Forgot your password?
typodupeerror

Comment: Re:whoopdee doo (Score 1) 46

by sharp3 (#40483827) Attached to: Google I/O Day Two
Autonomously driving cars are awesome! Think about how many deaths could be prevented and how much more efficient/fast travel would be! Why don't they have a convention for autonomous vehicles with this type of publicity? Syncing stuff between phones and PCs offers about a 0.0000000001% improvement in my life quality. On another note, I see they had some cool contributions on a 1000 core cluster. Good for them.

Comment: whoopdee doo (Score 0) 46

by sharp3 (#40482505) Attached to: Google I/O Day Two
All these things are cool I guess, but not really innovative. Google needs to develop more interest in things that can have an impact on humanity instead of small technical changes to consumer products that only techy nerds care about for 15 minutes. Yes, I know they do useful things, but a whole convention for these little contributions are pointless.

Comment: Re:CUDA C++ and Thrust (Score 1) 187

by sharp3 (#36459180) Attached to: Microsoft Demos C++ AMP At AMD Developers Summit
I think that the whole point of the presented AMP work is the portability that is possible. As far as I could tell from the presentation, the same executable was used to explore the various hardware configurations on a single machine. It wasn't necessary to recompile for all of the various architectures, unlike when using CUDA when you would utilize an API to move data back and forth from the GPU. This is pretty cool, and I look forward to reading the details that comes out of this. Hopefully Microsoft is kind enough to publish some white papers..
Image

Woman Trademarks Name and Threatens Sites Using It 273

Posted by samzenpus
from the keep-my-name-out-of-your-mouth dept.
An anonymous reader writes "Be careful mentioning Dr. Ann De Wees Allen. She's made it clear that she's trademarked her name and using it is 'illegal... without prior written permission.' She even lists out the names of offenders and shows you the cease-and-desist letter she sends them. And, especially don't copy any of the text on her website, because she's using a bit of javascript that will warn you 'Copyright Protect!' if you right click on a link."

Comment: Random, but related (Score 3, Interesting) 84

by sharp3 (#32750956) Attached to: Some Google Searches Now Blocked In China
On a sort of random, but related note...
A recent foray into the underworld of chatroulette led me to a conversation with two Chinese nationals, although admittedly I WAS looking for naked fat bald men... They asked me what I thought of Obama, and I told them I wasn't fond of socialist or communist policies that manage vast amounts of my paycheck for me. I asked them what they thought of their government. Their only response was a single word: "love".
It showed to me that the average Chinese citizen is keenly aware of the ability of the government to spy on them and monitor activities. It also seemed as though there was some degree of fear. Granted they weren't afraid of talking to me or asking about the United States, but talking about their own government was a big no no, and could bring reprisals.

Comment: really? (Score 2, Insightful) 443

by sharp3 (#32745914) Attached to: The State of iPad Satisfaction
Why would the average iPad consumer care about the app approval process? The average iPad buyer is not a developer. If that's the best complaint that they can manufacture in this article, I'm inclined to say this is an anti-Apple article with questionable researching techniques. Although, I didn't RTFA, so maybe I missed something.
The Internet

+ - New Northern Arizona Univ. Internet policy 2

Submitted by Anonymous Coward
An anonymous reader writes "I'm a student at NAU, and just today I told to use a software called SafeConnect that will monitor my computer for violations to the terms of Use (which follows)
"Internet Use Policy

All computers attached to the Campus Network must have appropriate software running on their machine to ensure a secure environment for all users. Campus Network will provide the monitoring software to ensure compliance with this policy. The software will assist students in maintaining their computer's in the manner prescribed by Campus Network . Software needed to ensure a secure environment will include:

                * Campus Network approved anti-virus software
                * The most current security patch software for your operating system(s).
                * Monitoring software to ensure that copyrighted files are not freely shared over the internet.
                *Other software as periodically deemed appropriate by Campus Network to ensure a safe and secure Internet and Intranet for all students and faculty.

In addition, bandwidth consumption is monitored to prevent inappropriate use of university resources (for example, setting up a public web site from a dormitory room). Students are asked not to exceed 1 GB of bandwidth use per week. No enforcement will occur at present, however we will be monitoring use and taking more affirmative action if there is wide violation of this policy.

The use of the Campus Internet Service is a privilege that may be revoked at any time for inappropriate behavior. Such behavior would include but not be limited to the use of obscene, abusive, or otherwise objectionable language and/or materials in either public or private messages.

The primary purpose of the Campus Network is to support students' educational goals. In support of these goals, the following activities are prohibited with express written consent of Campus Network . Participating in these activities may result in revocation of Campus Network without refund and possible University judicial action and/or criminal charges.

        * Setting up a router and building a private subnet.
        *Setting up any type of information server such as a web, gopher, e-mail, game, etc.
        *Propagating e-mail chain letters.
        *Forging mail.
        *Allowing unauthorized persons access to Campus Network .
        *Using Campus Network for personal financial gain.
        *Copying University-owned or licensed information to another computer without prior written approval.
        *Copyrighted files and software cannot be shared over the Campus Network .
        *Modifying or attempting to modify University-owned or licensed information including software and data.
        *Attempting to damage or disrupt networking services.
        *Using the Campus Network , the University'(TM)s campus-wide network, or related resources in the commission of a crime.
        *Using traffic intensive applications that may cause problems within the network or diluting the level of service to other users. No print servers, mail servers, FTP servers, etc. are allowed. The network sharing of any computer-related device or materials that may cause excessive network traffic is forbidden.

The user is not allowed to share her/his RJ45 Ethernet port with more than one computer/device at the same time. This prohibition includes any use of hubs and/or switches which would permit the user to connect more than one computer/device to the RJ45 Ethernet port and share the port with others or herself/himself.

The user will abide by all policies and statues included in the Computer Crimes Act. Crimes against this Act will result in University judicial action and/or investigation by the University Police Department for criminal offense. The Act includes offenses against intellectual property; offenses against computer equipment and supplies; and offenses against computer access. The Computer Crimes Act is available at each area office."

Want I wonder is this legal, and is there any way to fight this new policy, i understand some of it but what I don't like is this gives them access to all my private messages and accounts"

A Fortran compiler is the hobgoblin of little minis.

Working...