Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment Re:Aha (Score 1) 212

The hangers are the adult stage, and if you open your closet very quickly sometimes you can catch them mating.

I told this joke in Japan once and got a polite explanation that (1) socks don't go missing because Japanese people usually hang up their laundry to dry (2) they don't keep other people's pens because they are other people's property and besides they have their own pens (3) hangers don't accumulate because they return them to the cleaners.

Comment Other QRSS modulation projects (Score 3, Informative) 82

This modulation scheme is called QRSS and can also be used to send very low power (milliwatt and microwatt) signals around the world ionospherically, and on bands such as VLF (very low frequency). Here the open source from a couple of projects by Hans Summers from a book I edited for the ARRL on the Arduino: http://hamradioprojects.com/authors/g0upl/+qrss-attiny/ http://hamradioprojects.com/authors/g0upl/+mm-shield/ and plenty of links about QRSS from there.

Comment Re:Smart move (Score 2) 457

Voltage? Not 5V? I took a quick look through the USB Power Delivery docs and didn't see that.
Wikipedia doesn't mention it either, though it does discuss the raising of the pre-negotiation current limit from 0.5A to 1.5A, and the max negotiated limit at 5A, which would be 25W.


Do you have any links on the higher voltages?

You probably already understand, but many do not, that you cannot push or provide current at 5V that the device doesn't want. If your device will draw only 500mA due to its internal design, attaching it to a 2A or 5A port won't do anything.

Comment Re:Symbolics, Lisp Machines, RMS, GNU EMACS (Score 1) 201

Carl Hewitt's "Actor" model, which is the basis for Erlang, was first implemented on multi-server systems on Symbolics Lisp Machines at the MIT-AI lab. The CADR machines could not be produced fast enough to dedicate enough to the project but when commercial ones were available Carl got a grant and bought 6 of them and they called it the Apiary. They didn't use it all the time so i thought of it mostly as a source of free machines, and we are now only just getting to the point where the multi-CPU network based shared nothing architecture begins to be a mainstream approach.

Comment Careful setting dates (Score 1) 169

In late 1999, we tested a product by rolling the date forward to 2000-01-01 and it worked fine. Then we rolled the date back to the normal date, and files that got touched during the test period caused trouble, because their modification date was "IN THE FUTURE!?!?!?" as one piece of code put it. The most broken was the timestamp data for a time-based UID generator, which flat out refused to run, saying that it was in danger of generating collisions.

Comment Re:The Internet Archive already has a good design (Score 1) 69

See archive.org...

Yes, that's in the original submission, as you see above. For the record, Brewster Kahle (who founded Archive.org), Jeff and Danny (who did this project), and I are all MIT alums, and the "Internet Archive scanning robot" is from a company called Kirtas, which also has ties to Xerox.

Comment Re:Having looked at the design... (Score 1) 69

In point of fact, for individual scanning, the video even mentions that this linear scanner is SLOWER than a manual scanner such as the diybookscanner. The gains come in that since its automatic, a single person could keep 8 or 10 of them running at at time.

Yup. Progress in clock speeds has pretty much slowed down, and Google appears to expect future performance enhancements to come in the form of parallelism


Submission + - Google open non-destructive book scanner; books and libraries rejoice (google.com)

leighklotz writes: "Google released open hardware designs for a book scanner that "sucks" pages to turn them, using a vacuum cleaner. The Google Tech Talk Video starts with Jeff Breidenbach of the Google Books team, and moves on to Dany Qumsiyeh showing how simple his design is to build. Could it be that the Google Books team has had enough of destroying the library in order to save it? Or maybe the just want to up-stage the Internet Archive's Scanning Robot.

Disclaimer: I worked with Jeff when we were at Xerox (where he did the awesome hack Gnu Chess on your Scanner), but this is more awesome because it saves books."

Comment Email theft (Score 2) 148

Email lists are regularly stolen from ecommerce and info sites, as anybody who owns their own domain for email and can give out single-use email addresses knows. I report it every time it happens, and I've only gotten a positive response once, from Walgreen's Photo. Everybody else either fails to answer or points me to their privacy policy (as if that somehow prevented them from having data stolen). My suspicion is that there is a back-door or two in popular mailing-list software that ecommerce sites use; it can't be *that* many corrupt insiders stealing and selling email addresses to have actual human inside involvement.

If it's worth doing, it's worth doing for money.