Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Glass? (Score 1) 175

There's increased costs, for maintenance (regular cleaning) and replacement (it still cracks when damaged, even if it stays in one piece).

Glass by itself isn't nearly as strong as steel, so it would either need bollards or a steel fence to protect against vehicles. Vehicles crashing through gates can be very bad.

Bollards may not be a good idea though, because a smaller vehicle such as a motorcycle might still be able to go between the bollards and break through the glass.

Perhaps the lower half of the fence could be the current steel fence (to protect against large and small vehicles), and the upper half could be glass (to reduce the aesthetic impact).

Comment Re:objective list (Score 4, Informative) 231

Wikipedia is very slanted towards recent and Eurocentric events.

Yes, this is somewhat explainable in terms of how much literature has been produced over time, and how much literature is accessible online. Wikipedia isn't the problem here, the problem is that the authors didn't acknowledge this issue, let alone attempt to account for it in their computation. (though it's a long paper, so I might have missed where it was discussed)

Comment Re:New thing same as the old thing (Score 1) 80

3D scanning is really important. Whenever we figure out how to do it faster/cheaper/easier, that's important. 3D scanning is useful for all kinds of future activities, from the maker movement (3D printer + 3D scanner = 3D copier), to gaming (eg. Kinect), to driving (eg. DARPA Grand Challenge), to mobile devices (eg. Google Glasses).

Comment Re:of course... (Score 5, Insightful) 280

whose idea was it to use metal detectors as gun detectors? Time & technology change... and detection methods must change with them.

If non-metallic guns were truly viable, they would have been used 20 years ago to sneak past metal detectors and kill judges and politicians and airplane pilots. Plastic manufacturing has been around for a long time, the only thing 3D printers do is reduce the cost. There are well-funded spy agencies and a few individuals who would have paid hundreds of thousands of dollars for a single gun. And yet none has materialized: [1] [2] [3]

Comment Re:liability (Score 1) 68

I can only speak to how my local hackerspace handles it, I don't know how others do.

At this one, most power tools are owned by individual members. If someone gets hurt and wants to sue someone, the only person they can sue is the individual owner. On one hand, this sucks because it puts all the burden on individuals' shoulders. On the other hand, it decreases the chance that someone tries to pay legal fees from prospective damage awards, because damages are likely to be very small, so it reduces the chance someone will lawyer up.

Our hackerspace hasn't had any incidents yet, so I don't know how well this plays out in practice.

Comment RTFM (Score 4, Interesting) 79

The goal is to "engineer software-based radios that transmit data faster than a competitor using identical hardware".

The goal isn't to develop fancy new hardware, or to use an overwhelming amount of power. The goal is to develop fancy new software.

With frequency-hopping and time-hopping techniques, if you can intelligently adapt to the local interference, and transmit in the time and frequency gaps where the interference doesn't occur, then you can transmit more data for the same amount of power. That's the goal.

Comment extracting keys from RAM (Score 4, Informative) 268

This tool extracts the keys from RAM dumps. There are free tools that do this too, of course.

But isn't it difficult to get a RAM dump, you say? Not really:

  • Hibernating a computer writes this data to disk. Starting in Windows 8, "shutdown" actually writes some hibernate data by default.
  • VMs also have their own suspend functionality that does a RAM dump, as well as non-SAN VM migration.
  • Firewire ports actually allow devices to scan RAM of the machine they're connected to.
  • Obviously, if you have access to a live machine, you can get the keys directly from RAM.

Slashdot Top Deals

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...