Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - White House Petition Signatures Needed for Helium Supply Closure->

Submitted by Anonymous Coward
An anonymous reader writes "With the pending closure of the Federal Helium Reserve on October 7, 2013, we are facing a loss in the availability of 42% of the US crude Helium supply and 1/3 for the world's supply. Helium's unique physical properties make it vital for scientific research, medicine, hospitals and manufacturing, and greatly reducing its availability will have a devastating impact on these industries. We are requesting your help by signing our We the People petition to the White House."
Link to Original Source

Comment: A shocking statement (Score 4, Insightful) 692

by digitalderbs (#44553891) Attached to: Larry Ellison Believes Apple Is Doomed
No one would argue that Steve Jobs made important contributions to modern computing. However, it's hardly surprising that a CEO, such as Ellison, would have an inflated perception of the importance of one individual (i.e. the CEO) to the success of a company. If he didn't believe that, then it would be hard to justify the millions he pays himself every year.

Comment: I don't think this will work (Score 2) 40

by digitalderbs (#39693137) Attached to: Microryza Brings Crowd-Funding To Scientific Research
And this is why: regular people aren't qualified to evaluate good research. They also aren't qualified to evaluate research progress. I don't think you can produce a sustainable system for funding without review from your peers. You need experts to look at a carefully designed research project and decide whether it's feasible, worth the investment and whether the researchers are qualified to do the work. A system built without peer review may be successful at first, but ultimately, it will lead to disappointment and wasted money. (That said, it would be better if there were a mechanism to donate your money directly to the NSF and NIH extramural research funding agencies with targets for, say, AIDS research or superconductors.)

Comment: Re:Did he find his stolen lightsaber? (Score 3, Insightful) 128

by digitalderbs (#39317485) Attached to: Profile of a Real-Life Jedi Academy
Yes, and according to this article, that lightsaber cost $700, which answers his question from the first article, "why would someone steal a lightsaber?" -- because, apparently, someone is willing to pay $100-$5000 for one (or lift one from a bar that is being passed around.......)

+ - Free Multi-user Remote Desktop Management

Submitted by digitalderbs
digitalderbs (718388) writes "I'm setting up a research lab in physical chemistry, and as part of my setup, I'd like to get a server with 8-12 cores that can be used by my students and post-docs. I'd like to give desktop (GUI) access to each of my users so that they may use software licensed only for that computer. I've tried X-forwarding with ssh on a fast network, and performance is definitely an issue. I'm looking for a free (and preferrably open sourced) system for managing multiple remote desktop sessions. VNC is of course the standard, and it works well but, from what I can tell, lacks multi-user session management. The NoMachine NX server works wonderfully on both low and high latency networks, but it's limited to two concurrent users. Alternative NX server implementations exist, including FreeNX, x2go and Google's neatx. What are your recommendations for remote desktop management client and server software for 6-12 concurrent users over a high (100Mbps) or low (1Mbps) bandwidth connection?"

Comment: Spotify a promising alternative to Pandora (Score 3, Informative) 170

by digitalderbs (#38849481) Attached to: How much of your music/video entertainment is streamed online?
I had a 1 year subscription to Pandora, and last month, I switched to Spotify. I found Pandora's rotations to be too limited for a given radio station. With Spotify, you can listen to whole albums and actually choose what you'll listen to. It has a related artist radio function, just like Pandora, and if you pay the $10/month subscription, you can download all of these tracks to portable devices like iPods--up to ~3300 or so tracks offline at a time. Now, instead of buying a few CDs (which I may or may not like), I'll just download them to my iPod with my Spotify premium subscription. Their collection has only been limiting in very few cases for me.

note: I'm not affiliated with Spotify. I'm just very happy with the switch, and I think more people would do online streaming--whether video or audio--if they had access to vast collections of media and the ability to watch or listen offline.

Comment: I don't use it for the encryption (Score 5, Insightful) 601

by digitalderbs (#38429880) Attached to: Do Slashdotters Encrypt Their Email?
I've been using PGP for a few years, and on the odd occasion, I'll send an encrypted email to myself. Part of the problem is that no one knows how to use PHP. I've been sending email to thousands of people in an academic setting, and I've only encountered one other person using PGP.

The reason I keep using PGP, however, is because of digital signing: there's a good guarantee that signed messages were actually sent by me. Headers are fairly trivial to spoof. With PGP, a 'hacker' can only impersonate me if they have access to the private key, which requires physical or ssh access, and he or she must be able to decrypt that key.

That said, I wish more people would encrypt their messages. This should be a no-brainer in a lot of fields, including human rights and for health and human services, and I think the barrier to commit to email encryption is still too great.

Comment: Very simple text-based implementation (Score 2) 248

by digitalderbs (#38152602) Attached to: Secure Syslog Replacement Proposed
Signing log messages does not need to be complicated or incompatible with current text-based logging. Hashing messages is incredibly easy to do, and there's really no reason not to do it. I just implemented this in python in less than two minutes.

>>> from hashlib import md5
>>> log = lambda last_message, message: "{}: {}".format( md5(last_message).hexdigest(), message)

The output hashes the last message with the current message:

8a023b9cbebe055e4b080585ccba3246: [ 19.609619] userif-2: sent link up event.
649a2719064f7f276462464527b48a69: [ 29.680009] eth0: no IPv6 routers present

No binaries, still grepable, single host and most importantly, there is now a trail that can be verified.

If they can make penicillin out of moldy bread, they can sure make something out of you. -- Muhammad Ali