Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Earth

MIT Unveils Portable, Solar-Powered Water Desalination System 117

An anonymous reader writes "A team from the Massachusetts Institute of Technology's Field and Space Robotic Laboratory has designed a new solar-powered water desalination system to provide drinking water to disaster zones and disadvantaged parts of the planet. Desalination systems often require a lot of energy and a large infrastructure to support them, but MIT's compact system is able to cope due to its ingenious design. The system's photovoltaic panel is able to generate power for the pump, which in turn pushes undrinkable seawater through a permeable membrane. MIT's prototype can reportedly produce 80 gallons of drinking water per day, depending on weather conditions."

Comment FAILURE (TM) (Score 0) 86

Step one, outsource everything

Several things explain an 18 yr old in leadership position quite adequately.

1. "Broken oath of office." (FIOS Splitters, Failure to regulate the monetary sys, Torture, Spying, data hacking, fucking bs, hell on earth pain weapons, and abuse of electronics and physics, or training young minds with unconstitutional bullshit)

2. "Brainwashed Propaganda Replacing the United States Constitution and Bill of Rights" (MIAC REPORT, UN, UNEP, IMF, IPCC, TC, PNAC, AIPAC, CFR, CARBON TAX/POPULATION CONTROL (un/unep/ipcc/imf), FLORIDE(local), VACCINES(cdc/who/local), AND A ZILLION OTHER CORPORATIONS YOU'D BEST MAKE SURE YOUR FUCKIN CANDIDATE ISN'T AFFILIATED WITH, ALONG WITH THE DANGEROUS CORPORATE MEDIA CULT OWNING 90% OF THE FUCKING PUBLIC SPECTRUM-SHITTING ON YOUR INTELLIGENCE)

3. "Corruption protected by State Secrets" catch 22, and "No Expedited, Clearly Written Procedures, for taking out a Oath Breaker" (not to be confused with this never-ending-unconstitutional-undeclared-fucking-invisible-war-on-terror)

Comment Re:He doesn't want to be "forced" to host at YouTu (Score 0) 253

Frankly in the current discussion we are obviously talking about video. From the patents on the MPEG to everything else and now we need to fight this fight.

So, why hasn't video bandwidth been made cheap enough for Mr. Miller, or anyone else then? Why isn't the speed flying? You've dug up our streets, and made them crap fun for bicycles, your easement to every frigging private property sign already exists!

Why is there still dark fiber?

Comment Re:This all hinges on what "Net Neutrality" is. (Score 0) 253

I'll allow you to separate "internet" from "web."

As long as we understand Paid, "Internet access" is all 64K ports available on TCPIP/UDP/IPX and all the other net protocols connected to others of like kind at a given rate of speed. Otherwise your telling me I am getting a bunch of extra packets for free, which is of course complete horse-pucky.

Comment Re:Balance = Checkmate of the Evil on both sides (Score 0) 253

Then again you'll probably mark me troll.

just so we're clear first, myspace-cn was the account I chose (After my much older account got the password lost) and at the time the reason was because of the hypocrisy over myspace creating myspace-cn (which is now myspace.cn) and no I didn't forget the death threats from china.

Comment Balance = Checkmate of the Evil on both sides (Score 0) 253

I don't want "premium services" with high cost having authority over the internet, or a death spiral TOS/AUP

AND

I don't want FCC mission creep, destroying everything in the end by having authority over the internet, and then passing even more authority based on some BS cyber (sic) war.

Points
1._ Keep in mind the FCC has failed their existing mission, and indeed has removed their original mission statement. Why trust them to take more, when they already ignore their engineers working in the public interest, in leiu of selling frequencies willy-nilly regardless of health or safety and instead embrace the back door deal making to set the positions to screw the public. They have FAILED to manage the spectrum in the public interest as it exists NOW.. Until they prove what they have I say no more authority over your and my networks. They already screwed up your and my spectrum.

