Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:seen this movie before (Score 1) 276

Selecting office software is not a political statement

That's right, it's not a statement. It's just a position. You either hold the position that it's ok to be dependent on a third party and it's ok to fail if that third party turns against you, or you hold the position that it's not ok and you would prefer to stay up no matter what adversaries want.

It only becomes a statement once you tell someone that security and reliability are among your values. ;-)

Comment Re:Hmm. and what about everything else ? (Score 2) 276

Scale isn't the main problem, interoperability is. If you've solved interoperability (i.e. you've got SPF, DKIM, etc working so gmail.com and outlook.com will receive emails sent from your system) then you're in good shape.

Not that running large systems is necessarily easy, but it doesn't have enemies the way interoperability has enemies. Scale is a merely conventional problem that Google and Microsoft aren't making worse for Linux users. Nobody's pushing back, trying to make you fail; your only foe is savage reality.

And man-vs-savage-reality is a pretty nice conflict to be involved in, compared to man-vs-man.

Comment Re:Something fishy... (Score 1) 17

That is the question.

I can see if they outsourced something and delegated a subdomain and the contract expired and then somehow the spammers got the IP's (hosting farm?) which had been abandoned and set up DNS.

But I've never been able to request a specific IP when setting up a VPS or colo, so it's kinda a mystery to me.

404 should have included the most basic of details.

Comment How would one measure this? (Score 4, Insightful) 53

How do they measure this? Did all the pirates magically agree to put Google Analytics on their web pages and share reporting with Muso? Or, in accordance with The Pirate Code (?!) do all pirate pages request the browser load http://muso.com/arr-trackme-1x... and (again, in accordance with The Pirate Code, I guess) the visitors configure their browsers to whitelist and load it? I am skeptical of any third parties who claim they "track" pirate site visits.

Comment Re:Why? (Score 1) 40

Our social structures prey on the human animal instinct for convenience and instant gratification.

Higher-level humans are trained to resist these urges by traditional social structures.

The "cultural Marxists" encourage each of the "seven deadly sins" to disarm the people who are being trained in the more frontal-lobe strategies. That makes them much easier to control.

Big Tech is an instrument of this structure. Corporate law makes it trivial to exploit them, and that's the ones not founded by Int-Q-Tel.

 

Slashdot Top Deals

You're using a keyboard! How quaint!

Working...