Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:911, but not Mom? (Score 1) 232

In fact, preventing them from learning by experience is likely to have the opposite effect of the one intended.

You're absolutely right. I just don't want your learning experience to end in a head-on crash with my car.

Cars are dangerous. Driving your car is probably the most dangerous thing you do every day (unless your a Marine or firefighter) for yourself and others. You really think society should just toss kids the keys and let them learn on their own?

You're absolutely right: cars are dangerous and driving is in fact the most dangerous thing anybody (even a Marine or a firefighter) does every day. And I didn't say "society should just toss kids the keys and let them learn on their own". That would be abdicating my parental responsibilities. I said learning by experience is the best way to learn. This was intended in a broad sense rather than being specifically limited to this logical argument. So I stand corrected on that point.

Comment Re:911, but not Mom? (Score 1) 232

How about facing the reality that bad things happen to stupid people doing stupid things, and teach kids to not be stupid? Proactively blocking their every move because they might do something dumb does not turn them into responsible adults.

Amen! In fact, preventing them from learning by experience is likely to have the opposite effect of the one intended.

The Internet

Broadband Access Without the Pork? 412

An anonymous reader writes "Like many consumers nowadays, I find more of my time spent on the internet and various wireless devices (e.g. mobile phone). This has gotten to the point where I basically do not use a landline or cable television anymore, and they are essentially pork on my broadband bill, which further subjects the consumer to all sorts of clandestine fees that aren't disclosed until the first bill arrives and add a non-trivial sum (in my case, nearly 100%) to the monthly rate. However, it seems that all broadband access providers have this stipulation, that an internet customer must first have a basic phone or cable TV service in order to sign on for the internet service. Are there any ISPs that can get around this and still deliver broadband internet service at a competitive rate?"
Wii

Wii Gets Custom Firmware, Purported PSP Emulator 68

Engadget is reporting that some recent unofficial Wii modding news has had a couple of interesting breakthroughs. First, it seems that a team has released what is being called the "first custom firmware for the Wii" that supposedly allows writable DVDs to be read in emulators. Second, the folks from TeamShift have shots of a "working" PSP emulator for the Wii. Unfortunately "working" only means between 4 and 8 frames per second, so still a long way from playable.
Input Devices

Gaming Gear Showdown, Simplicity vs. Hype 159

Slack3r78 writes "Gizmodo is running a feature putting the gaming marketing hype to the test and seeing whether it really makes your playing any more 1337. They match up the latest products from Razer and SteelSeries along with some five-year-old Logitech products and come to the conclusion that ... it doesn't seem to matter that much. It looks like maybe you can't buy your way into finally beating that annoying 13-year-old at your favorite FPS after all."
Robotics

UAVs Will Study Californian Smog 79

Roland Piquepaille writes "The California Energy Commission is funding a research effort named CAPPS, short for California AUAV Air Pollution Profiling Study. CAPPS will use autonomous unmanned aerial vehicles (AUAVs) to gather meteorological data as the aircraft fly through clouds over Southern California. The goal is to study smog and its consequences as well as better understand the sources of air pollution. The first flights started in April 2008 and data collection will continue until January 2009. But read more for additional references and photos of these autonomous unmanned aircraft."
Security

Half a Million Microsoft-Powered Sites Hit With SQL Injection 222

Titus Germanicus writes to tell us that a recent attack has compromised somewhere in the neighborhood of 500,000 pages with a SQL injection attack. The vulnerability seems to be limited to Microsoft's IIS webserver and is easily defeated by the end user with Firefox and "NoScript." "The automated attack takes advantage to the fact that Microsoft's IIS servers allow generic commands that don't require specific table-level arguments. However, the vulnerability is the result of poor data handling by the sites' creators, rather than a specific Microsoft flaw. In other words, there's no patch that's going to fix the issue, the problem is with the developers who failed follow well-established security practices for handling database input. The attack itself injects some malicious JavaScript code into every text field in your database, the Javascript then loads an external script that can compromise a user's PC." Ignoring corporate spin-doctoring, there seems to be plenty of blame to go around.
Networking

Name For a Community-Owned Fiber Network? 253

CleverMonkey writes "I'm a town representative to a newly created municipal group creating a new type of telco. This group has formed to build and operate a FTTH network, and provide both triple-play services and access to other providers, to over 20 mostly rural towns in East-Central Vermont. The project is novel because of the size of the network (a cable pass down every road within 600 square miles), the low-density of the area served, and the public-ownership/private-financing model that is being used. Some of the towns included in this group currently have nothing beyond 14.4 dial-up on a good day. This project began as a grassroots effort in a couple of towns and the name they chose was ECFiber — East-Central Fiber — or sometimes the East-Central Vermont Community Network. We hope that this network will grow beyond one corner of this state, and we would like a name that is both descriptive and flexible. What would you name a community-owned, cutting-edge, G-PON fiber-optic network covering every remote corner of two-dozen contiguous towns?"
Input Devices

