Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Incompetent IT in a health care industry? (Score 1) 223

It's almost always a lack of will to spend the money required or accept the pain necessary and NOT technical feasibility. If you build your systems to the strictest of standards or beyond, then you are by default in compliance with the rest.

Doing things "right" almost always gets hamstrung by the dollar figures required or by "business" push-back. "Do we really need to install IDS/IPS equipment in every little branch network we have?" Yes, yes you do if you want to prevent and catch breaches early. "What do you mean I shouldn't use my iPad pool-side while on vacation to do my work? I'm the CEO." Yes, but that guy taking pictures of your screen behind you on the balcony isn't and the guy that's going to steal your iPad while it's unlocked when you get up to get your margarita certainly isn't.

Comment Re: What's the point? (Score 1) 175

Because many corporations will not let you access corporate data (including email) outside of maybe a web front-end without having some kind of say in how your device behaves (example: screen lock settings).

This means if you want native application access while on the go for convenience, you have two options:

1. Carry two phones (personal and corporate)
2. Let "corporate tendrils" onto your personal.

It's worth pointing out that many corporations will provide a financial stipend to use your personal because that saves them money. Depending on your carrier and the size of the stipend, it could just about pay your monthly bill.

Comment Re:analog computer (Score 1) 91

What interests me the most are the levels of subconscious/consciousness and where all this combines to create our singular, waking awareness.

Based on evidence of the effects of dissociative drugs, psychedelic drugs, and general anaesthetics, it seems likely that our 'singular, waking awareness' is primarily an effect of the information transfer between various brain regions through the posterior cingulate cortex.

Of course, knowing that doesn't make it any less of a head-fuck to contemplate how strange it is to be anything at all.

Comment Re:Oh Please Edge Detection and Motion Detection (Score 1) 91

While you're not wrong, I do think that from the perspective of the article, it's also not really so relevant.

'This means that, in theory, an artificial equivalent of a brain-like cognitive structure may not require a massively parallel architecture at the level of single neurons, but rather a properly designed set of limited processes that run in parallel on a much lower scale'

Basically from my understanding, he's saying here that if we handle the sub-systems in a more traditional manner - as in, existing edge detection and motion detection algorithms in standard computing systems - that with ~50 parallel threads, we could have something brain-like.

It's also worth considering though that this is far less cool than it sounds at first blush simply by fact that the sub-systems would not be brain-like in the slightest.

Comment Re:analog computer (Score 1) 91

While it may seem analogue, I'd definitely call the brain digital from a functional perspective.

The amount of neurotransmitters, strength of electrical activity, and so on are definitely analogue inputs; but due to the way that action potentials fire in cells, you're either "firing them" or "not firing them" (analogy: magnetic data on a disc is also analogue, but we only really care about the on/off state of it). Most information appears to be transferred based on the rate of firing them, and is not encoded in any special aspect of the spikes themselves. Furthermore, you might then assume that the rate timing of the spikes may be considered analogue data - again though, it's not really. There is a refractory period that limits the maximal firing rate of a single neuron, and downstream effects of this basically mean that the firing rates themselves could also in theory be quantised in a digital manner (although it'd be a massively complex problem to actually figure that all out).

While the whole system is quite fundamentally different from our current digital computers, it is nevertheless something that could also be a digital system.

Comment I've been on Gigabit in EPB territory for a year (Score 1) 279

Here's what I can tell you.

1. Outside of torrents, you're not going to get the full benefit of that gig for most applications.
2. Netflix is awesome with it. Load times of a few seconds for high def.
3. Hard wire anything that doesn't move often (TV/Blu Ray/PS3/Desktop/etc) and have plenty of ports around the house you can plug your laptop in just in case you feel you need more speed.
4. Use wireless the rest of the time. You seriously just won't notice that big of a difference web browsing unless you have serious interference issues although if you're gaming, you'll want to use the hard wire.

Honestly with current web applications, a gig is just about overkill. Sure that might change in the future once gig becomes more prevalent, but it's seriously overpowered for pretty much everything currently. Short of having multiple people streaming HD video and downloading/uploading via torrents, your pipe is going to be bored most of the time.

Comment Re:How do we actually know? (Score 2) 203

I could harvest 5m gmail names from google searches, and then publish them with bogus passwords and create panic. Is there some statistic that says how many of these were real passwords?

Statistics, probably not. But to confirm they're not just all made up, I checked a few of the ones that were obviously a password for another site (one of the '+' addresses) and after 4 tries, found one that worked (on the 'other site', not on gmail). So they're definitely not just 'made up' passwords; they just aren't necessarily a password that was ever actually used for the email address they're associated to.

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...