2._ Keep in mind it's been awhile since my ISP +Domains +Hosting bills increased. You and I know they will have too with this bankster monetary terrorism destroying us all, ISP and user alike.

The Internet

Net Neutrality — Threat Or Menace? 253

Roblimo writes "I had a dream. In it, I was CEO of a large telecommunications company that was also a major broadband Internet provider and all five members of the FCC were stabbing me with pitchforks and yelling in my ear that my company would be treated as a common carrier, not as a special entity they couldn't regulate. That's when I woke up..."

Comment Re:Red Flag (Score 0) 523

Secrets with no accountability, no oversight, being hidden by oath breakers to hide crime, murder, and theft, is tyranny.

There should be an argument that the original docs which were leaked were in fact the soldier/leak was simply upholding his oath, by exposing unconstitutional corruption by oath breakers.
Nobody has clarified the consequences of breaking their oath, and they sure the fuck haven't made it have consequences have any teeth, even when it's clear a leader breaks it, and they haven't given soldiers the tools needed to uphold their sworn oath. Perhaps then we could get the oath's consequences clarified, and some real criminals arrested instead of state secrets being used to hide nasty shit?

Comment Re:knee-jerk reactions without reading (Score 1) 195

The end game is to eliminate the anonymous. No more whistle blowers because nobody can be anonymous.

Oh you think I am full of conspiracy?

National Strategy for Trusted IDs in Cyberspace (NSTIC) (June 25, 2010 draft)

Goal 1: Develop a comprehensive Identity Ecosystem Framework
Goal 2: Build and implement an interoperable identity infrastructure aligned with the
Identity Ecosystem Framework
Goal 3: Enhance confidence and willingness to participate in the Identity Ecosystem
Goal 4: Ensure the long-term success of the Identity Ecosystem

Action 1: Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated
with Achieving the Goals of the Strategy
Action 2: Develop a Shared, Comprehensive Public/Private Sector Implementation Plan
Action 3: Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with
the Identity Ecosystem
Action 4: Work Among the Public/Private Sectors to Implement Enhanced Privacy
Protections
Action 5: Coordinate the Development and Refinement of Risk Models and Interoperability
Standards
Action 6: Address the Liability Concerns of Service Providers and Individuals
Action 7: Perform Outreach and Awareness Across all Stakeholders
Action 8: Continue Collaborating in International Efforts
Action 9: Identify Other Means to Drive Adoption of the Identity Ecosystem across the
Nation

Envision It!
An individual voluntarily requests a smart identity card from her home state. The individual chooses to use the card to authenticate herself for a variety of online services, including:
  Credit card purchases,
  Online banking,
  Accessing electronic health care records,
  Securely accessing her personal laptop computer,
Anonymously posting blog entries, and
  Logging onto Internet email services using a
pseudonym.

Yeah, I am talking conspiracy, conspiracy fact.
Envision It!
A power utility remotely manages Smart Grid software
deployed on an electricity meter. Trusted hardware
modules and secure authentication between the power
company and the meter prevent deploying fraudulent
meters as a way to steal electricity; ensure that the
hardware and software configurations are correct; and
restrict meter software to only run on authorized meters.
Likewise, the meter trusts that instructions and periodic
software upgrades come from the power company.
These trusted interactions reduce the threat of fraudulent
activity and deployment of malware within the Smart Grid.

The Identity Ecosystem is composed of three layers:
  Execution Layer – Conducts transactions in accordance with the rules of the Identity
Ecosystem.
  Management Layer – Applies and enforces the rules for participants in the Identity
Ecosystem.
  Governance Layer – Establishes the rules required to function within the Identity
Ecosystem.

So the system will not be for Truth, Free Speech, Whistle Blowing, it is designed for

Validated attributes
Validated Identity
Certified Credentials

Perhaps it's now time to say fuck it all, and stop buying computers, stop building websites, stop shopping online, and go back to being quiet like the 1970's.

That's the endgame. Fuck off if you can't swallow it.

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...