Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Freedom is born where oppression reigns (Score 1) 173

This is interesting to me, do you have a link about the illegal groups thing?

Australians do have a "constitutionally upheld" right to free speech according to the High Court, see http://www.aph.gov.au/LIBRARY/Pubs/RN/2001-02/02rn42.htm for details. While the ruling isn't as broad as the the US 1st Amendment it still provides freedom of political communication. With this ruling it would be difficult for any Australian law to outlaw a political party.

Comment Re:This law helps network administrators do their (Score 1) 183

EFA opposes the construction of 'appropriately used' in s 6AAA of the exposure draft. We submit that the definition in s 6AAA ought to be amended to reflect that operators are only entitled to intercept and monitor communications where those communications pose a threat to the security of the network itself.

Personally, I'd want the ammendment to be clear that it applies to network troubleshooting as well as network security so that network administrators can definitely use tools like Wireshark to fix their network.

Real Time Strategy (Games)

Submission + - Emergent AI in an indie RTS game. (blogspot.com)

x4000 writes: "My recent RTS game uses a new style of AI that hybridizes rules-based AI with emergent AI logic. As a disclaimer, I'm really not an AI programmer at all — my background is in databases, financial modeling, etc. But it just so happens that database experience, which often involved distilling data points from multiple sources and then combining them into suggested decisions for executives, also makes a great foundation for certain styles of AI. The approach I came up with leans heavily on my database background, and what concepts I am familiar with from reading a bit about AI theory (emergent behavior, fuzzy logic, etc). The results are startlingly good.

Total development time on the AI was less than 3 months, and its use of tactics is some of the best in the RTS genre. I'm very open to talking about anything and everything to do with the design I used, as I think it's a viable new approach to AI to explore in games, and I'd like to see other developers potentially carry it even further. Here's an overview of how the AI in AI War: Fleet Command works."

Comment Re:Wrong defense (Score 1) 207

The argument is that a few BT packets do not constitute proof of copyright infringement. The individual packets do not breach copyright so the ISP or copyright holder would require a record of a whole session before you could start reasonably making copyright infringement assertions.

Comment Not as dumb as the summary makes out (Score 1) 207

From the article:

They also claimed that, because files are broken up into tiny "packets" before being sent over BitTorrent, this may not be enough to suggest a "substantial portion" of a copyrighted file was distributed.

iiNet are suggesting that observing a couple of bittorrent packets is not enough to infer a breach of copyright because each packet does not contain a substantial amount of the original work. Much more data would be required before you could assume a copyright breach.

Slashdot Top Deals

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...