Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Well duh! (Score 1) 167

There is a difference between electromagnetic radiation and ionizing radiation.

One is just radio or light waves, and is harmless below certain amplitudes that you don't see in common products. The other is bits of atoms flying off, causing biological changes on a cellular level, and those materials are highly restricted.

UV, X-, and Gama-rays are all all both electromagnetic and ionizing. Those properties are not mutually exclusive and ionizing radiation isn't exclusively "bits of atoms flying off".

Which category do you think a television falls into?

CRT televisions use high speed electrons to excite phosphors to emit light. As a side effect a small amount of X-rays are emitted. For this reason CRT screens are made of leaded glass. This blocks most, but not all, of the X-rays. So for most of the history of television, watching TV meant being irradiated a small but measurable amount.

Comment Re:Good thing it's dead (Score 1) 138

Your browser appears to have a misfunctioning spellchecker which has "corrected" HL7 into XML.

HL7v3/CDA, however, *is* XML-based. Having both written HL7 parsers and worked with HAPI, I have to say it's much easier to tune your XML stack once and point it at some XSDs.

Neither one is as bad as X12 though :p

Comment Re:Nope (Score 1) 727

in a document clearly repudiating the armistice agreement [kcna.co.jp] and claiming that the ongoing exercises are already "an open declaration of a war against the DPRK".

They are insane attention grabbers and that ignoring them (whilst trying to find ways to react to their possibly going even more insane and actually attacking) is the right thing but let's not lie about this please.

Just for a moment imagine that China and and North Korea got together and did some military exercises simulating the invasion of the US off of the California coast. What do you suppose the rhetoric out of Washington would be? I think North Korea's leadership is cruel and evil and totalitarian, but they are not behaving irrationally. They are behaving exactly like any other country would.

Comment Re:Place item in bagging area (Score 1) 294

This is the way it is in England as my American wife found out when she stood there watching the groceries pile up the first time she went shopping there. To me it makes sense. I have nothing better to do and I have more of an interest in making sure my groceries are stacked properly.

Add managing a screaming kid or two and you will appreciate the convenience and added efficiency a dedicated bagger brings to the equation ;)

Comment Re:Two factor authentication (Score 1) 538

Most places that use a picture aren't using it as a second authentication factor. It's an anti-phishing countermeasure. The idea is that you pick a picture when you set up your account and then every time you log in you should see your picture. If you don't see your picture, then you know you aren't really looking at your bank's (or whatever) web site, but an attack site. Of course it's not an effective countermeasure against attack sites that use your credentials to connect to the real bank site in the background, get the picture from the bank and then show you what you expected to see. But it does prevent some phishing.

Why wouldn't the phishing site just MitM this? Phishing site collects your username, sends your username to bank, gets password screen HTML back with picture and pass phrase, echos picture and pass phrase to you.

Comment Re:Good reason for it to be illegal (Score 4, Insightful) 383

With one more stipulation: No Touch Screens. Use real physical buttons next to an LCD display, like we've all used on ATMs for decades now. Touch screens go out of calibration, leading to opportunities for all sorts of shenanigans.

Funny thing about those old ATMs with the physical buttons: many times I'd walk into the ATM to find the screen had physically shifted in its housing so those nice physical buttons no longer matched up with the on screen choices. In fact it wasn't uncommon for the buttons to be exactly between the choices. Other times the actual display would be set back and behind such a thick layer of shatter-proof glass that what button lined up with what choice depended on your viewing angle.

The point is that *any* voting machine is going to need proper calibration. A touch screen as an input modality isn't necessarily bad, but you can botch the implementation just like with any other tech.

Star Wars Prequels

Disney to Acquire Lucasfilm, Star Wars Episode 7 Due In 2015 816

Jason Levine writes "Disney will acquire Lucasfilm, including the Star Wars trilogy. Additionally, Star Wars: Episode 7 is due to be released in 2015, with more feature films on the way. George Lucas said, 'For the past 35 years, one of my greatest pleasures has been to see Star Wars passed from one generation to the next. It's now time for me to pass Star Wars on to a new generation of filmmakers. I've always believed that Star Wars could live beyond me, and I thought it was important to set up the transition during my lifetime. I'm confident that with Lucasfilm under the leadership of Kathleen Kennedy, and having a new home within the Disney organization, Star Wars will certainly live on and flourish for many generations to come.'"

Comment Hands off the production environment. (Score 1) 288

Ideally, the systems management team should handle install into staging and production environments. They have worked with the dev team to establish a standard environment. The dev team should take time to understand the environment where the application will be deployed, and the systems team should understand the application well enough to diagnose basic problems.

Unfortunately, in my experience, cost cutting means that the installation and maintenance is done by an IT contractor pulled from a rotating pool in Bangalore who doesn't know how the application works. They usually can't tell a software bug in our code, from a missed firewall configuration step, from bad permissions in the filesystem, from a bad load balancer config... the list goes on. That's when I get pulled in. Of course I don't have permissions to do any useful diagnosis, and they are so fresh out of training they don't know how to execute a TCP dump. ...and that's why I don't do J2EE development anymore :)

Slashdot Top Deals

The best book on programming for the layman is "Alice in Wonderland"; but that's because it's the best book on anything for the layman.

Working...