skade88 writes "As I get older, I find the little details of my life slip away from my memory after years and decades pass. I find myself wishing I had a way to record at least sound and video of my entire life. It would be nice to be able to go back and see what I was like when I was younger without the fog of memory clouding my view of the past. It would be cool to share with my boy friend and future kids how I was when I was younger by just showing them video from my life. Do y'all know of any good way to do this? I would settle for recording what I see from a first person point of view. There is also concerns that range beyond the technical. If I were to record my entire life, that would mean also recording other people, when they are interacting with me on a daily basis. What sort of privacy laws pertain to this? Even without laws, would others act differently around me because they were being recorded with my life record? How would it make you feel if your friend or family member did this?"
jetkins writes "As the owner of my own mail domain, I have the luxury of being able to create unique email addresses to use when registering with web sites and providers. So when I started to receive virus-infected emails recently, at an address that I created exclusively for use with a well-known provider of tools for the Systems Administration community (and which I have never used anywhere else), I knew immediately that either their systems or their subscriber list had been compromised. I passed my concerns on to a couple of their employees whom I know socially, and they informed me that they had passed it up the food chain. I have never received any sort of official response, nor seen any public notification or acceptance of this situation. When I received another virus-infected email at that same address this week, I posted a polite note on their Facebook page. Again, nothing. If it was a company in any other field, I might expect this degree of nonchalance, but given the fact that this company is staffed by — and primarily services — geeks, I'm a little taken aback by their apparent reticence. So, since the polite, behind-the-scenes approach appears to have no effect, I now throw it out to the group consciousness: Am I being paranoid, or are these folks being unreasonable in refusing to accept or even acknowledge that a problem might exist? What would you recommend as my next course of action?"
New submitter capsfan100 writes "At Christmas I got an $89 Android tablet by MID. The 7" tablet has sufficient RAM, etc. The battery, however, was rather pathetic out of the box. It's already fading, so we know where this is headed — decent tablet, but it constantly needs the plug. How would you take this 'old' tablet and turn it into a rockin' stereo component? Is there a ROM build out there titled Pimp My Tablet Into An MP3 Player? The current music app can look up lyrics on-line. I'd like to keep that feature. Any ideas on a good app for syncing music videos with my *ahem* random music collection? Any fun, off-beat party apps this middle-aged suburban dad hasn't heard of? Since the Android security nightmare is so well documented, I'd rather not use services that require passwords. I also need top-notch security and monitoring software so I can see what my kids and their friends are doing with it next year when I'm not home while keeping them anonymous and safe on-line. As for my living room stereo system, how best to mount a sleek MP3 tablet? I was thinking velcro, but it would ruin the feel. Maybe a wall-mount arm like my HDTV has? We want to be able to unplug it and move around the room, so I'll need to upgrade the speakers to wireless. Any thoughts there? I'm not afraid of the command line — indeed, I insist on one — but no Gentoo-type projects, thank you. Just a good sleek and secure ROM for optimal tunage with all the top apps the kids are using today."
Nerval's Lobster writes "Earlier this month, a very public argument erupted between Tesla Motors CEO Elon Musk and New York Times reporter John Broder, who claimed in a Feb. 8 column that his electric-powered Model S sedan had ground to a halt on a lonely stretch of Connecticut highway, starved for power. Musk retaliated by publishing the data from Broder's test drive, which suggested the reporter had driven the vehicle at faster speeds than he had claimed in the article (which would have drained the battery at a quicker rate) and failed to fully charge the car at available stations. Musk seems to have let the whole thing drop, but the whole brouhaha raises a point that perhaps deserves further exploration: the rising use of sensors in cars, and whether an automobile company—or any other entity, for that matter—has the right to take data from those sensors and use it for their own ends without the owner's permission. (For his part, Musk has claimed that Tesla only turns on data logging with 'explicit written permission from customers.') What do you think, Slashdot? Do we need the equivalent of a 'Do-Not-Track' option for cars?"
New submitter sc30317 writes "My house got robbed on Friday, and all of our electronics got stolen. Everything. Now, I have to go out and buy all new electronics with the insurance money. We had five TVs (don't ask), three laptops, a Bose Sound dock with iPod, a digital camera, and a desktop stolen. It's looking like I am going to get around $10K from the insurance company to replace everything. What would you do if you had to replace ALL of your technology in your house at once? I'm thinking: replace TVs; nice Desktop; new speakers; and new, cool stuff I don't know about (suggestions welcome). I already added a DVR security system, so hopefully the new things won't get burgled! Looking for suggestions to utilize my money in order to get the best stuff. Also, no Windows computers allowed in my house."
An anonymous reader writes "Recently, I had found out (through my log files) that my wireless router was subject to a Wi-Fi Protected Setup (WPS) brute force PIN attack. After looking on the Internet and discovering that there are indeed many vulnerabilities to WPS, I disabled it. After a few days, I noticed that I kept intermittently getting disconnected at around the same time every day (indicative of a WPA deauthentication handshake capture attempt). I also noticed that an evil twin has been set up in an effort to get me to connect to it. Through Wi-Fi monitoring software, I have noticed that certain MAC addresses are connected to multiple WEP and WPA2 access points in my neighborhood. I believe that I (and my neighbors) may be dealing with an advanced Wi-Fi leech. What can I do in this situation? Should I bother purchasing a directional antenna, figuring out exactly where the clients are situated, and knocking on their door? Is this something the local police can help me with?"
