Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:We are being kinectically assimilated (Score 1) 84

The headline gives the impression that this is being done right now. The timeline also gives a hint of the level of commitment. Before the "promised" SDK, we've heard stories like http://www.next-gen.biz/features/hacking-kinect -- So this response, whatever the spirit, is delayed. It is definitely not one of the "right" things Microsoft has done recently. (There may be others.)

Comment Re:Nothing to see... (Score 1) 615

I am in complete agreement. "Inventions" are defined too loosely themselves. Their utility has not been defined in terms of a specific purpose and context. The time-scale (and therefore chronological context) of the invention has not been defined. If all premises are ill defined or undefined, there is no point to debate. Each reply to the post is a new argument in a new context. So, absolutely, nothing to see here.

Comment Obscure Security and Marketing Fud? (Score 3, Informative) 145

Bad blocks are inherent in NAND flash. SLC NAND Flash devices are more reliable (have fewer errors) and costly. MLC NAND Flash devices are less reliable (have more inherent errors) but are affordable and easily available. NAND Flash devices are known to progressively degrade until the number of bad blocks is too high to reliably store data. Inherent errors during manufacturing increase on usage (both read and write.) Most Flash Storage Devices will ultimately become too error-prone to store data. The industry might want to justify inherent errors (and gradually increasing errors) by calling it a fingerprint. They are still searching for techniques to make NAND Flash more reliable.

The article fails to provide mathematical basis to prove that two NAND flashes cannot have the same bad blocks on manufacturing or at some point of usage thereby obscuring identity. NAND flash controllers are designed to check and resolve errors using known algorithms. Most controllers allow hardware to hide errors while allowing OS device drivers to read the NAND flash medium. The Operating System and the NAND Flash Controller are at least two points were any such fingerprint can be compromised. The Filesystem adds another layer of abstraction. The number of "Real" bad blocks and remaps is usually stored on the NAND Flash. Altering the Bad Block Table is not difficult.

Hard Disks interestingly have similar failure rates and complex issues like Data remanence which have been studied. I wonder why no one proposed a signature scheme for using errors on Hard Drive Platters to identify them. Computer Forensics for Hard Drives has a longer track record of being studied. Marketing fud can be ignored.

Sci-Fi

Sir Patrick Stewart 324

david.emery was one of a few folks who noted that Patrick Stewart can now be referred to as Sir Captain as he will be knighted by the Queen. This should bring balance to any future X-Men movies.
Cellphones

Apple To Sell Wi-Fi-less iPhone In China 114

Hugh Pickens writes "Business Week reports that the Chinese government has received an application from Apple seeking a Network Access License to sell the iPhone for officially-sanctioned use in the country. However, the application is for an iPhone that does not include Wi-Fi connectivity, a sticking point in negotiations with the Ministry of Industry and Information Technology, which wants the phone to only run on the cellular networks. 'Apple was hellbent on having the iPhone be Wi-Fi-enabled,' says analyst Matt Mathison. 'The Chinese government has been just as adamant that it not be.' For many years now, China ministry officials told wireless consumers that Wi-Fi would not be allowed on mobile phones for fear that consumers might be tempted to illegally load VoIP apps and make calls over the Net, undermining carriers' interests. However Glenn Fleishman says that China uses WAPI, a homegrown proprietary extension to Wi-Fi that only a handful of Chinese manufacturers have access to, and that equipment sold in China must have WAPI support and chips made in China. Fleishman speculates that China's WAPI standard contains backdoor technology to allow China to monitor any communications sent over 'secure' links."

Comment A good Investigation Report (Score 3, Interesting) 403

Pitot tubes were invented in the 1700s by the French Engineer Henry Pitot and later modified for airspeed measurements. They are also used to measure aerodynamic speed in Formula racing cars too among other uses. Here is a comprehensive article following the crash investigation that is informative with photographs and the timeline of theories.

I read both the articles posted. They do not qualify as the best investigation reports. They seem to be building "What if" scenarios from all data that is available. Other A330 failures (no recent crashes reported) and Other places where ice in Pitot tubes led to failure (The Wikipedia article has a lot of information on this and planes which had problems notably, the X31.) The investigators are clearly under pressure to say what they have found and they are unable to report "nothing" to the press. With no luck in recovering the Black Box, the investigators (like they talk about Pilots not good at flying aircraft without the aid of in-flight safety systems) have to do it the old forensic way (reminds me of Crichton's Airframe). That is going to take time and the press, the Aircraft companies using A330s are impatient to know why.

Clearly no recent theory has come close to deducing the true reason for the crash. As I remember the first news item that appeared on the AF447 was that the plane "vanished" from Radar and was sought for by the Brazilian Air Force before the crash site was positively identified. The last exchanges between the Pilot and the Aircraft tower followed by an automated message from the aircraft remain the main clues apart from the debris in this horrific accident.
Medicine

Submission + - First Images of Memories Being Made (eurekalert.org)

TheSync writes: "Eurekalert reports that researchers at the Montreal Neurological Institute and Hospital, McGill and UCLA have captured the first image of protein translation that underlies long-term memory formation. A fluorescent protein showed the increased local protein synthesis during memory formation, which requires cooperation between the pre and post-synaptic compartments of the two neurons that meet at the synapse."

