Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Internet Eyes charges its viewers to report cri (Score 1) 419

So is this a bad idea? The usually arguments are that CCTV cameras reduce privacy and when state controlled gives more power to the state (Schneier says this is the case even if the CCTV data is generally available).

However in this case, the state isn't holding the data. It's being acquired from private sources. It doesn't appear to be aggregated. It doesn't seem like you could using it for stalking. Is there a problem here?

Comment Re:Passing this data back to the scientist (Score 1) 101

The raw images from the device alone can take up this much space. 8 lanes, 300 imaging regions (tiles) per lane. Each imaged 4 times (one for each base/channel). A typical run is 37 cycles (base pairs), paired end runs (now typical) double this so:

8*300*4*37*2 =710400

On a GA1 those files are 2mb each, giving you around a terabyte and a half of of primary data to process. Image analysis takes place processing those files in to "intensity files". Those are further processed in to corrected intensities, then basecalls. Each of these steps produces a similar number of files. Some details of the process here: http://sgenomics.org/mediawiki/upload/8/80/Pipeline.pdf

Those numbers are for a GA1, the current version of the instrument has less imaging regions (100). However cycle length has increased (typically now 75+ bp).
As a side note all the tools used are "shared source" and not available under an open source license. There is a project called Swift which is an open source tool to do this: http://bioinformatics.oxfordjournals.org/cgi/content/abstract/btp383

Comment Re:No - there are plenty of safer alternatives (Score 1) 486

It's the C programming language which is at fault here. Arrays in C aren't really arrays, they're just pointers. Most modern languages (such as D, which all C++ programmers should investigate) have bounds checking on actual arrays.

D has bounds checking on primitives? That doesn't seem like a great idea, must have a significant performance impact. Sure it prevents buffer under/overruns, but if you want to do that use a container class which does bounds checking.

Comment Open source computing in Biology (Score 2, Informative) 101

Nothing like the open source computing movement has ever caught fire in biology or pharmaceuticals

Informatics for Biology... Bioinformatics. Is RUN by open source software. BLAST http://en.wikipedia.org/wiki/BLAST ,one of the most important Bioinformatic tools ever written, is public domain. It's paper is one of the most cited of the past 30 years http://archive.sciencewatch.com/sept-oct2003/sw_sept-oct2003_page1.htm . Bioinformatic clusters almost universally run Linux. Almost all popular tools are written by academics and supplied under open source licenses. To the degree that I'd say closed source software finds it hard to break in to this area, not the other way round. This is not only true of Bioinformatics, but also large scale Protein simulations. Namd p://www.ks.uiuc.edu/Research/namd/ is also available under and open source (though more restrictive than GPL or BSD license). And is one of the most popular Molecular Dynamics codes available.

Comment and security? (Score 2, Interesting) 153

Some people might think these are attractive because the signal can't be intercepted as easily as wifi. However Powerlinecommunications hacking seems to be moving on nicely http://events.ccc.de/congress/2008/Fahrplan/events/2901.en.html . My understanding is that it's sometimes possible to pick up signal leaking from other users in the building.

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...