Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
US patent 7144326 has some diagrams.
The Thompson coupling was invented not long ago, and I remember being amazed that there was anything new to be done in the area of mechanical power transmission. And now this. Are we all done now, or is there more still?
Having the researchers pay for publication is not such an outlandish idea. I've heard it promoted on NPR's Science Friday. The argument is that publishing is part of the research effort and funding for both should go together.
...bypassing his DRM featured house...
Wouldn't that be more like ARM-featured house, as in Analog Rights Management?
This is a worst case solution since it would imply that the brain is not understood yet.
That's not too bad. When we build one of those, we can afford it with a probe facility that it can use to observe and manipulate its own brain or clones thereof. It can then find out how its brain works and tell us, or code up a minimal AI if we want that.
"Something you know" isn't what counts when it comes to protecting you from self incrimination; it is whether the "something you know" is incriminating you.
This leads to an interesting idea. Claim that you passphrase is a confession. If you plan ahead, you can even make that claim true. Encrypt your plan to assassinate the president with "I plan to assassinate the president OV:}A7MC".
As it turns out, it appears to be a simple off-by-one error in BIND, which favors new NS records over cached ones (even if the cached TTL is not yet expired). The patch changes this in favor of still-valid cached records, removing the attacker's ability to succesfully poison the cache outside the small window of opportunity afforded by an expiring TTL, which is the way things used to be before the Kaminsky debacle.
Source port randomization is nice, but removing the root cause of the attack's effectiveness is better..."