Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Sadly, the article makes no sense (Score 1) 235

In fact you'll find that CT/CAT scans expose you to a comparable amount of radiation as flying: http://www2.ans.org/pi/raddosechart/pdfs/raddosechart.pdf 1 full body CAT scan is about the same as 220 hours of flying (10 long haul flights) 1 Thyroid scan about the same as 28 hours of flying (just over 1 long haul flight) There's lots of sources of radiation, not only that but studies have started to show that constant low level exposure to radiation may in fact reduce you susceptibility to cancer.

Comment Re:VLC is the linsux of media players (Score 1) 398

Moreover, most of the EDA industry doesn't port their software to MacOS. Even linux get's more attention from the EDA industry than MacOS (although this isn't surprising, considering the strong Unix roots of much of the software). Even Mathwork's Matlab for MacOS is a poor hack job of an X port of the linux version of their software.
Censorship

Submission + - Mandatory ISP filtering to go ahead (whirlpool.net.au)

atmurray writes: "One step forward, two steps back"
One the back of news that Australia may yet get an R-18 classification for games, there is news that mandatory ISP filtering will be introduced in the new year despite questionable pilot reports.

Censorship

Submission + - AU Government Will Introduce Mandatory Filtering (itnews.com.au) 2

bennyboy64 writes: iTnews reports that the Australian Government has announced its intention to introduce legislation that will make ISP-level filtering mandatory for all refused classification material hosted overseas. The Government intends to amend the Broadcasting Services Act in August 2010 to enforce the filter, and expects the filter to be operational within a further twelve months. 'The report into the pilot trial of ISP-level filtering demonstrates that blocking RC-rated material can be done with 100 percent accuracy and negligible impact on internet speed' Senator Conroy, Minister for Broadband, Communications and the Digital Economy said.
News

Submission + - 22 million missing Bush emails found! (yahoo.com)

ctmurray writes: Computer technicians have found 22 million missing White House e-mails from the administration of President George W. Bush and the Obama administration is searching for dozens more days' worth of potentially lost e-mail from the Bush years, according to two groups that filed suit over the failure by the Bush White House to install an electronic record keeping system.

The article goes on to describe to say the tally of missing e-mails, the additional searches and the settlement are the latest development in a political controversy that stemmed from the Bush White House's failure to install a properly working electronic record keeping system.

Earlier /. had a discussion on the Obama White House opposing the lawsuit that lead to this discovery.

Submission + - Make use of a provider locked VoIP ATA (atmurray.net)

atmurray writes: I've done a bit of a write up on how to use Asterisk to make use of a provider locked Netgear TA612V ATA. It doesn't involve hacking the firmware or altering the ATA in any way and the concept is probably applicable to other devices. I don't believe (but I'm no lawyer!) there should be any legal concerns governing the method I suggest.

Comment Re:Like that's going to work this time... (Score 1) 178

My Sony Bravia X-Series I bought a few years ago is 100Hz/120Hz (depending on source) and the latest does 200Hz/240Hz depending on source. Admittedly it doesn't accept sources over 60Hz and uses frame interpolation (they call it "Motionflow") to increase the frame rate from the source, but the most expensive part is ensuring the panel can do the refresh rate. Other manufacturers have equivalent frame interpolation technology too.

Comment Re:Is any form of trivial encryption sufficient? (Score 1) 280

I think you've all missed my point. My point is, by using any old encryption, no matter how strong/weak the encryption is, it makes it illegal to decipher what the content of it is without a warrant. The idea is to make any evidence collected inadmissible in court. Furthermore, if a warrant to raid your premises was obtained using evidence that was tainted (due to being collected illegally), the warrant may be deemed invalid and any further evidence collected maybe also inadmissible.

Comment It could be worse (Score 2, Funny) 736

Try doing a PhD concerned with the hardware implementation of pretty hardcore mathematics for wireless communications and have someone refer what you do to be "IT". Without trying to sound like some form of zealot, the best thing I did was switch to a Mac. Not because it is a superior environment or anything, but because when someone has a Windows problem I feign ignorance and say "sorry, not sure, I don't use Windows these days".

Comment Is any form of trivial encryption sufficient? (Score 1) 280

The way I see it, the problem with encryption is that it's generally computationally expensive and there are bandwidth overheads in performing strong worthwhile encryption. BUT, with the DMCA and other localised laws forbidding cracking of encryption, is strong encryption needed? Is it worth just encrypting things using a trivial dictionary or some such computationally trivial and zero bandwidth overhead system? That way if someone wants to look at the data, they'll need a warrant or else they'd be breaking the law. Is my thinking here valid?
Hardware

Submission + - World's oldest intact computer marks 60th birthday (abc.net.au)

atmurray writes: The forth computer to be made in the world and the first to be made in Australia has just turned 60.
Even better news is that this, the world's oldest intact computer, has been heritage listed which will see this important piece of history preserved for future generations.

Comment In some cases it could be ok... (Score 1) 502

As long as the program never runs with privileges different than the user installing it then it's not really a concern. In fact, it's not really any different to the user running whatever software they want in their home directory. However, as pointed out by many before, if the program runs with elevated privileges or under a different username or even worse, as root, than it becomes far too dangerous to allow. Hopefully a sane compromise can be achieved like only requiring root privileges to install programs that run elevated.

Slashdot Top Deals

One way to make your old car run better is to look up the price of a new model.

Working...