Comment The Constitutional Right to Privacy (Score 1) 836

There is no debate on the fact that this is an invasion of privacy. It seems to be a sort of test to keep tech savvy people (would that be everyone?) out of the hiring process. I am shocked at this. Here is an interesting note, the US constitution aside from the 9th amendment does not guarantee the right to privacy. The right to privacy is enforced by the interpretation of the First, Third and Fifth amendments and of the Ninth amendment itself. The Fourth Amendment contains an explicit interpretation of the right to privacy specific to computers. They are still open to interpretation. So the issue is just not about private passwords here, there's a lot more being brought up. In India, Article 21 of the Indian Constitution expressly guarantees the Right to Privacy. There is some confusion and no explicit mention in the constitution of Britain either. From the little reading I have done, the right to privacy (and therefore keeping my own passwords from the state) has been created through addendum and interpretation of prior articles of constitution rather than a specific article or amendment mentioned in the constitution. ---- IANAL
Privacy

Montana City Requires Workers' Internet Accounts 836

justinlindh writes "Bozeman, Montana is now requiring all applicants for city jobs to furnish Internet account information for 'background checking.' A portion of the application reads, "Please list any and all, current personal or business websites, web pages or memberships on any Internet-based chat rooms, social clubs or forums, to include, but not limited to: Facebook, Google, Yahoo, YouTube.com, MySpace, etc.' The article goes on to mention, 'There are then three lines where applicants can list the Web sites, their user names and log-in information and their passwords.'"
Google

Submission + - Microsoft: Google broke Windows search (pcpro.co.uk)

Barence writes: "Microsoft has accused Google of breaking Windows Desktop Search with its new Outlook plug-in for Google Apps. The plug-in disables Windows Desktop Search upon installation by removing a registry key. What's more, uninstalling the Google plug-in doesn't restore the registry key, leaving Windows and Outlook search facilities crippled. Google now admits its software disables the search facilities — as well as Adobe and PGP encryption plug-ins — and says it's updated Google Apps Sync so that it repairs the registry keys properly."

Comment GnuCash is the best, but Spreadsheets easier (Score 2, Interesting) 291

I personally have used GNUCash but have restricted it to Savings Accounts and for Bill pay. I am quite happy doing a balance sheet as a spreadsheet. I've found OpenOffice Calc to fall short of some features, GNUmeric fits in where Calc fails.

Looking back at MS Money, I think GNUCash has the features to take it head on. KMyMoney is so full of features [serious] that learning to get used to it just keeps you away. The UI though is quite sleek if you are a KDE fan. I've tried it sometime, but import/export options across open source formats has been in many cases lousy.KMyMoney2 changes the file format from KMyMoney, the earlier versions which also makes it less of an option.

Microsoft's Money (not among the options really) requires .Net and some web/aspx stuff to run that might make all the Windows Antivirus/Netprotect/whatever rules really difficult to maintain. It does have a sleek and less scary UI compared to its earlier versions.
Censorship

Iran Moves To End "Facebook Revolution" 838

We've had a few readers send in updates on the chaotic post-election situation in Iran. Twitter is providing better coverage than CNN at the moment. There are both tech and humanitarian angles to the story, as the two samples below illustrate. First, Hugh Pickens writes with a report from The Times (UK) that "the Iranian government is mounting a campaign to disrupt independent media organizations and Web sites that air doubts about the validity of the re-election of Mahmoud Ahmadinejad as the nation's president. Reports from Tehran say that social networking sites such as Facebook and Twitter were taken down after Mr Ahmadinejad claimed victory. SMS text messaging, a preferred medium of communication for young Iranians, has also been disabled. 'The blocking of access to foreign news media has been stepped up, according to Reporters Without Borders. 'The Internet is now very slow, like the mobile phone network. YouTube and Facebook are hard to access and pro-reform sites... are completely inaccessible.'" And reader momen abdullah sends in one of the more disturbing Ask Slashdots you are likely to see. "People, we need your urgent help in Iran. We are under attack by the government. They stole the election. And now are arresting everybody. They also filtered every sensitive Web page. But our problem is that they also block the SMS network and are scrambling satellite TVs. Please, can you help us to set up some sort of network using our home wireless access points? Can anybody show us a link on how to install small TV/radio stations? Any suggestion for setting up a network? Please tell us what to do or we are going to die in the a nuclear war between Iran and US." Update: 06/14 18:32 GMT by KD : Jim Cowie contributes a blog post from Renesys taking a closer look at the state of Iranian Internet transit, as seen in the aggregated global routing tables, and concluding that the story may not be as clear-cut as has been reported.

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...