Forgot your password?
typodupeerror

Comment: If you think this is long.... (Score 1) 162

by jazzdude00021 (#46698435) Attached to: Judge (Tech) Advice By Results

...try a 4 year degree in education. As a second-year teacher with just BS Ed. (no Masters work yet) this exact problem (optimizing presented information so it is useful and effective to the majority of your audience) is a daily struggle. I like where this is going, but to anyone who thinks this is long, teachers learn this in college and then spend their careers perfecting the methodology - at least those that don't get burned out along the way...

Oh, and he's only dealing with people who WANT the information. Imagine the same scenario but 30/50 want to be anywhere else but hearing the presented information...

+ - New near-global interactive map for understand flood risk and surface water flow->

Submitted by Anonymous Coward
An anonymous reader writes "Using computations on the massive near-global SRTM surface model from NASA, the map lets you query watersheds, interactively set the sea-level and flood the world (North America at 500m increase in sea-level), or play around with river thresholds on a global or regional scale (computed rivers around NYC/NJ). It can be used to get an understanding for the watersheds and water flow paths in your local neighborhood, do you know where rain (or pollutants) that falls in your backyard end up? The map is freely available to the public."
Link to Original Source

Comment: (-1) Flamebait (Score 1) 250

by jazzdude00021 (#46318197) Attached to: Slashdot Asks: Do You Label Your Tech Gear, and If So, How?
Can we mod this whole article (-1) Flamebait and move on? I see enough troll food here to keep them fed for weeks.

Seriously, if you don't know how to label your stuff as yours and/or keep track of it, /. might just be a little too advanced for you. Even so, this is a community that openly discusses stealing copies of Windows and other legally questionable acts. The advice may be good, but we also know how to work around most of the preventions you put in place (and if we don't Google probably does).

But really, the only reason this article should exist on /. is to keep the trolls fed here so they don't interfere with actual insightful comments elsewhere.

+ - Environmental Report Raises Pressure on Obama to Approve Keystone Pipeline

Submitted by Hugh Pickens DOT Com
Hugh Pickens DOT Com (2995471) writes "Reuters reports that pressure on President Obama to approve the Keystone XL pipeline increased on Friday after a State Department report played down the impact it would have on climate change, irking environmentalists and delighting proponents of the project. The long-awaited environmental impact statement concludes that the Keystone XL pipeline would not substantially worsen carbon pollution, leaving an opening for Obama to approve the politically divisive project as it appears to indicate that the project could pass the criteria Obama set forth in a speech last summer when he said he would approve the 1,700-mile pipeline if it would not “significantly exacerbate” the problem of greenhouse gas emissions. The oil industry applauded the review. “After five years and five environmental reviews, time and time again the Department of State analysis has shown that the pipeline is safe for the environment,” says Cindy Schild, the senior manager of refining and oil sands programs at the American Petroleum Institute, which lobbies for the oil industry. Environmentalists say they are dismayed at some of the report’s conclusions and disputed its objectivity, and add that the report also offers Obama reasons to reject the pipeline. The report concludes that the process used for producing the oil — by extracting what are called tar sands or oil sands from the Alberta forest — creates about 17 percent more greenhouse gas emissions than traditional oil (PDF). But the report concludes that this heavily polluting oil will still be brought to market. Energy companies are already moving the oil out of Canada by rail. “At the end of the day, there’s a consensus among most energy experts that the oil will get shipped to market no matter what,” says Robert McNally. “It’s less important than I think it was perceived to be a year ago, both politically and on oil markets.”"

Comment: Re:Things that don't need to be connected to the i (Score 1) 96

by jazzdude00021 (#43304135) Attached to: Wi-Fi Enabled Digital Cameras Easily Exploitable

So at a sports event, a photographer might have one down behind the goal with a wide-angle lens, another pointing at the other goal, etc. etc. etc. - all uploading to the photo agency for up-to-the-moment imagery. Newspapers needed things soon, the internet needs it now.

Still decidedly embarrassing if they are so easily compromised, of course.

And now all I have to do is put myself somewhere in range of the remote controlled cameras, find an exploit, publish their photograph first and take credit for it. Much faster and easier than actually doing all the work.

I see where this technology is potentially very useful, but just like compromised "smart meters" and other "smart" appliances, cameras don't need to be a part of the "internet of things" unless you're cool with someone potentially watching everything you do with it.

The Military

+ - America's B-2 Stealth Bomber over South Korea - North Korea Beware->

Submitted by Anonymous Coward
An anonymous reader writes "Well for all of North Korea's talk, the United States seems to be one who can actually back up its words with deeds.

The US recently flew two B-2 Stealth bombers from Missouri all the way to South Korea to take part in military exercises.
In a statement from United States Forces Korea: "The B-2 bomber is an important element of America's enduring and robust extended deterrence capability in the Asia-Pacific region.”

