Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Preserved 298-Million-Year-Old Forest Discovered (inhabitat.com)

An anonymous reader writes: Scientists just discovered an incredibly preserved 298-million-year-old forest buried deep beneath a coal mine in Wuda, China. The ancient forest in Inner Mongolia was preserved by volcanic ash, much like Pompeii. Both Chinese and American scientists are marveling at finds of 80-foot-tall trees from the Permian Era, which provide an incredible snapshot of plant life 298 million years ago.
Security

Submission + - DHS Budget Includes No New Airport Body Scanners (epic.org)

OverTheGeicoE writes: The Electronic Privacy Information Center has been examining the White House's proposed budget for Department of Homeland Security for 2013, and they point out that it doesn't include any money for additional airport body scanners for TSA. Did the recent scandal involving TSA workers targeting women for scans make the White House realize that TSA is a national embarrassment? Does the executive branch finally understand the questionable safety and effectiveness of these devices? Or does DHS just think it has enough scanners once TSA installs the 250 new scanners in this year's budget?

Submission + - Pico Projector That Adapts to Surface, Can Use Random Objects as Input Devices (engadget.com)

jpwilliams writes: This tiny projector can use random surfaces to project an image. Using a webcam, it adapts to the surface, not just by adjusting keystone, but also following that surface and displaying different amounts of information (in certain cases). The guy in the video also uses a coffee mug as an app changer.
Spam

Submission + - How Mailinator compresses its email stream by 90% (blogspot.com)

An anonymous reader writes: Creator of Mailinator, Paul Tyma, writes about a greedy algorithm to analyze the huge amount of email Mailinator receives and finds ways to reduce its memory footprint by 90%.

Comment Re:Impractical to Microsoft, MS also send invalid (Score 1, Interesting) 258

If it's something that can be exploited then it's a bug. Any security/privacy feature of the browser should be in the control of the user not at the mercy of the http server.

If it was something like a buffer overflow would microsoft still complain how that bad guys should stop sending invalid data packets to the browser?

I don't like googles extensive tracking either, but complaining that it's not using some unpopular protocol is just silly. If you are going to implement privacy control then make it work regardless of the information that the site may send or just don't bother.

Comment Interfaces (Score 1) 5

I think what you're looking for are not generics, but interfaces like they are implemented in Google Go!. (http://golang.org/doc/go_faq.html#implements_interface)

In go when you define a interface to have a certain method/signature any existing class which happens to have those method signatures are automatically considerd to be implementing those interfaces.

So in GO, you would define a interface which has the indexer method, and make your functions/classes accept that interface rather than a base class, and it would automatically be compatible with DataRow and DataReaders.

Unfortunately this is not possible in C# and microsoft had not defined a common interface for DataReader for DataRow indexer methods so this is not possible to do in c#.

But so far atleast C# and MS have been very good in evolving the langugae features which are usefull, so who knows maybe it'll be there in .NET 5/6.

Comment Re:Just Might Take Them Up On It (Score 5, Insightful) 152

Remember the deported British twitters from America? They too thought that their information was no value to anyone and that it wasn't important. Well the Homeland security proved them wrong. How little you think about your details are irrelevant. Its what others think about them that matters. You might be absolutely innocent but if your browsing habits or facbook posts indicate to a possible power (goverment or otherwise) that you are a suspect then you'll have a hard time proving your innocence. You might be able to do that but is the hassle worth a couple of hundred dollars?

Comment Re:meh (Score 1) 168

Anyone remember when CD-ROMs were just going mainstream? Remember all the multimedia encyclopedias that were available? Remember how cool it was to look up an article on something and be able to watch a video or hear a speech or something? Yeah... Notice how those have pretty much stopped being popular?

Yeah, funny thing, the Internet came along and wiped out the market for these.

I really don't think it was simply the Internet that killed those multimedia encyclopedias.

That would imply that what had died was specifically the multimedia encyclopedia on CD-ROM... But I'm not aware of a whole lot of multimedia encyclopedia websites out there. The obvious one is Wikipedia... But most of those articles are just text with a few images - nothing printed page couldn't deliver.

Or you could suggest that the Internet as a whole has become the multimedia encyclopedia... Type your search into Google and you get tons of answers from all over the place - often with videos available if you want them. But most of the useful information is again text with some simple images.

If you recall those old multimedia encyclopedias, they were chock-full of completely gratuitous multimedia. Stuff that did absolutely nothing to facilitate learning. The whole point was simply show off the fact that you could have video and everything embedded in your encyclopedia.

Comment Re:What about examples from other smugglers?? (Score 2, Interesting) 480

Trained dogs and handlers are the best bet.

Dogs can be trained to not only detect certain substances but also detect fear responses. So something concealed in a body might make it through but the dog may still alert to the fear response so the person can be pulled aside for a more thorough search. Of course dogs aren't high tech so they can't be a solution in the US.

Comment Here comes another one, just like the other one (Score 1) 361

Any bets on how long it will take to crack this ill-considered DRM scheme? My guess is certainly less than 6 months from release. Why so long? Because they are likely using more robust encryption and it will take awhile to find the holes in it. In any case, the studios will still have to release content on DVDs for a long time, and that means it is less than 1 hour from release to wide availability on the internet... So, what does this buy the studios, content creators, actors, et al? More $$? NOT! Wider distribution of their work? Right... Can't get wider than universal access, which is what we pretty much have now. Such narrow-minded, short-sighted mavens of moronity should just shoot themselves and put us all out of their misery!

Slashdot Top Deals

Real Users know your home telephone number.

Working...