Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:Different types of terms (Score 1) 175

So would it be "LAMEAN" perhaps? :)

Pretty sure that this is a deliberate attempt to make the project have a more appealing name. LAMEAN is likely to be pronounced with a bad Spanish accent, "La MEAN," or pronounced as two words, "LAME AN." I can hear someone saying, "That project was LAME AN' just not worth it."

Comment Re:Ok I'll try: (Score 2) 67

From what i can quickly gather from the article:

This is all based on magnonics, which in short - is the use of magnetic spin for binary storage and or logic. This device focuses on the later...

From what I could tell from the article, it appears to focus on both. The device allows them to quickly create and store a pattern. It then allows another pattern to be created and quickly compare the patterns.

It does this by constructing a matrix of magnetic nodes that are effectively interconnected to neighbours (moor?) via spatial magnetic-spin sensitivity, these interconnects form the dynamic logic processing ability of the matrix.

I think that this is somewhat like a (soft) convolutional artificial neural network for image recognition, these are constructed out of a 2d or 3d matrix of nodes with weighted interconnects in a moor-neighbourhood arrangement. The difference here i guess is that a) it's done with magnetic spin (i really have no idea why this is an advantage, maybe i'm all wrong about this) and b) being an application specific piece of hardware each node works in parallel (this is trumped as the primary reason for the speed potential in the article).

... Big disclaimer: I am massively speculating because the use case is not made super clear.

From what I could tell, the advantage of the magnetic spin is that with an 8 terminal node, it can quickly create a matrix of 1,000 bits of data. It can then compare that matrix with a stored matrix. With several nodes working in parallel, it takes the same time to compare 1,000 bits of data as 10,000,000. The potential (and right now, only potential) is that a computing device with this hardware integrated in could compare an image with a stored image much faster than conventional circuits could make the comparison and result in a better matching algorithm.

Comment Re:But... (Score 1) 101

Can you change the price?

From the article photo, it looks like the 'pump' is actually some sort of monitoring device used to track how much gas/diesel is in the storage tanks. I imagine that gets used by suppliers to anticipate delivery requirements.

I don't know if the same system is used to control the pricing at the customer pumps, and the article doesn't make it clear. I'd guess than since this was published there are going to be some who will be trying it out though.

Depends on the monitoring device. Some of the monitoring devices connect to both the pumps and the tanks so that you can compare how much gas was pumped vs how much gas is left in the tank. Although it is not 100% accurate, if there are leaks or pumps that are way out of calibration, the device might be the first indication that there is a problem. And yes, the major use is to track how many times a tanker needs to come by and fill up the storage tanks.

On systems with Pay-at-the-Pump that take credit/debit cards, the same device connects the pumps to the authorization systems. Sometimes this is over a phone line, but some deal with satellite or internet connection to the authorization centers. These monitoring devices have a lot more control over what is displayed at the pump, and sometimes you can change pricing through the device. The ones that have this kind of control are *supposed* to have better security, but having to type a pin or password each time you connect to it is "really inconvenient."

Comment Re:Star Traders? (Score 1) 227

I LOVE that game!! Don't want to be a trader? Try being a smuggler!
Don't like smugglers? Be a Bounty Hunter!!
Fighting not your style? Play an Explorer!
Maybe intrigue between factions is more your thing. Play a Spy!
There are many ways to play Star Traders.

Come to think of it, I play Star Traders on Android, so maybe that is why this new game is only for Windows, OSX, or iPad. The market already has this game (or a better game) on Android.

Comment Work with your Optometrist! (Score 1) 464

I have progressive lenses and work on computers all day long. But my first pair were horrible! When I complained to my optometrist, he asked me to demonstrate where I held my book/phone for reading. He explained that my distance was not average, but that he could adjust the focal length to fit. The second pair of lenses was much better.

Remember Knarfling's Universal Law of Individuality. "No one else is me!" Your optometrist usually makes a good guess at making your glasses fit your eyesight, but he is not you and cannot see what you see.

Some people never get used to progressive lenses. Some people cannot live comfortably without them. Only you are you, and only you will know if progressive lenses will work for you. But if you never tell your optometrist about the problem, there is no way he or she can fix it! When you do go back in to explain the issue, be prepared to demonstrate the distance from your eyes to your reading material. It will make a difference.

Comment Definition of ClickBait (Score 2) 238

It all depends on you definition of clickbait. The most strict definition is bait that makes you click somthing. It could be a link in an email, or a link on a web page. Since some people, not just advertisers, keep score by the number of clicks they receive, and clickbait is something that gets people to click.

