? What else could I do to make typing more comfortable? I've got a long career ahead of me as a programmer (I'm currently a high school senior) and I'd like to take care of my hands as much as possible."
An anonymous reader writes "I am in my late 20s, live in the U.S., work in the IT industry, and am going to school to upgrade from an associate's degree to a bachelor's degree. One of my classes is a web-based course that requires students to write blogs. I am not attending one of those questionable for-profit schools. This is a large, state-funded, public university. In this course I have noticed poor writing skills are the norm rather than the exception. It is a 3rd year course, so students should have successfully completed some sort of writing course prior to this one. Blog posts, which students are graded on, tend to be very poorly written. They are not organized into paragraphs, have multiple run-on sentences, and sometimes don't make sense. I do not know what grades they are receiving for these posts. Slashdot, is what I am seeing the exception, or the norm? Is the bar being lowered for university students, or am I just expecting too much?"