Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Too Few (Score 1) 300

As far as I can tell, the whole poll is off by an order of magnitude :).

I'd have to have some kind of plugin to tell me how many tabs I have open.

I had a similar issue. I saved all tabs as a bookmarks folder, then opened the folder and saw the number of items.

Comment Re:Spectrum? (Score 5, Informative) 128

I do not know what is the limit of the "wireless spectrum" if there is any. Before this limit is reached, I guess just updating all hardware gears that transmit/route more efficiently is all that is needed.

The limit is given precisely by Shannon's Law, which gives a mathematical limit on the amount of data that can be sent over a given amount of bandwidth. Spectral Efficiency is the amount of bandwidth available in a given wireless spectrum.

Cellphones

Florida Supreme Court Rules Police Need Warrant To Search Cell Phones 107

An anonymous reader writes "In a case stemming from a Jacksonville burglary, the Florida Supreme Court ruled 5-2 Thursday that police must get a search warrant before searching someone's cell phone. 'At this time, we cannot ignore that a significant portion of our population relies upon cell phones for email communications, text message information, scheduling, and banking,' read the majority opinion (PDF), authored by Justice Fred Lewis. 'The position of the dissent, which would permit the search here even though no issue existed with regard to officer safety or evidence preservation, is both contrary to, and the antithesis of, the fundamental protections against government intrusion guaranteed by the Fourth Amendment.'"

Comment Re:I use it for linux distributions (Score 1) 302

How would you use broadcast or multicast to distribute an OS? Call me ignorant, but how would you do that in practice?

I used to work in a computer lab at the university I went to. We used Ghost to do exactly that. All the computers in the lab (a few hundred PCs) were booted up off a special floppy (or later, cd) that started up Ghost in listen mode. Then, the central server used multicast to send the OS image to all the clients at once. It took less than an hour, and that was with 100Mb/s Ethernet.

Comment Re:I use it for linux distributions (Score 1) 302

Here's a question:
To know which bits have changed, doesn't it need to compare the two files. How does this result in bandwidth savings?

No, because it only sends a hash of the data. The other side computes a hash of it's data, and if the hashes match, the transfer is complete. If The hashes don't match, there is a rolling hash that can verify a partial match, and send only the changed data. There's more info here

Canada

RCMP Says Terror Plot Against Canadian Trains Thwarted 170

An anonymous reader writes "Two men were arrested in Canada, accused of conspiring to carry out an 'al-Qaeda supported' attack against a VIA passenger train in the Greater Toronto Area. The arrests were products of 'extensive' co-operation between Canadian and US intelligence agencies, who had been investigating the plot since August 2012." From this article, it's not clear whether any actual al-Qaeda support was forthcoming, or whether the accused plotters merely thought there was, by means of an FBI sting operation, as in the 2006 case in Florida.

Comment Re:Can laser printing create nano-size circuits ? (Score 1) 83

"For example, the latest Intel's microchip, the Ivy Bridge (and soon the Haswell) have circuit-sizes as small as 22nm"

I'll bet on the traces being even smaller than that. You must mean transistor size.

It means feature size. A feature can be part of a transistor, or a circuit trace, or a bunch of other things.

Science

Nanoscale 3D Printer Now Commercially Available 127

kkleiner writes "Now the field of 3D printing has advanced so far that a company called Nanoscribe is offering one of the first commercially available 3D printers for the nanoscale. Nanoscribe's machine can produce tiny 3D printed objects that are only the width of a single human hair. Amazingly this includes 3D printed objects such as spaceships, micro needles, or even the empire state building."

Comment Re:Arcfour (Score 1) 90

Oh, wait, it's the arcfour key scheduling thing again.

This is an old arcfour weakness, not news. Everybody knows about it (and how to avoid it). The SSL people just never bothered to do it.

According to the slides, this attack works by exploiting a bias in the output of RC4, not the key schedule at all...

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...