A more broad definition would include clicking on a remote control of a TV. News programs are famous for clickbait lines designed to keep you from clicking the remote to a different channel. "When we come back...." It is all designed to keep you watching their advertisements, or watching their news. (Sometimes there is no difference between news and advertisements.)

To me it is all the same. Once in a while it is worth it to click/watch, but most of the time I remember that they don't really care if I learn something or am entertained. To them I am one more set of eyeballs or one more mouse click. Anything as long as they can get me to "click," and I increase their score by one.

Comment Re:I watched half an episode (Score 1) 193

I don't like receiving my packages unbroken, could we use UPS instead?

ummm.... perhaps I should clarify. While charging "shipping and handling" implies that something will be shipped, I did not actually say that the bridge would be shipped. Only that you would be charged shipping and handling fees at FedEx rates.

Comment Re:Death bell tolling for thee.... (Score 1) 322

I have to agree. I think I understand why they want to do this: Only one code base, less overhead and more profit.

But it is a stupid idea. The different devices provide different functions and shouldn't look the same or be the same. Servers are different from desktops which are different from tablets which are different from phones.

For those who need a bad car analogy, it is like trying to put the same user interface on bicycles, motorcycles, cars, trucks and trains. No one complains that their car doesn't have handlebars. Or that there is no steering wheel on a their bicycle or motorcycle.

Comment Re:This makes sense. (Score 1) 280

The 90 day password change is a fixture of compliance regulations. If you deal with PCI, SOX or HIPA, you probably have to force password changes every 90 days. With PCI, you can lose your ability to take credit cards if you can't show that you force password changes at least every 90 days. (There are ways around it, the most common is lying to the auditor, but that is a different story.)

I have my own theory as to why the 90 days became standard, but was told that my theory was all wrong without any explanation as to why it was wrong. Suffice it to say that 90 days is a standard and if anyone really knows why it became a standard, they aren't talking.

If you ask an auditor, they will tell you that if someone does find your password, either through a key logger, finding your post-it or cracking your password database, they will only have a limited time before that password is changed. You don't even have to know that someone got your password if you change your password on a schedule. Of course, it might not take long before they learn the new password, but that concern is usually dismissed.

Comment Re:This makes sense. (Score 2) 280

We are, regrettably, impeded by whacked out sysadmins who insist we must use THEIR idea of a strong password -- which always seems to be different from anyone else's idea of a strong password, and/or that we need to change passwords periodically, and/or that we can't reuse passwords.

I sometimes seems that there is an inverse relationship between the actual need for security and the system administrator's perception of the need for security.


I tried to do something basically like this - I have three password strengths, one for low-security throwaway stuff, another for regular stuff (with suffixing so one compromised site won't affect others unless I am specifically targeted), and a max-security one.

Guess which one I use for banking. It's the mid-tier one, MINUS the special characters and suffix. They have an upper length limit that keeps my max-security password from being used for the one thing it really should have been used for.

The only thing that max-security password secures now is root access to my BSD box (and I have sudo set up with nopw, so I never even use that). Everything else is secured by something that really isn't secure enough.

So in other words, nothing has your max security. if you left your screen open and unattended for a moment, a person wouldn't even need your password to crack your BSD box. I hope your BSD box doesn't have anything important on it. The nopw option of sudo should NEVER be used. It is like putting a huge un-pickable lock on your door and then never locking it because it is too inconvenient to pull your keys out. If you use sudo (which I do use often and I believe it is useful, convenient and CAN be secure), you should make sure your password is complex and you need to type it in when you use sudo. Otherwise, you are reducing your security. Yes, sudo can be restricted by host, but most people do not do that, and what happens when that host dies?

I understand that good passwords can be difficult, but they don't have to be. Once I learned how to create good passwords, it became very easy. Even my low security passwords are fairly complex and will pass most complexity requirements. My work password, which has to be changed every 90 days, is usually between 14-20 characters long, has multiple complex characters, and is easy to remember. Although work allows rotation after 6 passwords, I have not re-used a password in six years. My biggest issue is not remembering the password, it is fat-fingering such a long password. The longer it is, the more likely there will be a fat-finger at some point.

"The Mets were great in 'sixty eight, The Cards were fine in 'sixty nine, But the Cubs will be heavenly in nineteen and seventy." -- Ernie Banks