Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Doesn't help public sector transparency (Score 2) 288

As much as this may be beneficial to scientists, I feel that in the case of publicly-funded institutions, it would set a bad precedent for the overall cause of public sector transparency. It has been a long, hard fight for increased transparency in government (FOI laws and such) and I think creating an exception for scientific agencies doesn't send the right message.

Comment And in Australia... (Score 3, Insightful) 500

In Australia, for most purposes we still use paper ballots. (There are a few exceptions - ACT territory elections have *optional* computer-based voting, and NSW state elections have an *optional* online voting system for some absentee or disabled voters.)

On election night, officials at every polling place - who are required to sign a declaration, under penalty, that they are not politically active - do an initial hand count of first-preference votes (yes, we have IRV and STV ballots here) and the votes for the top two front runners. These are the numbers that make their way to the internet in a matter of minutes and are used for the election night media coverage - but they actually have no legal significance at all, they're basically purely for the media coverage.

The real counting happens the week after election day, when all ballots are transported to the local electoral office for counting. For elections that use IRV ballots (e.g. the federal House of Representatives), the ballots are all hand counted. For STV ballots (e.g. the federal Senate), they do use computer based counting, however the paper ballots are retained and a hand count can be done if necessary. If there are any issues that arise, the Returning Officer has the discretion to order a recount as necessary, without necessarily needing court orders or anything like that.

The *entire process* - opening the polls, conducting the polling, closing the polls, the first count, the second count, and any recounts - takes place in front of candidate-appointed scrutineers (not quite as good as being public, but it's close enough). Every candidate can appoint scrutineers to witness the whole process and make objections.

And this is how Australia has elections that are virtually unchallengeable - for a typical federal election, there will usually be at most one serious dispute, and only in districts with the tiniest of margins where they need a judge to make the final decision. Heck, we're experimenting with computer-based and internet-based voting systems, and no-one's raising concerns because the Electoral Commission has such a high reputation for integrity and accuracy.

Comment Re:CS is part of IT (Score 1) 520

Agreed. I'm Australian, and I'm enrolled in a CS major - but I do my classes along side IT and SE students... as far as I'm concerned, all three terms are fairly close, just with some subtle differences. The umbrella term for everything, whether it's programming, consulting, sysadmin, etc. is 'IT'. This American differentiation between IT and CS just confuses me...

Comment An exception (Score 1) 468

I'm a university student, and I send and receive less than 5 a day, on average. (That's including events such as Humans vs Zombies week.) Then again, I'm the sort of nerd who spends his time on Slashdot...
Australia

Submission + - Australian Elections Result In Hung Parliament (abc.net.au) 1

ajdlinux writes: For the first time since World War II, Australia has a hung parliament. The future of the Government now lies in the hands of the five independent and Green MPs, who will decide over the next few days which party they will back to form the next government. The Labor Party's National Broadband Network is now in doubt, but it at least seems the internet filter won't go ahead now that the Greens have the balance of power in the Senate.

Comment Re:Non-American Tax Days? (Score 1) 432

Here in Australia, the financial year runs from July to June. Tax returns must generally be filed by the end of October or so, either through filling out the paper form with the aid of the 200-odd page TaxPack manual, or doing it online with their proprietary Windows-only software. The exact complexity of return forms depends on whether you qualify for a short return form, the normal return form, or in my case, the normal return form plus supplementary forms. Taxes here are often called high, but apparently we're quite low compared to many parts of the OECD. Income tax ranges from zero when you earn $180,000. The average is something like 30% or so I think. Other than income tax, we have a Goods and Services Tax (otherwise known as a VAT) on mostly everything, which is 10%. This is applied federally, and the revenue is paid by the feds to the state governments. We've also got a Medicare levy and Medicare levy surcharge which is administered on top of your income tax for certain people depending on income and health insurance status, and there's a few other taxes on various things as well. I don't generally think we're taxed too high - the revenue is needed to fund our health and welfare systems. That said, our state governments are pathetic when it comes to service delivery and there's proposals for federal takeovers of hospitals and things like that which I hope will make things more efficient. As for myself, I'm a student who merely has complex tax affairs due to a combination of welfare payments and self-employment, so I pay no tax at all, get no tax refund, and still have to fill out supplement business forms. :/
Security

Submission + - NSA Develops USB Storage Device Detector 1

Hugh Pickens writes: "Bob Brewin writes on NextGov that the National Security Agency has developed a software tool that detects thumb drives or other flash media connected to a network. The NSA says the tool, called the USBDetect 3.0 Computer Network Defense Tool, provides "network administrators and system security officials with an automated capability to detect the introduction of USB storage devices into their networks. This tool closes potential security vulnerabilities; a definite success story in the pursuit of the [Defense Department] and NSA protect information technology system strategic goals." The tool gathers data from the registry on Microsoft Windows machines (PDF) and reports whether storage devices, such as portable music or video players, external hard drives, flash drives, jump drives, and thumb drives have been connected to the USB port. "I have a hunch that a bunch of other agencies use the detection software," writes Brewin, "so before you stick a thumb drive into your government computer to copy a 100 slide PowerPoint brief, beware that Software Big Brother may be watching.""
Apple

Submission + - Developer Speaks Out Against Apple's New TOS 1

icemanjack22 writes: Due to the new Terms of Service for Apple developers, some are speaking out. The website StopTheMadnessSteveJobs.com has formed and seems to be gaining a lot of support. On Digg.com within 24 hours it has propelled itself to almost the Top Story in the past 30 days. For Developers in the same boat, I suggest you show your support.
Social Networks

Submission + - Identity Theft How-To (social-engineer.org) 1

An anonymous reader writes: The crew at social-engineer.org released a podcast today that is truly scary. They interviewed an identity thief and give a basic how-to into committing identity theft. The reasoning is that they want to protect the public by releasing dangerous information. They called it a 0Day for SE and I for one think that is accurate.
The Military

Submission + - Insurgent Attacks Follow Mathematical Pattern 6

Hugh Pickens writes: "Nature reports that data collected on the timing of attacks and number of casualties from more than 54,000 events across nine insurgent wars, including those fought in Iraq between 2003 and 2008 and in Sierra Leone between 1994 and 2003 suggests that insurgencies have a common underlying pattern that may allow the timing of attacks and the number of casualties to be predicted. By plotting the distribution of the frequency and size of events, the team found that insurgent wars follow an approximate power law, in which the frequency of attacks decreases with increasing attack size to the power of 2.5. That means that for any insurgent war, an attack with 10 casualties is 316 times more likely to occur than one with 100 casualties (316 is 10 to the power of 2.5). "We found that the way in which humans do insurgent wars — that is, the number of casualties and the timing of events — is universal," says team leader Neil Johnson, a physicist at the University of Miami in Florida. "This changes the way we think insurgency works." To explain what was driving this common pattern, the researchers created a mathematical model that assumes that insurgent groups form and fragment when they sense danger, and strike in well-timed bursts to maximize their media exposure. Johnson is now working to predict how the insurgency in Afghanistan might respond to the influx of foreign troops recently announced by US President Barack Obama. "We do observe a complicated pattern that has to do with the way humans do violence in some collective way," adds Johnson."

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...