Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:seems a lot like human vision to me (Score 1) 130

I think it was fairly clear what was going on, the neural networks latch on to conditions that are necessary but not sufficient because they found common characteristics of real images but never got any negative feedback. Like in the peacock photo the colors and pattern are similar, but clearly not in the shape of a bird but if it's never seen any non-bird peacock colored items how's the algorithm supposed to know? At any rate, it seems like the neural network is excessively focusing on one thing, maybe it would perform better if you divided up the work so one factor didn't become dominant. For example you send outlines to one network, textures to a second network and colors to a third network then using a fourth network to try learning which of the other three to listen to. After all, the brain has very clear centers too, it's not just one big chunk of goo.

Comment Re:Meaningless (Score 3, Interesting) 173

I'd love to be able to publish these statistics for our organization, (I'd estimate we have close to a quarter million drives in the field) but there is a big hurdle in the way: legal liability. If I was to say something negative about Western-Sea-Tachi drives, their lawyers might call our lawyers, and we could easily spend a million in court fees.

The thing I think would be interesting is that we have a completely arbitrary mix of drives, based on drive availability over the last 6 years or so. We also have a mix of different service companies who replace the drives in our workstations. Our contract is such that we don't control the brands, or even the sizes, as long as they meet or exceed our specs. As a service organization, they're responsible for picking the cheapest option for themselves. If our spec says "40 GB minimum", and they can't get anything smaller than 500GB, they'll buy those. If 1TB drives are cheaper than 500GB drives, they'll buy those. And if we're paying them $X/machine/year for service, they can do the reliability decisions on their own, so if they think some premium drives will last two years longer than stock drives, they might be able to avoid an extra service call on each machine if they spend $Y extra per drive. I expect these service organizations all have their preferred drives, but that's not data they're likely to share with their competitors on the service-contract circuit.

Comment Re:Man, am I old ... (Score 1) 173

I don't take pictures for "posterity", or for people who outlive me. I take pictures for me, and my family, for now. While I only have thousands of total pictures, (not 10,000 per month) I can still find the pictures I want on my hard drives. So when I die, if some future grandchild wants to trawl through those terabytes in the vain hopes of finding a good picture of a great-great-grandparent they never met, why should I care? What difference would that make to me, today, in how I choose to save or discard photos?

Comment Re:Hot Glue Guns (Score 1) 175

I do own one...

does it have plastic jams the way we have paper jams? Clogged nozzles? Low "ink" or whatever the consumable is?

Yes, yes, and yes.

Driver problems? Compatibility problems between template any my printer?

Surprinzingly, those are incredibly rare (free software is awesome).

Of course, they only make any economical sense if either you take utility out of just owning one (hobbyst tinkerer) or if you use it to print stuff that isn't mass produced at all.

Comment Re:black DNS? (Score 2) 388

uhm, regular old dotted quads (ip addrs) work fine and cannot be 'taken down' since they are not lookup based but topology based.

and even with ip alias and redirects, a dotted quad can be just about as good as a dns name. better, in some ways, since it cant' be faked like a name can, and does not require another fetch for the name->ipaddr lookup.

Comment Re:Does the job still get done? (Score 2) 688

If you can't trade your labor for food and people feel it's immoral to give you food, things will get very bad for a period of time.

Then, like the luddites (who saw they were screwed- requested training on the new machines and didn't get it), most of the losers will starve to death homeless and then 20 years later everyone will refer to them the way we refer to luddites today.

It's a fundamental challenge to capitalism.

In the short term- fewer jobs will mean capital requires even more hours of those who do have jobs and that means even higher unemployment.

Comment Re:Yeah, sure, any day now... (Score 3, Insightful) 65

I.e. if Comcast uses excess profits from everywhere else to provide ridiculously low priced service (aka walmart breaking into a new market until the competition goes out of business).. then Tucows can't win.

I think the lines need to be built by and maintained by one company or by the municipality and the service provided by competition.

There are good and bad points to excluding customers. It's ridiculous to run a 20 mile fiber to one person's house or even a group of five or six houses and charge them the same as everyone else. If they want cable- they should live with the rest of civilization.

OTH, left to their own devices providers will cut "less" profitable customers over "highly profitable" customers. Which doesn't work with something that is basically a public utility.

Comment Re:It's required (Score 1) 170

It was the 1960s. You were lucky to have a 300 baud modem, they wanted to save two bits by chopping the "19" off 1960 and encryption was regulated as munitions. Heck, even in the 1990s they wanted to restrict my browser to 40 bits so I didn't have "export grade" cryptography. I still hear cost for servers and battery life on clients as an argument for why sites don't move to HTTPS, The very idea to build the Internet with strong encryption by default was ridiculous on technical merits and I don't recall anyone even suggesting it so feel free to quote some sources.

Yes, MITM attacks are possible. But unlike wiretapping they're also detectable and I don't just mean in the theoretical sense. You could still use CAs to "boost" the credibility of an IP encryption key fingerprint (The CA signs my cert, I sign a message saying my IP uses fingerprint aa:bb:cc:dd:ee:ff), you can verify by proxy (connect to your server from friends/family/open wifi/proxy or ask a third party to what certificate fingerprint they see) or you can use in-band ad hoc verification. For example you're in a chat and it says at the top "finger print for this session is aa:bb:cc:dd:ee:ff" you might say "reverse it and you get ff:ee:dd:cc:bb:aa" or "third pair is a double c" or "last two are 255 in hex" as part of the conversation. Even better if it's voice communication, think they can MITM a buddy saying the fingerprint?

MITM only works if there's a protocol you can use to automatically block/filter any information about the key. For example imagine you take a photo, overlay the fingerprint semi-transparently and display it on your website. Now they have to create a very custom solution for your site to create an identical photo to replace it with. Transparent MITM in an interactive process - not just your cell phone checking your mail - is going to be really tough to do on a mass scale. It won't have the perfect theoretical characteristics, but it sure will work for most people most of the time.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...