First time accepted submitter d33tah writes "In the summer term of my final year of IT's bachelor's course in my university, every student is obliged to develop his own project; the only requirement is that the application would use any kind of a database. While others are thinking of another useless system for an imaginary company that nobody would actually use, I'd rather hack up something the FL/OSS community actually needs. The problem is — how to figure out what it could be?"
An anonymous reader writes "Over the years, Slashdot has had many stories of non-technical entrepreneurs in need of programmers. Now I found myself in an almost opposite situation: I am a programmer with a fledgling mass-market product that needs marketing. I know Slashdot's general sentiment towards marketing. Without being judgmental one way or the other, I must say that for a product to reach the widest possible audience in a given time period, marketing is a necessity. Short of doing everything myself, I see a couple of options: 1. Hire marketing people, or an outside marketing firm; 2. Take in willing partners who are good at marketing (currently there are no shortage of people who want in). With these options, my major concerns are how to quantify performance, as well as how to avoid getting trapped in a partnership with non-performing partners — I already have a tangible product with a huge amount of time, money, and effort invested. Budget is also limited. (Budget is always limited unless you are a Fortune 500 business, but for now that's more of a secondary concern.) So here is my question to Slashdot: how do you address these concerns, and in a more general sense, how would you handle the situation: technical people with a product in need of marketing?"
Tooke writes "I've developed focal hand dystonia from playing clarinet. It affects my right pinky (and my ring finger, but to a lesser extent). My pinky isn't totally unusable when typing; however, it isn't nearly as agile as it used to be. When I must press a key with it, I tend to keep the whole finger rigid and move my entire hand instead. I also use my ring finger to press the P and semicolon keys (on QWERTY) which is a bit awkward but better than using the pinky. Thus my question: are there any keyboard layouts that are optimized to reduce right pinky/ring finger usage? I switched to Programmer Dvorak a few years ago, but Dvorak seems to make me use my right hand significantly more than my left. I'm considering mirroring the letter keys so my left hand would be used more. I also came across the Workman layout which looks interesting. I might try using that after switching the numbers and symbols around to be more like Programmer Dvorak. Has anyone been in a similar situation? What else could I do to make typing more comfortable? I've got a long career ahead of me as a programmer (I'm currently a high school senior) and I'd like to take care of my hands as much as possible."
An anonymous reader writes "I am in my late 20s, live in the U.S., work in the IT industry, and am going to school to upgrade from an associate's degree to a bachelor's degree. One of my classes is a web-based course that requires students to write blogs. I am not attending one of those questionable for-profit schools. This is a large, state-funded, public university. In this course I have noticed poor writing skills are the norm rather than the exception. It is a 3rd year course, so students should have successfully completed some sort of writing course prior to this one. Blog posts, which students are graded on, tend to be very poorly written. They are not organized into paragraphs, have multiple run-on sentences, and sometimes don't make sense. I do not know what grades they are receiving for these posts. Slashdot, is what I am seeing the exception, or the norm? Is the bar being lowered for university students, or am I just expecting too much?"
First time accepted submitter BadassFractal writes "I'm in the market for a new large desktop monitor (or two) which I intend to use almost exclusively for programming and all sorts of software development-related work. I'm trying to keep the cost down reasonable, and I do enjoy as large of a resolution as possible. What do people 'in the know' out there use these days for that purpose? I'm thinking a 1920x1200 24" would be good, unless there's an affordable 2560xFoo option out there. I keep hearing about nameless Korean 27" screens, any thoughts on those?"
rueger writes "At various times during the day I need a quick break from serious work. Browsing the 'net is not a good choice because it invariably winds up consuming an hour on places like Slashdot, so right now that means my break is a game of Solitaire. Loads in seconds, takes maybe a minute to play, then back to stuff that matters. I'm wondering what other goodies could fill that role — maybe games, maybe something that actually leads to knowledge, skills, or a measurable output? Think of it as an on-screen micro-hobby. Any Ideas?"
Nerval's Lobster writes "If the rumors are true, and Apple is indeed hard at work on a newfangled timepiece (dubbed the 'iWatch'), what unique features could such a device offer a public already overloaded with all sorts of handheld devices? Answer that question, and you're perhaps one step closer to figuring out why Apple — again, if the rumors are true — decided to devote millions of dollars and the precious hours of some very smart people in the effort. This article suggests voice control (via Siri), biometrics, mobile payments, and other possible features, but there must be loads of others that someone could think up."
hyperorbiter writes "How come after 25 years in the tech industry, someone hasn't worked out how to make accurate progress bars? This migration I'm doing has sat on 'less than a minute' for over 30 minutes. I'm not an engineer; is it really that hard?"