Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:actors across series (Score 1) 276

The farscape/SG crossovers always had the feel of "throwing a dog a bone" after the dog's show was canceled/completed, and I blame that entirely on SyFy. They were unashamedly trying to use the stars existing clout to gain mind-share.

One example I can think of in B5 is Bestor (Walter Koenig aka Chekov), but he stands on his own, as did McGuyver in SG1. Chriton and Erin did not hold up nearly so well in alternate roles. I'm primarily thinking of people who played small, one-time parts (so perhaps Katsulas was not so great an example). Patricia Tallman for instance played many background roles in Startrek, but either did not speak, or was an alien.

Comment actors across series (Score 5, Interesting) 276

I've often noticed that if an actor played a speaking character in one scifi series, while looking mostly humanish, any other series they are in they have a pretty concealing costume. For Instance Mr Katsulas played a rather humanish Tomalok on Startrek, whereas his G'Kar had a pretty intense costume.

Is this done intentionally, or just coincidence?

Comment Re:Keyword; simulated (Score 2) 68

Good distinctions, but a point of clarification. Worms are self contained and target Systems (OSs, embedded devices of particular make, etc). They contain all the code necessary to spread from system to system using whatever media they are designed for. Viruses target applications with communciations capabilities. A spam virus for instance generally targets an email client for instance. the virus requires the vulnerable application to transmit itself from vulnerable system to vulnerable system however; that code is not contained in the virus. Viruses do not require human interaction as a rule (some do, some don't). Automatic application updates and hardened code on the few types of applications capable of supporting a virus, have largely made them extinct. Trojans DO require human intervention, but are the most flexible. Worms and Viruses are peer-to-peer only, whereas Trojans are client-server. For instance Drive By Download attacks from malicious web sites are now the infection-vector of choice these days, because it requires as little human interaction as possible. The malware described here, would be a worm, because it is spreading of its own accord, and does not target a specific communications application.

Comment resume 2005 levels (Score 1) 564

in 2004, most people didn't need a PC, and one unit would service 5 or more people. then there came facebook and services like it, and with it, PC sales soared. people only used them to consume content however, so for the most part, a general purpose PC was more machine than they needed.

Now that we have Smartphones, and tablets, and internet connected TVs, and all manner of other cheap devices for consumption, only the content creators need full PCs.

The desktop isn't going away, but the inflated market must shrink back to its previous levels before the sales numbers will stop falling.

Comment Re:How about warrants with probable cause? (Score 2) 509

No, they are claiming that they use statistical methods to attempt to exclude american citizens, but expect to collect their data anyway. additionally they implement policies that make american citizens fair game if there is any associational link to a foreign national with less than 3 degrees of seperation. this standard includes the vast majority of the american people. Programs XKeyScore and Nebulus (the program that notices when you say 'bomb' on the phone) can't establish the nationality of the parties even if they wanted to.

the biggest issue however, is that NSA analysts have been giving the data to domestic law enforcement agencies with no warrent, and that data is being introduced in non-terror prosecutions of american citizens, per the last batch of data that DNI released (declassified FISC findings).

When a power is used for specific elevated conditions for a period of time, law enforcement and the judicary become comfortable with it, and over time, the bar to use those elevated powers lowers. For instance, in London, after installing hundreds of CCTV cameras, which had no impact on serious crime, local town councils started using these terror-justified feeds to start prosecuting locals for not picking up after their dogs.

Allowing this program to continue, gaurentees that the liberties I knew as a child will be gone forever.

Comment Freedom isn't free (Score 5, Insightful) 509

The cost of freedom is that you must acknowledge that you must remain vulnerable to attack. Otherwise you destroy the freedom you are supposedly trying to protect.

In this case, that the job exists at all is the problem. That makes the solution simple and elegant. The only remaining issue, is accepting that everytime somthing bad happens, we are necessarilly limited in our ability prevent it.

The government cannot ever make me safe. all they can do is protect my liberties, and over the last 12 years they have been doing a piss-poor job of it.

Comment Re:Quality vs quantity (Score 1) 196

Quite true. additionally our economy can only support so many super-profitable acts. There could only be one Elvis, and at the time there were only a handful of popular/profitable musical groups. Now they try to manufacture a thousand Elvis's, but don't want to subdivide the pie. You can have one king, or you can have dozens of dukes, but you can't have both, and you certainly can't have thousands of different acts and still expect any of them to make decent money.

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...