At the bottom of the statement there was also a nice factsheet detailing all the capabilities of the B-2. It seems the US does not need to make threats, the fact sheet should do nicely."

Link to Original Source
Google

+ - Google Releases Street View Images From Fukushima Ghost Town->

Submitted by
mdsolar
mdsolar writes "Google Inc. (GOOG) today released images taken by its Street View service from the town of Namie, Japan, inside the zone that was evacuated after the Fukushima nuclear disaster in March 2011.

Google, operator of the world’s biggest Web search engine, entered Namie this month at the invitation of the town’s mayor, Tamotsu Baba, and produced the 360-degree imagery for the Google Maps and Google Earth services, it said in an e-mailed statement.

All of Namie’s 21,000 residents were forced to flee after the March 2011 earthquake and tsunami crippled the Fukushima Dai-Ichi nuclear plant, about 8 kilometers (5 miles) from the town, causing the world’s worst nuclear accident after Chernobyl. Baba asked Mountain View, California-based Google to map the town to create a permanent record of its state two years after the evacuation, he said in a Google blog post."

Link to Original Source
China

+ - U.S. and Russia--Not China--Lead List of Malicious Hosting Providers->

Submitted by Trailrunner7
Trailrunner7 (1100399) writes "China has become the go-to bogeyman behind every cyber attack or malware campaign, but if you're looking for the most malicious hosting providers on the Web, you won't find any of the top 10 in China. In fact, the United States and Russia have many more bad hosting providers in the top 20 than China does.

Those statistics, compiled in Host Exploit's quarterly World Hosts Report, are somewhat surprising, although they don't paint the full picture of the attack landscape. The malicious activity that Host Exploit tracks generally comprises malware hosting, botnet C&C hosting and the like, and does not necessarily include command-and-control servers for targeted attacks or the like. Still, the data the organizations compiled shows that the hosting of malicious servers is not a localized problem, it's a global one.

One other interesting data point is the appearance of Amazon in the top 10 list of providers hosting the highest concentration of infected Web sites. These are the kind of sites used in drive-by download attacks and to deliver exploits from exploit packs. Amazon, with more than two million IPs, ranks fourth in the list of providers hosting infected sites. Also on that list is Google, which comes in at number seven. The top spot belongs to Mail.ru, a Russian hosting provider."

Link to Original Source

Comment: Things that don't need to be connected to the inte (Score 4, Interesting) 96

by jazzdude00021 (#43278123) Attached to: Wi-Fi Enabled Digital Cameras Easily Exploitable
Seriously, this is one of them. I love the idea of sharing and all, but we can wait to see your vacation or ...other... pics more than 15 minutes after you take it. A camera does not need to be directly connected to the internet, and all it does is open up potential security flaws. Find a good way to remotely exploit this and next thing you know, you can just take a vacation vicariously, through someone's (unsuspecting) lens. With the way tablets, smartphones etc are going, they can be great and (more) secure gateways to posting things, plus it gives you the chance to *filter* your photos...

Comment: Re: Fixed (Score 1) 1106

by jazzdude00021 (#43010949) Attached to: The U.S. minimum wage should be
"Don't bother. The anti-minimum-wage crowd left their intelligence at the door. It's an emotional issue, they don't want poor people to make any more money." Don't bother. The pro-minimum-wage crowd left their intelligence at the door. It's an emotional issue, they believe that corporations are evil and the ultimiate solution is the redistribution of wealth. Think that sounds ridiculous? Me too, just as ridiculous as your quoted assumption about the anti-minimum-wage group. Let's try it this way: "Since the economists can't give us a clear yes or no on the impacts of raising the minimum wage, people are divided on the issue, sometimes preferring to read pundit's comments instead of researching and thinking for themselves. It's annoying as hell and it comes from both sides of the aisle." Or you could stick to your assertation and continue the vitriolic rhetoric of your particular political tribe.

Comment: Re:Could the summary possibly be more slanted? (Score 1) 530

by jazzdude00021 (#42021191) Attached to: How Free Speech Died On Campus
It's this exact attitude that has caused the USoA to become the political cesspool we are right now. Political debates are nothing but ad hominem attacks disguised as political talking points.

Take the Fordham case for example. If they host Ann Coulter it opens them up to ad hominem attacks from people who would rather dismiss them by saying "they're the same as that racist, sexist *-ist" than actually take the time to come up with a rational response to debate her points. The result: the institution capitulates to the threat and she is, in effect, censored from campus.

Murdoch may be a shady character whose only ambition in life is to see how big of a bank account he can rack up, but that doesn't discount the issue his company (WSJ) is presenting. We need to learn to separate the person (Murdoch, Coulter, etc.) from the issue.

No wonder we have bullying issues in school....

"Stupidity, like virtue, is its own reward" -- William E. Davidsen

Working...