Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Don't Call it Waste (Score 0) 71

At the prices medical-grade titanium goes for, it is most certainly not wasted. The machined Ti is reclaimed (or at least it would be if I were in charge). Stating that there is 80% waste is marketing hyperbole. A fairer comparison would count the unsintered powder in the 3D build machine, and would end up being unfavorable to the 3D process.

But if you're in the business of making replacement body parts, you might well be starting with a generic titanium casting (or one of a series of different sizes) and machining it down to fit. Artificial hip joints are sometimes made that way.

Don't get me wrong, 3D printing makes a lot of sense for highly-custom items... although one needs to worry about the potential infection and reaction issues given the inherent porosity of sintered material that give purchase for pathogens, and lots of surface area for irritants that will slowly leech out.

Comment Re:Mill? (Score 1) 71

The nice thing is all the waste powder can be reused without having to melt it down, so there's almost no waste.

How big of an advantage is that, though? Melting down metal to reuse it is really easy, much easier than with other materials like glass or plastics. Especially in the case where you control the environment and can be assured of its purity, vs. collecting scrap metal or something (but even collecting scrap metal is profitable).

Submission + - The Long and Winding Road to the Surveillance Society (bbc.co.uk)

smugfunt writes: There is a new blog post by Adam Curtis tracing some of the strange connections and interesting characters in the evolution of the digital Panopticon we find ourselves living in. He posits that many of the data-driven systems now used in all sectors of society have the effect (deliberate and accidental) of forestalling change/fostering stability. As always, he brings to our attention some hitherto unnoticed 'men behind the curtain'.

Comment Re:Horribly Inaccurate (Score 1) 101

Trusted by whom? I don't think there's any requirement that the purchaser of the device trust the "trusted" data extractor. IIUC it could become trusted before the customer ever received the device, or anytime it's in for service.

So this *probably* means that J. Random Hacker can't access the information. If the assertion is true. It doesn't say anything about Apple, their employees, or anyone they share information with...transitivly.

Comment Re:it's the future (Score 2) 101

Unfortunately, no, I wouldn't "expect people to be more sensible than that, especially in the post-Snowden era", even though this actually isn't the post-Snowden era. He's still around, and still occasionally releasing new tid-bits.

I normally expect people to be short-sighted, and to have little memory of history. I regret that I'm rarely disappointed.

Comment Re:Stallman was right (Score 3, Informative) 101

Not sure about that particular case, but there are some legal requirements that, I believe, entail controls that are not user controlable. Things like frequency, signal encoding, etc. Those seem liike reasonable constraints, so long as we aren't using spread spectrum, which, IIUC, is illegal.

Given that, modem isolation is probably the just and reasonable approach to take.

Comment Re:We really need some laws agains false advertisi (Score 1) 398

The problem is that the laws that already exist aren't enforced. It's a secondary problem that they are so written that it's relatively easy to weasel around them, but even the existing laws aren't enforced, so adding new laws (that aren't enforced) wouldn't do any good.

Submission + - Pi Power - the power supply the Raspberry Pi *should* have come with (geppettoelectronics.com)

nsayer writes: The Raspberry Pi is awesome. There's only one thing I dislike about it — how you're meant to power it. Crappy USB power supplies are ubiquitous, and the power more or less goes straight onto the +5 rail. Not only that, but the micro USB connector is SMT, and USB cables are much thicker and heavier than their 2.1mm barrel connector cable counterparts. No, it's just not the best tool for the job.

So I made Pi Power. It's a small board that sits on the GPIO pins (it comes with a stacking header so you can piggyback onto it) and has a 2.1mm barrel connector that will accept any DC voltage from 6-15 volts and output up to 2A of well regulated 5V power.

I sell them on Tindie for $15 ( https://www.tindie.com/product... ) and am running an IndieGoGo campaign to fund building 1000 of them at http://igg.me/at/PiPower .

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Submission + - Enraged Verizon FiOS Customer Seemingly Demonstrates Netflix Throttling (hothardware.com)

MojoKid writes: The ongoing battle between Netflix and ISPs that can't seem to handle the streaming video service's traffic, boiled over to an infuriating level for Colin Nederkoon, a startup CEO who resides in New York City. Rather than accept excuses and finger pointing from either side, Nederkoon did a little investigating into why he was receiving such slow Netflix streams on his Verizon FiOS connection. What he discovered is that there appears to be a clear culprit. Nederkoon pays for Internet service that promises 75Mbps downstream and 35Mbps upstream through his FiOS connection. However, his Netflix video streams were limping along at just 375kbps (0.375mbps), equivalent to 0.5 percent of the speed he's paying for. On a hunch, he decided to connect to a VPN service, which in theory should actually make things slower since it's adding extra hops. Speeds didn't get slower, they got much faster. After connecting to VyprVPN, his Netflix connection suddenly jumped to 3000kbps, the fastest the streaming service allows and around 10 times faster than when connecting directly with Verizon. Verizon may have a different explanation as to why Nederkoon's Netflix streams suddenly sped up, but in the meantime, it would appear that throttling shenanigans are taking place. It seems that by using a VPN, Verizon simply doesn't know which packets to throttle, hence the gross disparity in speed.

Submission + - Mark Zuckerberg now richer than Google co-founders and Jeff Bezos (latesttoptechnews.com)

An anonymous reader writes: Facebook's Chairman Mark Zuckerberg is now richer than Google co-founders Larry Page and Sergey Brin; not letting Amazon's CEO Jeff Bezos out of the picture.

The 30-year old Facebook founder is now worth $33 billion after he earns $1.6 billion on Thursday(today) after his company went up from $71 per share on Wednesday to $73 per share on Thursday. Facebook, on the other hand, is now valued at $205.57 billion

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...