Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Canon or Nikon (Score 1) 569

I mostly agree with this comment. You don't need a massive camera. Many wonderful well known photos have been taken with point and shoot cameras. What I don't agree with is point number 2... If your even simi-serious about taking photos you should learn the ins and outs of photography. Shutter speed, aperture, iso and framing the photo. It is not complex at all. While its true your not going to get an award winning photo every time 1 good picture out of 20-36 is piss poor... Take the time to set up your photo and be comfortable enough that you can manipulate your camera in a matter of seconds to get what your looking for. If your just guessing and pushing a button at random sure your only going to get 1:36 good photos. But you should shoot for 1:2-1:5 good Photos. As time goes on upgrade the camera. But its true, look for speed in the camera and settings. After you learn to shoot with manual settings and think in camera settings its difficult to go back.
Space

Submission + - Space Station to be Deorbited After 2020 (discovery.com)

astroengine writes: "Russia and its partners plan to plunge the International Space Station (ISS) into the ocean at the end of its life cycle after 2020 so as not to leave space junk, the space agency said on Wednesday.

"After it completes its existence, we will be forced to sink the ISS. It cannot be left in orbit, it's too complex, too heavy an object, it can leave behind lots of rubbish," said deputy head of Roskosmos space agency Vitaly Davydov."

Submission + - How to monitor your Internet data transfer amounts 1

Vrtigo1 writes: With many ISPs either already using bandwidth caps or talking about them, I was wondering how other Slashdot readers are keeping tabs on how much data is being transferred through their home Internet connections. None of the consumer routers I've used seem to make this information easily accessible. I'd like some way to see exactly how much data has been sent and received by the WAN port facing my ISP's modem so I can compare the numbers I get with the numbers they give me. I don't want to pay for their modem firmware updates and other network management traffic, so I'd like to see how the two numbers line up.
Government

Submission + - Tom Tom Sells GPS Info To Dutch Cops (itworld.com) 2

jfruhlinger writes: "As smartphones with GPS capabilities wear away at the dedicated GPS market, vendors like Tom Tom need to find new revenue streams. Tom Tom decided that it would be a good idea to "share" (i.e., sell) aggregated data from their users to Dutch law enforcement. The company claims that they assumed that the data would be used to improve traffic safety and road engineering, and were shocked, shocked to discover that instead the police used it to figure out the best places to put speed traps."
Desktops (Apple)

Submission + - OS X users hit by Google Images-based malware (macrumors.com)

An anonymous reader writes: Antivirus firm Intego today noted the discovery of new malware known as "MACDefender" targeting Mac OS X users via Safari. According to the report, the malware appears to be being deployed via JavaScript as a compressed ZIP file reached through Google Image searches.
Android

Submission + - Google Talk Enables Video Chat On Android Phones (hothardware.com)

MojoKid writes: "Google recently launched Google Talk with video and voice chat for Android phones. With the service, users will be able to video or voice chat with their friends and family directly from an Android phone. Calls can be placed over 3G, 4G and Wi-Fi connections. According to Google, the new features will first roll out to the Nexus S phones over the next few weeks as part of the Android 2.3.4 over-the-air update. Google Talk with video and voice chat will launch on other Android 2.3 and higher devices in the future as well. The video demo here shows it in action."
Privacy

Submission + - Surveillance of private computers proved. (wordpress.com)

An anonymous reader writes: Documents published by the EFF prove that the FBI uses persistently installed software on private computers to gather information on Internet behaviour. How does this effect privacy and indeed democracy?

Comment Give us more facts... (Score 4, Insightful) 300

Not all dropped calls are created equally... Some areas are just not designed to get cell coverage. It almost makes me wonder if some one is needing to use 911 if they are often in that area. Also what is the ratio of dropped calls to calls made? 10,000 out of 10,000 would be an alarming rate but what about 10,000 out of 1,000,000. How many dropped calls are customer induced? This article tells us nothing...
User Journal

Journal Journal: hum...

Interesting this is here...

Comment Re:Cheating? (Score 1) 693

You do not have to copy something verbatim for it to be copyright infringement... At best, this might fall under creating a derivative work? Another problem I see is for something to fall under copyright it must be "fixed in a tangible form of expression". This almost seems that each and every search must be saved. While I can see Google saving the search terms, I don't think they save the search results for each and search... The fact that: " Copyright does not protect facts, ideas, systems, or methods of operation..." (http://www.copyright.gov/help/faq/faq-general.html#what), makes it even more difficult to believe that Google would have grounds for a copyright suit... A google search seems to be a non fixed "expression" of a system/method of operation (search algorithm). A given search today may return different results tomorrow.

Comment Re:All Exploits (Score 2, Informative) 266

No... Not all exploits deal with copyright material. The DMCA can only be used in cases involving copyright material. "the DMCA focuses largely on the facilitation of infringement through circumvention tools and services primarily designed or produced to circumvent an access or copy control. In other words, the DMCA represents a shift in focus from infringement to the tools of infringers." 17 U.S.C. 1201-1205 V.A.3. It is stated the purpose is "to prevent large-scale piracy of digital content over the Internet" However the DMCA does cover a lot of crap...: 1. it prohibits "circumvent[ing] a technological measure that effectively controls access to a work protected under this [copyright] title." 17 U.S.C. 1201(a)(1)(A) 2. it prohibits the manufacture of or trafficking in products or technology designed to circumvent a technological measure that controls access to a copyrighted work. 17 U.S.C. 1201(a)(2) 3. it prohibits the manufacture of or trafficking in products or technology designed to circumvent measures that protect a copyright owner's rights under the Copyright Act. 17 U.S.C. 1201(b). Also interesting to note: 1. circumvention of access controls, 17 U.S.C. 1201(a)(1) 2. trafficking in technology primarily designed to facilitate circumvention of access controls, 17 U.S.C. 1201(a)(2) An interesting fact is that it does not prevent "the act of circumventing copy controls", only the trafficking of tools that circumvent copy controls.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...