Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Gettin' a tan. Slowly. (Score 1) 264

I use multiply monitors as well and for a very similar reason as yours, I just can't play MMORPGs any more.

A while back, I played a lot of Anarchy Online and got used to playing with 3 PC/monitors, 2 active characters with side-by-side monitors and stacked keyboards/mice and another PC/monitor off to the side with a character standing around in town as a shop. Ever since then, anything less that 2 characters at once feels slow paced. Admittedly, I am more of a RTS player than RPGer or FPSer.

Comment Re:Projectors? (Score 1) 264

Similar here, 106" Projection and a 17" monitor for my main PC in my living room, and I have another PC in the same room with a 19" CRT connected to my music sound system and that I also use for my VOIP phone and general network storage accessed via VPN.

That's all besides the 8-12 functional 16" - 17" CRTs in my basement and 5 - 6 functional towers all over my house.

2 Towers and 3 displays should be enough for anyone....

Comment Re:I had one of these when I was a kid! (Score 1) 182

1. It would depend on whether they can discriminate between that and any other frequencies being used.

2. They would need to know what method of modulation being used, AM, FM, Single sideband, dual sideband, etc.

3. When audibly scanning frequencies, most encrypted traffic is indistinguishable from static.

Let's say you had a spectrum analyzer and hooked it to an antenna and you had an antenna that you could electronically adjust the length (antenna length is a factor in broadcast and receiving frequencies) and you specifically focused on the frequency ranges used by the military, under ideal conditions you may be able to determine signal strength indications showing you a range in which you may be able to potentially jam. Functionally, you are looking at having to use a computer program to do it fast enough and is able to discriminate between other background freqs in that area. It would be time consuming with a large number of false positives.

All of that would be if they were using low frequencies, now if they are using Higher freq. Line of Sight or Satellite bouncing communications you would have to get right in the path of the transmission to even tell it was going on. And even then, those methods work well because you do not have to put as much power into it.

Comment Re:I had one of these when I was a kid! (Score 1) 182

Why would losing the drone compromise the secure communications channel? The drone should have a unique private key, as should HQ.

Makes no difference when the enemy is radio jamming. It would be much easier to build/modify a radio transmitter to jam signals and make the UAV unable to be remotely controlled for an area than it would be to actually intercept and take control of the UAV. I would suggest that the primary concern is that the UAVs transceiver can be reverse engineered for the frequency range/channelization and then create a device that would allow for easy end-user jamming.

When I worked on radio systems in the Navy we had some radio modules that would also allow for frequency hopping to avoid potential frequency jamming, combined with usage of encryption and daily keys made for a pretty effective system.

Comment Re:Wow (Score 2) 369

I have mod points and was interested in your comment. Having looked over all the comments and UIDs, I must say you are factually incorrect. At the time of the writing of this post, I only found 1 registered commenter with 3 comments with a UID greater than 2 million.

I am no right wing apologist and believe my comment history will speak for itself.

Submission + - Using the Open Records Law to Intimidate Critics (nytimes.com) 4

Layzej writes: On March 15 Professor Bill Cronon posted his first blog. The subject was the role of the American Legislative Exchange Council in influencing recent legislation in this state and across the country. Less than two days later his university received a communication formally requesting under the states Open Records Law copies of all emails he sent or received pertaining to matters raised in the blog.

Remarkably, the request was sent to the universities legal office by Stephan Thompson of the Republican Party of Wisconsin, with no effort to obscure the political motivations behind it. In a recent editorial the New York Times notes that demanding copies of e-mails and other documents is the latest technique used by conservatives to silence critics.

Comment PDF Version (Score 1) 74

From comments of original article:

kregg says:
March 22, 2011 at 9:44 pm

Just for those who don’t like or have trouble browsing through the images, I’ve made a PDF Version of the high-resolution image documents for convenience. All pages are in the right order.

Also, I don’t own any rights to these images, these still are of Copyright to Mike Dailly, I’ve just put the images together in a PDF format for easy reading.

Comment Re:Wow, what will THAT outlet look like? (Score 1) 335

Agreed, I think this quick charge application would be best saved for recharge stations and not for home use.

The best usage of this technology would be for solving the long distance traveling problem of purely electric cars.

Trickle charge for home use and fast charge at refueling recharge stations for long trips.

Comment Re:This one has me worried (Score 1) 233

As for where they break the story, probably after the Spiders and having the dwarves doing their barrel ride, else after the trolls. I am not really sure where a good break is with this book but those the two major events before getting to the Lonely Mountain.

It really would depend on where exactly PJ decides to pad out the side questing of Gandolf and any cut scenes to Sauramon and possibly Gollum (it would surprise me if extra Gollum scenes were not added to this one.) I would suggest right after the spiders just as they encounter wood elves or possibly when they meet with Beorn . The trolls are just way too early, they are the first baddie encounter in the book, 2nd chapter.

Recruitment - Trolls - Rivendell - Mountain Goblins - Gollum/Ring - Wargs/Goblins (treed) - Eagles - Beorn the Bear - Spiders - Wood Elves/Barrels - Lake Town - Lonely Mountain Back Door - Bilbo Burgles Smaug - Smaug Dies - Battle of Five Armies - Bilbo Returns to Shire

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...