Ready for a CyberWalk? 69

Roland Piquepaille writes "Even with recent improvements in virtual reality technology, it's still almost impossible to physically walk through virtual environments. Now, European researchers have started a project named CyberWalk and they'll demonstrate next week their omni-directional treadmill, named CyberCarpet. According to ICT Results, the researchers 'had to address five key issues: providing a surface to walk on, controlling the surface in a way that minimized forces on the user, developing a non-intrusive tracking system, displaying a high-quality visualization, and ensuring a natural human perception of the virtual environment.' The researchers think that their new virtual environments would be used by architects and the gaming industry." Additional details are also available via the project website.
Space

Statue of Galileo Planned for Vatican 333

Reservoir Hill writes "Four hundred years after it put Galileo on trial for heresy the Vatican is to complete its rehabilitation of the scientist by erecting a statue of him inside Vatican walls. The planned statue is to stand in the Vatican gardens near the apartment in which Galileo was incarcerated. He was held there while awaiting trial in 1633 for advocating heliocentrism, the Copernican doctrine that the Earth revolves around the Sun. The move coincides with a series of celebrations in the run-up to next year's 400th anniversary of Galileo's development of the telescope. In January Pope Benedict XVI called off a visit to Sapienza University, Rome, after staff and students accused him of defending the Inquisition's condemnation of Galileo. The Vatican said that the Pope had been misquoted and since the episode, several of the professors have retracted their protest."
Security

Hackers Target MySpace and Facebook 93

Stony Stevenson writes "The security firm Fortify Software has warned against a series of attacks against Facebook and MySpace. Buffer overflows that enabled hackers to exploit the Aurigma ActiveX image uploading software used by social networking sites were at the heart of the assault. 'Criminal hackers now view social networking sites as their best target for attacks ... [partially because] such sites are designed to be usable by "unsophisticated" consumers, meaning that the barrier to entry for attacks is potentially lower as users are more likely to click on a link that leads to malware.'"
Networking

IPv4 Address Crunch In 2 Years, IPv6 Not Ready 539

An anonymous reader writes "We've known for ages that IPv4 was going to run out of addresses — now, it's happening. IPv6 was going to save us — it isn't. The upcoming crisis will hit, perhaps as soon as 2010, but nobody can agree on what to do. The three options are all pretty scary. This article covers the background, and links to a presentation by Randy Bush (PDF) that shows the reality of the problem in stark detail."
Privacy

Examining the Search and Seizure of Electronics at Airports 699

Angus McKraken brings us a Washington Post story about how travelers are seeking more well-defined policies and rules about the search and seizure of electronic devices by U.S. Customs officials. The EFF has already taken legal action over similar concerns. We recently discussed the related issue of requiring people to disclose their passwords in order to search their private data. From the Post: "Maria Udy, a marketing executive with a global travel management firm in Bethesda, said her company laptop was seized by a federal agent as she was flying from Dulles International Airport to London in December 2006. Udy, a British citizen, said the agent told her he had 'a security concern' with her. 'I was basically given the option of handing over my laptop or not getting on that flight,' she said. 'I was assured that my laptop would be given back to me in 10 or 15 days,' said Udy, who continues to fly into and out of the United States. She said the federal agent copied her log-on and password, and asked her to show him a recent document and how she gains access to Microsoft Word. She was asked to pull up her e-mail but could not because of lack of Internet access. With ACTE's help, she pressed for relief. More than a year later, Udy has received neither her laptop nor an explanation."
Robotics

Robot Composed of "Catoms" Can Assume Any Form 168

philetus writes "An article in New Scientist describes a robotic system composed of swarms of electromagnetic modules capable of assuming almost any form that is being developed by the Claytronics Group at Carnegie Mellon. 'The grand goal is to create swarms of microscopic robots capable of morphing into virtually any form by clinging together. Seth Goldstein, who leads the research project at Carnegie Mellon University, Pittsburgh, in the US, admits this is still a distant prospect. However, his team is using simulations to develop control strategies for futuristic shape-shifting, or "claytronic", robots, which they are testing on small groups of more primitive, pocket-sized machines.'"
Book Reviews

Windows Vista Annoyances 399

stoolpigeon writes "It has been well documented that the reception for Microsoft's Windows Vista has not been all that warm. Yet, visiting the web site of many PC manufacturers or visiting a retail outlet selling computers will show that most new hardware is being offered with Vista as the primary if not only option. O'Reilly's newest in their Annoyances series, "Windows Vista Annoyances", by David A. Karp, seeks to alleviate some of the pain for new Vista users. For the Vista owner who is able to put the book's suggestion into place, the edge should be taken off. For the individual considering a purchase of Vista and wondering if it can really be that bad, this book seems to indicate that yes, it is that bad." Read below for the rest of JR's review.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...