Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Interesting Comparison to Online Privacy (Score 1) 198

Aren't the bar patrons voluntarily supplying their personal information when they hand their ID over to the bouncer with a scanner?

You cannot get into the bar in most cases without handing it over to be scanned. To reference the comparison to online privacy, you do not need to provide your driver license number (or anything personal info) to FB to "get in". Also, FB, in a perfect world, would be be able to use that information to help you relate to people, while all the bar is using it for is to log people's activities. /.'ers probably don't like the idea of being tracked by non-voluntarily databases, not the idea of voluntarily handing over information.

Comment Re:Tech support costs (Score 2, Insightful) 143

Couldn't let this one go untouched:

As would the support costs.

and:

Apple knows how to tech-support the iTunes application and the iPod firmware. It does not know how to tech-support a third-party app or Rockbox firmware.

I will give you the fact that Apple has the right to provide support on whatever they want too. However by opening a my iPod box I did not sign a contract giving Apple the exclusive right to tell me what I can and can not do with my iPod. If I want to use my iPod to unclog my sink then I can. I am capable of reasoning that if I call Apple and say "my iPod broke and it failed to unclog my drains" they arent going to help me get a warranty replacement, nor help me unclog my drains.
To finish the analogy I want to use XYZ music player to upload music to a portable music player that I own then I certainly hope that I can. At the same time, I am capable of reasoning that I cannot call Apple when XYZ music player stops working properly...

Medicine

Daydreaming Is Really Complex Problem-Solving 138

beefsprocket writes "ScienceDaily reports that 'A new University of British Columbia study finds that our brains are much more active when we daydream than previously thought. The study, published in the Proceedings of the National Academy of Sciences (abstract), finds that activity in numerous brain regions increases when our minds wander. It also finds that brain areas associated with complex problem-solving — previously thought to go dormant when we daydream — are in fact highly active during these episodes. "Mind wandering is typically associated with negative things like laziness or inattentiveness," says lead author, Prof. Kalina Christoff, UBC Dept. of Psychology. "But this study shows our brains are very active when we daydream — much more active than when we focus on routine tasks."'"

Comment flash faliure (Score 5, Interesting) 357

About 5-6 years ago, I decided that it would be a good idea to build a small application on a flash drive, that is, code and compile it directly to the drive.
After what must have been hitting compile a few hundred to a thousand times, the 128MB thumb drive starting giving me drive write errors and then stopped responding altogether within about a minute after errors starting appearing.
I think the moral of this story is backup your data, even when it's on a flash based drive, and don't code directly on a cheap thumb drive :)

Comment Re:Only protects from profiling ISPs (Score 1) 240

Don't the torrent networks disallow MPAA use? That would mean on connection that the MPAA is in breach of contract, they're not law enforcement agents and presumably don't have a warrant of the court??

It would be impossible to breach the contract of a website outside of the US, I believe(I am curious myself, so someone correct me if I'm wrong), however you can use Peer Guardian for some basic protection from connections from places such as MediaSentry.
And, yes, there has been questions raised before about XXAA & MediaSentry getting/not having a private investigator license:
http://delta.techdirt.com/blog/index/articles/20090219/0135273829.shtml

Books

Amazon Uses DMCA To Restrict Ebook Purchases 409

InlawBiker writes "Today, Amazon invoked the DMCA to force removal of a python script and instructions from the mobileread web site. The script is used to identify the Kindle's internal ID number, which can be used to enable non-Amazon purchased books to work on the Kindle. '...this week we received a DMCA take-down notice from Amazon requesting the removal of the tool kindlepid.py and instructions for it. Although we never hosted this tool (contrary to their claim), nor believe that this tool is used to remove technological measures (contrary to their claim), we decided, due to the vagueness of the DMCA law and our intention to remain in good relation with Amazon, to voluntarily follow their request and remove links and detailed instructions related to it.' Ironically, the purpose of the script is to make the Kindle more useful to its users."

Comment Re:Is quantum cryptography desirable in this scena (Score 2, Insightful) 141

Exactly. Is public key crypto broken enough to need to spend any money to switch over to QKD?
For that matter is public key crypto over the internet broken?

From the QKD guy in the article:
"Conventional cryptography is exposed to threats from advances in computing power that provide for brute force attacks,"
As long as you stay up to speed (ie. keeping your key sizes up to standards), I don't see how this is an issue...

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...