Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Do what they did with GPG (Score 1) 496

Compress the file then print it out in easily OCR'able format (QR codes, perhaps), then physically carry it out of the country.

"You can't stop the signal, Mal."

STL files are nothing but sets of vertices - 3d points. The Zimmerman defense is easily applicable here. MY guess - the DoS is about to have their asses handed to them. Whether the files do fall under the purview of ITAR is irrelevant - with its current form, ITAR's restrictions on the dissemination of information are simply unconstitutional, and cannot be enforced as 3d design and printing technologies become so mainstream that people are building their own with little to no experience.

Comment Re:Rights? (Score 1) 133

Incorrect again. The amendment has never been interpreted by the courts to have these limitations - thus far, limitations have been enforced either through executive mandate or by legislation through the Congress. The limitations on our ability to purchase fully automatic weapons is not based on the Supreme Court's interpretation of the 2nd amendment as it applies to individuals - it's based in a 1968 and a 1986 law that is yet to be challenged at the bench on that level. The only auspices under which those limitations remain constitutional involve the interstate sale of the firearms (the commerce clause). As yet, the court hasn't ruled on privately produced and owned firearms that don't leave the boundaries of a state.

Ford Uses Google For a New Type of Smart Car 68

RedEaredSlider writes "Ford is using Google technology, specifically its Prediction API, to create a new brand of smart cars. The famous American car company announced it's teaming up with Google to use Prediction API in future cars. The API will be able to use historical driving data and turn it into real time predictions, such as where a driver is headed at the time of a departure. From there, an on-board computer might communicate with the driver, and trigger an optimized power-train control strategy. For an electric car, a predicted route of travel could include an area restricted to electric only driving. Thus, a plug-in hybrid would be able to optimize energy and preserve battery by switching to an all electric mode during travel."

Comment Re:Requested Resource Not Found (Score 1) 5

They've taken down the page already - that was quick. Here's the text of the email:

OHIO Students,

Due to extremely high demand, the university's Internet connection currently does not have enough capacity to meet service expectations and results in noticeably slow connections at times.

Traffic analyses have shown streaming media usage accounts for nearly two-thirds of our current demand, with Netflix being the largest single consumer of our Internet capacity.

In an effort to free up the bandwidth faculty and students need to complete academic online tasks during finals week, the university will be instituting a temporary limit on the total bandwidth available for Netflix traffic. The restriction will go into effect this evening, Monday, March 14 at 6:00 pm.

OIT appreciates your patience as this temporary corrective action is taken. We welcome and encourage your thoughts on a more permanent solution as we engage the university in planning on this critical issue.

Best regards,

J. Brice Bible

Chief Information Officer

Ohio University

Comment Re:Meet the new boss, same as the old boss (Score 4, Insightful) 646

Well, if it's the last piece of the pie, it's not much of a 'slippery slope' argument, now is it? In quite a real sense, we'd be giving the power to decrypt general internet communications to people who have a LOT to gain by using it against their political opponents.

Seriously, this has little use except to spy on the general public, while proposing encryption law that has been suggested and shot down in the past (think Clipper Chips?). It makes corporate/private encryption weaker, the entirety of our internet communications more vulnerable to attack, and could quite possibly restrict our ability, in the future, (yes, slippery slope) to encrypt our own data, as has already been done in the UK. This essentially serves all internet communications providers with the same order as the UK served their entire citizenry: you encrypt something, you have to give us the keys to decrypt it.

Hope that satisfied you logically.

Feel disillusioned? I've got some great new illusions, right here!