Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Wow (Score 1) 303

Here's what I want a high quality, fast and truly usable tablet for: medical care. It should be possible to walk into a patient's room carrying a clipboard sized device that resembled a giant iphone.

As a psychologist working in medical settings I want a similar thing. I want an integrated system with a touchscreen that allows me to take notes while talking to my patients and generate a readable, final report from that information. I'd probably have to get the devkit and write the app myself. Using a laptop creates too much separation from the patient- they feel you're paying more attention to the computer than to them. As a jazz guitarist, I want an 8.5 x 11" or A4 form factor that will allow me to use digitized lead sheets instead of having to lug 500 pages of sheet music with me.

The biggest technical problems I foresee are back end problems, problems with the EMR software, and battery life.(hospital IT departments tend to fuck things up. If they bought a bunch of apple tablets, they probably wouldn't build and maintain the back end servers and wireless AP correctly)

Hospital IT departments and EMR programmers can't even manage sane password and username requirements ("passwords must have twelve characters with at least one and no more than two capitals and three digits, and must not match any of your ten previous passwords." Meaning everyone has to write down their username and passwords to keep track of them, creating a security risk. Duh.). They are a particular subtype of paranoid electron jockey who fail to understand that their job is to make information *available* to providers, not hide it from them.

Remember, YOU (the typical slashdotter running Linux with a windows box for games on desktop machines) are not the intended users for this tablet. YOU probably sit at a desk all day. You have enough technical expertise that tinkering is fun for you, and you don't mind the idea of a tablet on kludgey, cheap hardware that is running open source software.

There's always an inherent culture clash between computer enthusiasts and information appliance users. The majority of users fall into the latter category while the majority of Slashdotters are in the former group. If you understand regexps, you're probably out of touch with most users.

Security

40 Million Identities Up For Sale On the Web 245

An anonymous reader writes "Highly sensitive financial information, including credit card details, bank account numbers, telephone numbers, and even PINs are available to the highest bidder. The information being traded on the Web has been intercepted by a British company and collated into a single database for the first time. The Lucid Intelligence database contains the records of 40 million people worldwide, mostly Americans; four million are Britons. Security experts described the database as the largest of its kind in the world. The database is in the hands of Colin Holder, a retired senior Metropolitan police officer who served on the fraud squad. He has collected the information over the past four years. His sources include law enforcement from around the world, such as British police and the FBI, anti-phishing and hacking campaigners, and members of the public. Mr. Holder said he has invested £160,000 in the venture so far. He plans to offset the cost by charging members of the public for access to his database to check whether their data security has been breached."
Medicine

Merck Created Phony Peer-Review Medical Journal 213

Hugh Pickens writes "Don't believe everything you read on the internet is a good rule to follow, but it turns out that you can't even believe a 'peer reviewed scientific journal' as details emerge that drug manufacturer Merck created a phony, but real sounding, peer-review journal titled the 'Australasian Journal of Bone and Joint Medicine' to publish data favorable to its products. 'What's sad is that I'm sure many a primary care physician was given literature from Merck that said, "As published in Australasian Journal of Bone and Joint Medicine, Fosamax outperforms all other medications...."' writes Summer Johnson in a post on the website of the American Journal of Bioethics. One Australian rheumatologist named Peter Brooks who served as an 'honorary advisory board' to the journal didn't receive a single paper for peer-review in his entire time on the board, but it didn't bother him because he apparently knew the journal did not receive original submissions of research. All this is probably not too surprising in light of Merck's difficulties with Vioxx, the once $2.5 billion a year drug that was pulled from the market in September 2004, after a study showed it doubled the risk of heart attack and stroke in long-term users resulting in payments by Merck of $4.85 billion to settle personal injury claims from former users, but it bears repeating that 'if physicians would not lend their names or pens to these efforts, and publishers would not offer their presses, these publications could not exist.'"
Networking

Handmade vs. Commercially Produced Ethernet Cables 837

An anonymous reader writes "We have a T1 line coming into our satellite office and we rely fairly heavily on it to transfer large amounts of data over a VPN to the head office across the country. Recently, we decided to upgrade to a 20 Mbit line. Being the lone IT guy here, it fell on me to run cable from the ISP's box to our server room so I went out and bought a spool of Cat6. I mentioned the purchase and the plan to run the cable myself to my boss in head office and in an emailed response he stated that it's next to impossible to create quality cable (ie: cable that will pass a Time Domain Reflectometer test) by hand without expensive dies, special Ethernet jacks and special cable. He even went so far as to say that handmade cable couldn't compare to even the cheapest Belkin cables. I've never once ran into a problem with handmade patch cables. Do you create your own cable or do you bite the bullet and buy it from some place?"

