Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment space? (Score 1) 82

The basic idea is appealing, but surely you could do it better by rfid tagging the tools or something. The toolbox seems totally impractical:
1)You have to get out your phone/tablet to open my toolbox. Don't stick your phone charger in there!
2)This is super wasteful of space.The entire top tray of the box now holds 2 wrenches, 2 sockets, a volt meter, and a couple of things I can't really identify.Mine, without all the fancy foam and sensors holds a socket SET, a wrench SET, a volt meter, and some other random stuff. Now, maybe if you're building special task specific kits, that's not a big deal, but if all your tool boxes triple in size, surely at some point that turns into a health and safety concern for the technicians that have to drag the things around...

Comment Applicability (Score 1) 153

I'll be the first to say that the autonomous killing machines scare me. But I don't think the 3 laws have anything to do with anything either. The 3 laws are based on having something that is smart enough to actually comprehend what it is looking at (a human) and what it is doing (hurting that human) As far as I know, all current "killer robots" are just computers following a set of rules fed in by some programmer, which is not the same thing at all.

Comment Re:Uhm... No, it's just spam. (Score 1) 340

I'm sure there's some stuff like what you're talking about out there but most of phishing and scam crap I've seen seems to stay separate.

Facebook attacks stay in the facebook realm, spreading through sketchy timeline posts and using FB connect, and email attacks stay in email realm, attacking via addressbooks and sketchy email links.

this is just from my personal exerience though. milage may vary

Comment Re:Uhm... No, it's just spam. (Score 4, Insightful) 340

When the from and to names are people who genuinely know each other, it generally means that one or the other of them's address book has been stolen. Less frequenty, it may mean that a third party (that they both know) had their address book stolen. Subby doesn't think his address book has been stolen, so that leaves the relative as the most likely victim.

Who we think the most likely victim is maybe be another story, but his logic seems fairly sound to me, if we accept the initial assumptions...

Comment Re:Who is receiving the money? (Score 1) 349

Actually, it does. The people in the recordings do in fact receive royalty cheques from SOCAN. Mind you, I'm not sure exactly how fair the split is, or how much of it goes to "administrative fees"

The other thing that isn't very clear from the article is that this system is NOT new. SOCAN has always collected fees for radio play, and recorded music at public functions, shows, etc in Canada. All that's happened now is that the fee structure for certain types of event has been updated. (simplified, I think?)

Comment Use smarthost mode (Score 1) 459

Most mail server software is capable of routing the outbound mail through the isp's mail server in such a way that it gets listed as the origin. You get to keep running your mail server, but the spam labelling and port blocking issues all go away.

The only time this is an issue is if the isp's mail servers do some kind of filtering or mangling, but most of the ones I've dealt with don't

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...