Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Going home for a holiday...And doing family tech s (themorningnews.org)

BDZ writes: It's that time of year in many western countries for the holidays. A time to return home to the loving embrace of family...And being called upon to act as tech support for relatives close and distant.

What tales of horror do Slashdotters have of family tech support?

Input Devices

Research Lets You Type Words By Thought Alone 114

An anonymous reader writes "How about typing on a computer just by thinking about it? The downside is you have to wear a skull cap with electrodes that capture your brain waves like an EEG machine. According to this EE Times story, a team of researchers from Belgium and the Netherlands has presented Mind Speller, a thought-to-text device intended to help people with movement disabilities. The system does rely on a lot of processing on a remote computer, but it is a wireless system. And these thought-to-computer systems have wider applicability than medical support. One of the research groups involved in this development has already looked at wireless electroencephalography (EEG) to enable measures of emotion to be fed back into computer games."
Networking

Cisco's New Router — Trouble For Hollywood 335

Shakrai writes "Time Magazine has published an article about the impact of Cisco's new CRS-3 router on the business practices of the MAFIAA. This new router was previously mentioned here on Slashdot and is expected to alleviate internet bottlenecks that currently impede steaming video-on-demand services. Some of the highlights from the article: 'The ability to download albums and films in a matter of seconds is a harbinger of deep trouble for the Motion Picture Association of America (MPAA) and the Recording Industry Association of America (RIAA), which would prefer to turn the clock back, way back. ... The hard fact is that the latest developments at Cisco, Google and elsewhere may do more than kill the DVD and CD and further upset entertainment-business models that have changed little since the Mesozoic Era. With superfast streaming and downloading, indie filmmakers will soon be able to effectively distribute feature films online and promote them using social media such as Facebook and Twitter. ... Meanwhile, both the MPAA and the RIAA continue to fight emerging technologies like peer-to-peer file sharing with costly court battles rather than figuring out how to appeal to the next generation of movie enthusiasts and still make a buck."

Comment Re:I will never pay for DLC (Score -1, Troll) 466

Wow, troll much? Copying a file (especially one that I've already decided on moral grounds that I will not pay for) is NOT stealing because the company doesn't lose anything from it. In order for there to be theft, someone must lose something while another gains. They lose nothing by copying a file.

I don't get people like you - why don't you care about your rights? Why don't you care about having control over the property you pay for? Why are you so eager to be beaten down and forced to do things against your will? It's completely illogical.

Comment Informants, Agents, Identities. (Score 1) 555

The names of spies must be kept secret for many of the same reasons.

In criminal investigations the identities of informants must be kept secret.

It's not an option to release that information. Because if the government did not protect that information, the government would have no informants, spies, or intelligence capability.

Comment Re:Refuting the imaginary article in your head (Score 1) 410

Yeah, but from the article:

Still, many malware agents slip through the cracks undetected... until the rules of the anti-virus programs are updated, that is.

...

Instead of looking for known patterns -- whether of instructions and data, or of actions -- wouldn't it be great if we could look for anything that is malicious? That may sound like a pipe dream.

Maybe it's just badly worded or written, but he's making it sound like he's found the panacea of virus detection. Unfortunately, it doesn't work on viruses which a) don't have a known signature and b) don't try to keep themselves in RAM (i.e. don't mind being swapped out.) I would think that if the virus can overwrite parts of the OS in memory that it would not detect those, either (e.g. it could overwrite services which are commonly started but uncommonly used and live in their process space--autoupdaters would be good candidates for this.)

Comment Re:An easier plan (Score 1) 555

No, but we should have access to past data -- it was once common for the archives of the presidential offices to be opened to the public a decade or two after the end of a particular administration (W. ended that tradition). The only two items on your list that should have a longer period are the launch codes (which are not changed so frequently) and the personal information of soldiers (which should remain private for the sake of the soldiers and their families). The rest should be made public knowledge in a timely fashion -- military equipment is constantly upgraded, troop movements are no longer sensitive after the end of the war, and guard schedules should be changed frequently. Why should this information remain secret forever?

Comment Re:Should there be ANY government secrets? (Score 1) 555

Nice exercise in absurdism. Taking the case of "nuclear launch codes" and stretching it to "a shit-ton of classified documents" is exactly the kind of thing that causes problems. No-one is talking about handing out employee ID codes, or disclosing how government buildings are laid out. We are talking about things like secret prisons, military pollution (such as my own groundwater being contaminated by the Ai Force dumping degreaser on the ground at a local airfield for 30 years), testing of chemical/biological warfare agents on US military personnel (and CIVILIANS we now find out, with a french town receiving LSD spiked bread some decades ago).

What is at stake here is secret governmental policies intruding upon the freedoms of citizens.

In fact, come to think of it, yes, ALL of that data that you are talking about should be revealed. This includes passwords and nuclear launch codes. They can easily change the codes and passwords (and security patrol schedules) prior to their release. If that is the cost of making sure that innocent people aren't being raped and tortured by our government in some third world hell-hole, then that is a small price to pay.

Comment Complexity and data structures are more important (Score 1) 407

I think if you are worried about the efficiency of their solution you ought to explain complexity/order notation, and then apply it to a some practical data structures, like arrays or hash maps. Even more awesome if you get them to do some time measurements in easy language X so to demonstrate the effect of complexity. At crunch time, if they can judge the design trade-offs of their model&implementation, then that will eclipse any speed benefits of a compiled language. Good luck!

Comment Re:Non-obviousness. (Score 1) 117

What this proves is that the USPTO doesn't need to be reformed, it needs to be scrapped. There's little legitimate point in having it at all anymore. The people it supposedly should protect (the small inventors) are the very people crushed by it. They and the rest of us would be better off if it no longer existed at all.

^^ this

Comment Re:It's a sign of the forgery. (Score 1) 257

And this is why I never let Paypal fund the payment from my bank account and force them to use my credit card.
If there is a problem with the order I just call the credit card company and they will reverse the purchase on their end.
But better I avoid eBay and paypal as much as I can.

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...