Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment How does that work, again? (Score 1) 70

After reading the article I still don't quite get how this technique works.

From the article: âoewhen the color is the same, the mirror edge disappears."

Come again? One of the accompanying photos shows Mr. Jenison with a mirror near his eye and a paintbrush in his hand.

But I still don't understand what's happening here.

Comment Too bad it's a C++ library... (Score 3, Interesting) 147

There's nothing wrong with C++. However, I do my programing in C (without the ++), and would love have something like this available that I could link to my C programs.

GTK+ works fine in its way, but it moves way too fast for my taste. Function x is deprecated, use function y instead. Function y is deprecated, use function z along with function z(1) now. Ok, it's great that you're improving that thing, but not so great for a guy like me who wants to write an application today and use it for the next ten or twenty years without having to re-invent the wheel over and over again.

Since I have no particular desire to learn C++, I now do most of my programming using ncurses to handle the screen, keyboard and (occasionally) mouse. Ncurses is a Text-UI rather than a GUI, but just like the C language itself, it works very well,it hasn't changed in many years, and it suits me fine.

A slow-moving GUI like wxwidgets would be a wonderful thing to add to my toolbox, if it was a C library. *sigh*

Comment No point pussy-footing around (Score 5, Insightful) 128

There's no point in pussy-footing around this. It's obvious that RSA was either forced or "rewarded" into using an insecure method. And that they knew it at the time (because they are cryptographers and because they don't live in the bottom of a well.)

Therefore, RSA has proven themselves untrustworthy at best, corrupt at worst, and quite likely both.

The question is what to do next? Rip out everything RSA in all infrastructure and replace it with something that works appears to be the best approach, but how should that be done and what should it be replaced with? And, most importantly, how can we verify that replacement?

Comment Re:The NSA controlled the servers (Score 5, Interesting) 292

TFA sez "The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway."
 
So it's not clear if those addresses belong to the FBI, the CIA, NSA, or anyone else.
 
Is this even "legal" on the Internet? Perhaps those IP addresses should be reclaimed and reassigned by ARIN since "nobody" is using them and IPV4 addresses are now in short (nonexistent) supply.

Comment Re:Why not, if other things can flourish also? (Score 2) 193

large areas currently under cultivation in the United States cease to arable, or at least cheaply arable. At the same time, Canada gains large amounts of arable land much farther north.
 
There are factors other than mere temperature that go into whether land can be used for growing crops. Much of the soil north of where Canadian farmers currently grow their crops is either very poor or next-to-nonexistent. The Canadian Shield consists largely of volcanic rock. You can't grow a crop in that even if the temperature appears to allow it.

Submission + - Canadian military developing stealth snowmobile (www.cbc.ca)

innocent_white_lamb writes: The Canadian military is currently testing a $620,000 hybrid-electric stealth snowmobile. Testing includes speed, towing capacity, endurance, mobility, usability, and of course, noise emissions.

The testing and most other information about the stealth snowmobile is secret and very little information has been released other than the fact that it does exist. One document reads ""The noise level of an internal combustion engine cannot be reduced to an acceptable level for missions where covertness may be required, especially given the increased propagation of sound in cold, dry, Arctic air". Therefore, National Defence's research agency is "pursuing the development of a 'silent' snowmobile for winter operations in Canada, specifically in the Arctic."

Michael Byers, an Arctic policy expert, questions the need for a stealth snowmobile. "I don't see a whole lot of evidence that criminals and terrorists are scooting around Canada's North on snowmobiles and that we have to sneak up on them," he said.

Submission + - 1-800-Got-Junk using data analytics to combat fraud (theglobeandmail.com)

innocent_white_lamb writes: "For [the] junk removal business, it’s financial fraud that poses the greatest danger. Money is frequently moving between customers, truck drivers and corporate staff, and cash can go missing if people aren’t paying attention." 1-800-Got-Junk uses advanced software to analyze where the money is going. "For instance, Junk Net can quickly calculate the average job size, average job transaction cost and average dumping costs over a 30-day period. If the job size and transaction costs fall but the dumping costs remain the same, then there’s a chance that money is going missing."

Comment Re:Disappearance of E-Ink (Score 1) 323

When I read a book I read it at varying speeds. Some stuff I read very quickly, but clever phrasing or a complex description causes me to slow down. Sometimes I re-read the same paragraph or sentence several times either to figure out what the author is saying or simply to continue the amusement.

Auto-scrolling might be ok for some things, but not for book reading.

Comment Re:From the ashes into the fire? (Score 1) 253

Several years ago, my brother gave his little girl, who was about 3 years old at the time, an old Apple II computer that she could bang on so she wouldn't touch his machines.

My mother was there one day when the little girl was banging on that old computer. She said, "What are you doing?" and the little girl replied, "I'm hacking code, just like daddy!"

Slashdot Top Deals

"Sometimes insanity is the only alternative" -- button at a Science Fiction convention.

Working...