Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:The other question should who wants own the rig (Score 1) 129

Except some crashes are impossible to prevent. There will be some ambulance chasers that try to cash in on these crashes, regardless of whose fault it actually is. A likely outcome is that the lawyers trying to get money from autonomous car makers will change the question from "whose fault was it?" to "Why didn't your car prevent the crash?". Even if none of the lawyers win, the makers still have to spend a lot of money defending themselves.

Comment Re:BART really doesn't like dissenting voices (Score 1) 196

It's more like this:
The objective of the BART group is to run the trains, safely and on schedule.
A train station is a dangerous place during a protest. Protests, being large relatively immobile crowds have the possibility of pushing people into places where they shouldn't be. Between an enclosed space causing crush problems, the electrical lines for the trains, and the trains themselves, I wouldn't want to be in a train station during a protest.

Probably they decided to shut down the stations for two reasons: So that nobody would get hurt (which would then be blamed on BART's response) and so that hopefully the protesters would get bored and leave sooner so they could resume service.

Comment Re:So much for the safety of nuclear energy (Score 1) 752

Well they can blow up conventionally. Chernobyl exploded because the reactor's graphite moderation rods caught fire and the uranium fuel produced so much heat that the structures covering the reactor became pressure vessels and exploded.
Chernobyl didn't have a massive containment building like all western reactors do.

Comment Re:If this comes to market... (Score 1) 293

You're giving the computer too much credit. The choice that the computer makes is dependent on how it was programmed. No computer at the application level is purely logical.
An AI isn't going to be driving your car, an automated driving program is. The driving program won't even consider your worth compared to the 7-year old. It's likely that it will be programmed to chose paths which will cause the least damage while prioritizing some types of damage.

Having an AI driving your car is silly, I don't want my car to have an existential crisis while on the freeway. Having an automated driving program driving a car would be fantastic.

Comment Re:Use UV light and shift back up afterwards? (Score 1) 163

The story goes on that he was then able to destroy specific virii (including cancerous) by using a highly modulated RF carrier, where the modulation frequency (ie not so much the specific carrier frequency but rather its amplitude modulation frequency).
Then the consipracy theories start, where his machine threatened the cancer establishment (AMA), and all his work, machines and lab were maliciously destroyed/discredited.

Cells are cancerous, but virii can cause a cell to be cancerous. A virus itself cannot be cancerous, because it cannot reproduce alone. More importantly, this magical technique can tell the difference between a healthy cell and a cancerous cell, which might only be two or three switched genes out of trillions? And this will work over my entire body, despite any reflection and other interference?
Virii are a bit more believable, but still, the difference between two virii could be only a single gene swap.

Maybe the reason he was discredited was because it didn't work?
Considering this technique could wipe out all viral, bacterial and fungal infections, as well as all cancers... I'm inclined to believe that it didn't work.

Comment Re:US = World (Score 1) 427

The problem is that they are not private networks.

The way the internet is designed you have no way of knowing the path your packets will take, or even if the return packets take the same path. Each packet you send to the same destination might take a different path. I have Charter, the server uses AT&T, but all of our traffic might go through Verizon.

You are not also paying for an IP address from their servers, there are no servers in this situation. There are routers, but just because they route for me doesn't mean they can do whatever they want to my traffic. This is especially true since at every hop on the internet there is some sort of routing happening, so you're in effect saying that every single router in between two hosts can do whatever they want to the traffic.

Real net neutrality isn't giving the government any power over the internet, but rather that the government denying power to the Telcos.

DMCA is already a US government construct, and is a darn good one compared to the alternative. DMCA gives copyright holders an opportunity to remove infringing content without resorting to court actions. Now this doesn't mean that the system isn't abused, but imagine getting sued instead of getting a DMCA request, it would be horrible!

By piracy site takedowns I assume you mean the US government seizing web addresses, which is DNS and has NOTHING to do with net neutrality. The only way that piracy site takedowns could have anything to do with net neutrality is if the US government somehow forces the routers to drop certain addresses from their tables, which would do nothing because of our good friend dynamic IPs.

Comment Re:Wrong (Score 3, Informative) 305

They might also implement it via RED. As an outbound queue fills packets going into that queue start getting dropped. This is done to prevent TCP global synchronization, and is standard practice. But if you change the rules a little, saying that packets coming from payer X get into the queue more often than non-payer Y, you've effectively lowered Y's performance during congestion without impacting Y during non-congestion.

Or it could be done via managing router queues. In order to route a packet you must inspect it anyways. Instead of having 1 outbound queue from a router you have two, three, or more. The outbound port sends from the high-priority queue more often, but still sends from the lower priority queues, or else to the hosts it appears to be congestion or a dead connection.

It could also be done via policy based routing on the AS level. An AS is a set of routers divided from other routers by political divisions rather than any technological reasons (AT&T routers vs Verizon routers). Each AS communicates routes and speeds via BGP. You direct the payer packets towards the faster AS you're connected to, then send the non-payer packets over to the slower AS.

There is no real way to speed up some packets without slowing down others, unless you literally build a whole new faster network, in which case why not put the other packets on there too?

Comment Re:National ID Please! (Score 1) 487

I hate it how anyone uses a SSN as both an identifier and an authentication number. If someone gets your SSN, then you are screwed, and getting a new one is hard because you have to go through and replace your identifier everywhere.

Really SSN should only be used as a unique identifier, especially since they are fairly predicable. If you know when and where someone was issued a SSN then you can narrow the possibilities down to just a few.

Ideally everyone would have a credit card sized device that generates authentication numbers, as well as a passcode of some sort (not a password, but a rather large number). The credit card device is actually generating public keys, which is used to encrypt the passcode.

Someone intercepts your traffic? they don't know your public key, nor your passcode
Someone steals your device? they don't know the passcode
Someone somehow gets your passcode? they don't have the device.

Thus the attacker would have to be physically present to get the device, as well as cunning to get the passcode.

The authoritative body has its own private key which is used to ensure that the response can only be from the government.

The hard part is of course getting people to remember (and not write down) their passcode, and being able to physically identify someone in order to issue them a new device/passcode.

Although not necessary you could also have the person trying to do the authentication sign another piece of data with their company's private key. You could mandate that only registered banks and government could even try to authenticate people.

Comment Infrasound (Score 1) 810

I'd suggest an infrasonic microphone, feelings normally associated with haunting have been shown to also be caused by sounds in the 1-20 Hz range. Places normally considered haunted have been shown to have infrasonic sources that when turned off, cause the feelings to disappear.

http://www.richardwiseman.com/resources/ghost-in-machine.pdf (7 page PDF)

Comment Re:home use? (Score 2) 270

You would have to get it up to a high enough temperature to stay molten throughout the night, while still providing power. It's a lot more practical to use other solar technologies for home use and keep these ones in big arrays. It's a bit like why power plants will always have higher efficiency than home generation, it's a matter of scale.

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...