Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Comment Re:Sunlight has a large electromgnetic field (Score 1) 456

Bullshit. Exposure to RF is inducing cancer because it randomly changes DNA. The dose does not matter in this effect.

Bullshit. Wavelength is not a dose.

Long-wavelength RF, below the ionization threshold, does not cause cancer because it lacks the energy necessary to "randomly change DNA". You're right, the dose doesn't matter -- sub-ionization RF doesn't cause cancer.

Comment Re:Amazon has gone for obfuscation as business mod (Score 1) 259

I order quite a bit from Amazon, including things that split shipments (ship different days or are a mix of Prime and non-Prime). The "Your order [...] has shipped!" e-mails list an amount charged for the items that actually shipped, and these are the same values that appear on my credit card. While the default "Your Orders" view on the website groups things by order (which is not the same as shipment or credit card charge), the "Invoice" link on each order breaks down the order correctly (by shipment, with separated charges). These also match up with credit card charges.

Comment Re:n=6? Seriously? (Score 4, Informative) 96

I know the Slashdot trope is that n is always too small in any study, regardless of the actual size of n.

The sample size you need to demonstrate statistical significance (or, conversely, the level of statistical significance achieved for a given sample size) depends on the behavior you're measuring. If you're measuring a small change in a rare occurrence, you need a very large sample population. If, on the other hand, your hypothesis is "black sheep exist" or "this vaccine reduces the mortality rate of a disease that has an untreated survival rate of 1 in 100,000", then a single occurrence (black sheep, surviving subject) is significant at n=1, and two occurrences out of even a tiny n is excellent.

Comment Re:Strange limitations (Score 2) 105

Shade, local terrain, building codes, subsidies, power company buyback policies and rates. There are also a lot of odd business arrangements that are localized that can dramatically reduce the solar capital cost.

I have no idea if they account for any of these factors, but there are certainly a lot more factors than weather-adjusted annual insolation.

Comment Re:Enough with the "democracy=freedom" tripe (Score 1) 124

The US has officially been proven to be an oligarchy as described here

You know you're on the Internet when a single study counts as "official proof".

Now you just need someone to reply asking for confirmation, then a person to reply that it is confirmed, since they saw that the same study does in fact exist. (Needless to say, no involved parties have read the study.)

Comment Re:Hostile governments... (Score 3, Insightful) 124

Yes. That is made clear. Almost all of the article is about the NSA's capabilities. Then, at the end, some text, including the quoted part, about how this is important even if you don't mind the actions of the NSA.

"Even if you're not inclined to view the NSA as an adversary ... America is hardly the only intelligence agency capable of subverting the global communications network. ... While it's cheap to hold China out as some sort of boogeyman, it's significant that someday a large portion of the world's traffic will flow through networks controlled by governments that are, at least to some extent, hostile to the core values of Western democracies."

Comment Re:keep honest people safe (Score 1) 177

No they don't. The likelihood of collisions depends only on the effective number of bits in the hash. If you have a 32 bit hash, and more than 2^32 images, you are guaranteed to have collisions.

Yes, they do, because the shortest available cryptographic hash has a 128-bit output.

Comment Re:Image hash too simple to bypass... (Score 1) 177

Its not a hash in the sense of MD5/SHA etc that hashes the file contents at the byte level.

It's MD5, SHA1, and PhotoDNA hashes.

The standard in most law enforcement forensic applications is MD5 / SHA1, despite the obvious limitations.

Sadly, it still is reasonably common to encounter byte-identical images that are on the relatively small "known-bad image" hash lists.

The reason computer chips are so small is computers don't eat much.

Working...