Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Somewhat impressive (Score 5, Interesting) 160

A friend of mine (who's 15) and myself (I'm 28 with a CS degree) have a nearly working programmable 8-bit computer in Minecraft. ALU is done, all 256 bytes of memory are done, the instruction tape (made out of sand and glass, much like a punchcard) is done, etc. Another 20 someodd hours and we'll have all of the components connected together and the whole CPU completely done. It actually isn't as hard or take as much time as it may sound.

The most impressive thing about this video is that he did all of the math in BCD rather than just running it on a CPU. I already have multiplication (Booth's algorithm) and other operations programmed on our instruction set (we wrote an assembler and emulator outside of Minecraft to work out the kinks). I'd rather do the complex operations in software rather than laying gates and logic in the hardware.

I don't see how he has enough room for displays of that size. You'd need NxM worth of latches to sustain the pistons that drive the pixels as well as the appropriate muxers to select which pixels are turned on. Our 256 byte memory array is bigger than his entire calculator so I'm a bit skeptical that he isn't using some addons.

Comment Re:Obligatory checklist (Score 2) 173

( ) You read the paper
(X) You did not read the paper

The paper specifically covers merchant relationships with acquiring banks and credit processing. Purchases were done to track the credit processing. It isn't possible to anonymously spoof that. Also, stopping the transactions is more legislative than market-based.

Comment Re:It's the business model, stupid (Score 4, Informative) 173

Yes it is the business model of these banks. However, they are processing through a credit network (Visa / Mastercard) and consumers credit cards are backed by an issuing bank (think Chase, Citibank, etc). Either the credit network or the issuing bank can prevent the transaction without the cooperation of the shady acquiring bank. In fact, there is a "Merchant Category Code" (food, entertainment, drug stores and pharmacies, etc) that the credit network requires be on each transaction and requires to be correct. The credit network or issuing banks don't have to stop all credit transactions to the offending acquiring banks, they can just stop drug stores and pharmacies transactions. You should read the paper.

Comment Good riddance (Score 1) 315

Am I the only person who actually WANTS these companies to go out of business? I don't want my mother to be able to get the news via paper because it allows her to continue to ignore technology. If I could snap my fingers, new papers, record labels, the POTs phone companies, etc would go out of business. Bring on the technological Darwinism (and give it a push in the right direction if you can).
Australia

Fine-Structure Constant Maybe Not So Constant 105

Kilrah_il writes "The fine-structure constant, a coupling constant characterizing the strength of the electromagnetic interaction, has been measured lately by scientists from the University of New South Wales in Sydney, Australia and has been found to change slightly in light sent from quasars in galaxies as far back as 12 billion years ago. Although the results look promising, caution is advised: 'This would be sensational if it were real, but I'm still not completely convinced that it's not simply systematic errors' in the data, comments cosmologist Max Tegmark of MIT. Craig Hogan of the University of Chicago and the Fermi National Accelerator Laboratory in Batavia, Ill., acknowledges that 'it's a competent team and a thorough analysis.' But because the work has such profound implications for physics and requires such a high level of precision measurements, 'it needs more proof before we'll believe it.'"
Science

What Scientists Really Think About Religion 1123

Hugh Pickens writes "The Washington Post has a book review of Science and Religion: What Scientists Really Think by Rice University sociologist Elaine Ecklund, who spent four years doing a detailed survey of 1,646 scientists at elite American research universities. The study reveals that scientists often practice a closeted faith, worrying about how their peers would react to learning about their religious views. 'After four years of research, at least one thing became clear: Much of what we believe about the faith lives of elite scientists is wrong. The '"insurmountable hostility" between science and religion is a caricature, a thought-cliche, perhaps useful as a satire on groupthink, but hardly representative of reality,' writes Ecklund. Unsurprisingly, Ecklund found that 64% of scientists are either atheists (34%) or agnostic (30%). But only five of the 275 in-depth interviewees actively oppose religion; and even among the third who are atheists, many consider themselves 'spiritual.' 'According to the scientists I interviewed, the academy seems to have a "strong culture" that suppresses discussion about religion in many areas,' says Ecklund. 'To remove the perceived stigma, we would need to have more scientists talking openly about issues of religion, where such issues are particularly relevant to their discipline.'"
Moon

Decades-Old Soviet Reflector Spotted On the Moon 147

cremeglace writes "No one had seen a laser reflector that Soviet scientists had left on the moon almost 40 years ago, despite years of searching. Turns out searchers had been looking kilometers in the wrong direction. On 22 April, a team of physicists finally saw an incredibly faint flash from the reflector, which was ferried across the lunar surface by the Lunokhod 1 rover. The find comes thanks to NASA's Lunar Reconnaissance Orbiter, which last month imaged a large area where the rover was reported to have been left. Then the researchers, led by Tom Murphy of the University of California, San Diego, could search one football-field-size area at a time until they got a reflection."
Image

Girl Claims Price Scanner Gave Her Tourette's Syndrome Screenshot-sm 558

Attorneys for Dominica Juliano claim that she was burned and developed psychological problems after a store clerk aimed a hand-held price scanner at her face. Store attorneys say their scanners uses a harmless LED light and that the girl had serious health problems before she was scanned. From the article: "Dominica Juliano was 12 when she and her grandmother entered the Country Fair store in Erie in June 2004. A clerk allegedly called the girl 'grumpy' before flashing his hand-held bar code scanner over her face and telling her to smile. Attorneys for Ms. Juliano and her guardian say the girl was sensitive to light and burned, and later developed post-traumatic stress and Tourette's syndrome."
Security

Submission + - Help Nmap by filling out the SecTools.org survey! (nmap.org)

An anonymous reader writes: Help Nmap and the security world in general by filling out the 2010 SecTools.org survey! Results from this survey help the security community discover new tools, improve old ones, and gives everyone a chance to have their say. Besides being a great venue to learn about lesser known tools, this survey has lead to many of the advanced Nmap features including the Nmap Scripting Engine (which currently has well over 100 user-contributed scripts), Ndiff for comparing scans, the Zenmap interface, and, my personal favourite, despite a lack of votes, a script to check the availability of California vanity plates. With the Summer of Code projects coming up fast, this is your chance to shape Nmap's future!
Security

Submission + - Detecting critical Apple vulnerability with Nmap (cqure.net) 1

iago-vL writes: Patrik Karlsson, an Nmap developer, released a script today to detect a vulnerability in the Apple Filing Protocol (afp), CVS-2010-0533. This vulnerability is trivial to exploit and allows users to view files outside of public shares. He describes this vulnerability, which he discovered inadvertently while working on the Nmap Scripting Engine (NSE), as "strikingly similar to the famous Windows SMB filesharing vulnerability from 1995." Instructions on how to detect vulnerable systems using Nmap can be found in the post linked above.
Science

What Is Time? One Researcher Shares His Exploration 578

Physicist Sean Carroll has built up a bit of a name for himself by tackling one of the age old questions that no one has been able to fully explain: What is time? Earlier this month he gave an interview with Wired where he tried to explain his theories in layman's terms. "I’m trying to understand how time works. And that’s a huge question that has lots of different aspects to it. A lot of them go back to Einstein and spacetime and how we measure time using clocks. But the particular aspect of time that I’m interested in is the arrow of time: the fact that the past is different from the future. We remember the past but we don’t remember the future. There are irreversible processes. There are things that happen, like you turn an egg into an omelet, but you can’t turn an omelet into an egg."
Networking

Nmap 5.20 Released 36

ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"

Slashdot Top Deals

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...