Comment Re:As we've seen. (Score 1) 294

I agree. When considering the statement "The web is becoming an integral part of the computer and the basic distinction between the OS and the browser doesn't matter very much any more," one has to consider the bias of the source. My laptop spends the majority of its time not connected to the internets and that time is its most important use as a tool- I make my living in part with my computer offline. The OS matters much more to me than the browser- I can use Safari, Camino, Firefox, etc. with equal outcomes (Google hasn't yet released Chrome for OS X). The browser is just an application. Google is positioning the browser as middleware- more than a browser, less than an OS.

Comment DUH! (Score 1) 583

"what is it about desktop Linux, and specifically Ubuntu, that has Microsoft spooked?" How dumb a question is that? Linux runs on the same hardware as Windows and is free. OS X does not (without more hacking than the vast majority of computer users can do). With distributions like Ubuntu, Linux becomes an easily installed option.
Government

Washington State Wants DNA From All Arrestees 570

An anonymous reader writes in to say that "Suspects arrested in cases as minor as shoplifting would have to give a DNA sample before they are even charged with a crime if a controversial proposal is approved by the Legislature. "It is good technology. It solves crimes," claims Don Pierce, executive director of the Washington Association of Sheriffs and Police Chiefs. Under the bill, authorities would supposedly destroy samples and DNA profiles from people who weren't charged, were found not guilty or whose convictions were overturned. Others believe that this is just another step in the process to build a national DNA database with everyone in it."

Comment Re:How is this bad? (Score 1) 282

As long as the P2P apps and file transfers can run at full speed when nothing time sensitive is using the network, this is the RIGHT way to do things.

But it won't. Look at what's being throttled: decentralized services that are not controlled by a content provider. The point is not Web congestion, data flow, etc. The point is to centralize access to data by disadvantaging decentralized services, so that it's easier to wring more profit from the Internet. This is about nothing more than separating users from their money.

It's funny.  Laugh.

Bill Gates' Plan To Destroy Music, Note By Note 659

theodp writes "Remember Mr. Microphone? If you thought music couldn't get worse, think again. Perhaps with the help of R&D tax credits, Microsoft Research has spawned Songsmith, software that automatically creates a tinny, childish background track for your singing. And as bad as the pseudo-infomercial was, the use of the product in the wild is likely to be even scarier, as evidenced by these Songsmith'ed remakes of music by The Beatles, The Police, and The Notorious B.I.G.."

Comment With added power comes the risk of abuse (Score 2, Interesting) 136

I'm a psychologist and work for a large clinic (93 clinicians, 25 support staff, five clinic locations and a lot of "out in the field" services). My specialty is nursing home services; there are about 15 of us in the nursing home division and we work in about 150 nursing homes. Often a client is referred to me and it turns out they were seen by a colleague in another nursing home. If we had an EMR that I could query remotely, I could find that out and streamline the delivery of services and provide better care. This would be the "added power" part of the discussion and the rosy picture that EMRs present

The flip side is that computer security is not reliable. Any system connected to the outside world can be hacked remotely one way or another. We have thousands of clients with a lot of sensitive data sitting in our files, currently in locked cabinets behind two locked doors with limited access to maximize security as much as we can. The risk of data exposure is minimal and happens as a result of sloppiness by practitioners (e.g. leaving a file sitting on a desk unwatched). With an EMR, however, the risk of exposure is potentially much higher (e.g., downloading *all* the files instead of swiping or reading just one).

We have made no provisions for using an EMR in our clinic. We have a computerized billing system which contains insurance information and diagnostic codes- only the information required to send out a bill- but none of our clinical records are in an EMR. AFAIK we are not required to do so.

Education

What Restrictions Should Student Laptops Have? 1117

An anonymous reader writes "We're a school district in the beginning phases of a laptop program which has the eventual goal of putting a Macbook in the hands of every student from 6th to 12th grade. The students will essentially own the computers, are expected to take them home every night, and will be able to purchase the laptops for a nominal fee upon graduation. Here's the dilemma — how much freedom do you give to students? The state mandates web filtering on all machines. However, there is some flexibility on exactly what should be filtered. Are things like Facebook and Myspace a legitimate use of a school computer? What about games, forums, or blogs, all of which could be educational, distracting or obscene? We also have the ability to monitor any machine remotely, lock the machine down at certain hours, prevent the installation of any software by the user, and prevent the use of iChat. How far do we take this? While on one hand we need to avoid legal problems and irresponsible behavior, there's a danger of going so far to minimize liability that we make the tool nearly useless. Equally concerning is the message sent to the students. Will a perceived lack of trust cripple the effectiveness of the program?"

Slashdot Top Deals

"If it ain't broke, don't fix it." - Bert Lantz

Working...