Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:So much for the safety of nuclear energy (Score 1) 752

You are comparing apples to oranges.

Drugs shouldn't have much to do with nuclear energy safety. Moreover, if you start asking about coal mine accidents, you should also consider uranium mining accidents. I have to admit I didn't find much about any accidents, but there are a few. (and probably I would have found more if I had been looking harder) Of course, with nuclear energy you often can't directly find correlation with accidents. What about permanent disposal. How do you know everything will be OK with the nuclear waste we have produced up to now. It has only been a few decades of nuclear energy, so it will take some time before these materials are not dangerous any more.

Comment RFID? (Score 1) 175

Privacy problems aside: So basically these "tiny transistors" are RFID chips?

From TFA:

These low-voltage transistors could one day provide added security or tracking by transmitting information wirelessly to a scanner.

Security for whom btw? For the banks I assume?


Submission + - Do Hobbies Decrease Chances of CS Success?

theodp writes: "Who knows what lexical analysis is?" asked the CS prof. "No one? What, don't you guys do this constantly in your spare time?" Quips like that, and fellow students who never seem to leave the computer lab, make CS student blogger Carolyn sometimes wonder if she really belongs in programming because she doesn't program all the time. "While I don't live to program, I do love to program," she explains, and in the end has decided that's good enough. Somewhere, the late, great, always-room-for-outside-interests Jeff Raskin is smiling.

Comment How it works (Score 5, Informative) 133

As the page is slashdotted, I just wanted to post how it is done here:

For GMail, he added an image to his own GMail account, which he set to "visible for everyone". On his own site he added an invisible img and tries to access the image in his GMail account. He then triggers a javascript function depending on the outcome of the img inclusion (onload or onerror), so he can make the decision, if the visitor of his website is logged in to GMail.

For Facebook, Twitter and Digg he uses http status codes. He tries to access some URL ( via javascript and depending on the status code he gets, he can decide whether you are logged in or not. This attack doesn't work with IE or Opera, because they do not trigger the onload/onerror events when receiving invalid js.

Euler's Partition Function Theory Finished 117

universegeek writes "Mathematician Ken Ono, from Emory, has solved a 250-year-old problem: how to exactly and explicitly generate partition numbers. Ono and colleagues were able to finally do this by realizing that the pattern of partition numbers is fractal (PDF). This pattern allowed them to find a finite, algebraic formula, which is like striking oil in mathematics."

Polynomial Time Code For 3-SAT Released, P==NP 700

An anonymous reader writes "Vladimir Romanov has released what he claims is a polynomial-time algorithm for solving 3-SAT. Because 3-SAT is NP-complete, this would imply that P==NP. While there's still good reason to be skeptical that this is, in fact, true, he's made source code available and appears decidedly more serious than most of the people attempting to prove that P==NP or P!=NP. Even though this is probably wrong, just based on the sheer number of prior failures, it seems more likely to lead to new discoveries than most. Note that there are already algorithms to solve 3-SAT, including one that runs in time (4/3)^n and succeeds with high probability. Incidentally, this wouldn't necessarily imply that encryption is worthless: it may still be too slow to be practical."
First Person Shooters (Games)

Arx Fatalis Updated, Released Under GPL 153

Kevin Fishburne writes "According to WtF Dragon at Ultima Aiera, 'The long and short: Arkane Studios have released what is probably going to be the final patch for their Ultima Underworld-inspired game (which, indeed, they tried to license as the third entry in that series), Arx Fatalis. They have also released the source code for the game. That's right, the complete source of Arx Fatalis is available for download.' The readme notes that the original game installation is required in order to play the compiled game, as the data files are certainly still copyrighted. Linux is in need of a good FPS dungeon crawler, though the code will need a hell of a lot of cleanup as it's a VC8/9 project and uses DirectX (ugh...)."

Why Sony Cannot Stop PS3 Pirates 378

Sam writes "A former Ubisoft exec believes that Sony will not be able to combat piracy on the PlayStation 3, which was recently hacked. Martin Walfisz, former CEO of Ubisoft subsidiary Ubisoft Massive, was a key player in developing Ubisoft's new DRM technologies. Since playing pirated games doesn't require a modchip, his argument is that Sony won't be able to easily detect hacked consoles. Sony's only possible solution is to revise the PS3 hardware itself, which would be a very costly process. Changing the hardware could possibly work for new console sales, though there would be the problem of backwards compatibility with the already-released games. Furthermore, current users would still be able to run pirated copies on current hardware." An anonymous reader adds commentary from PS3 hacker Mathieu Hervais about Sony's legal posturing.

Slashdot Top Deals

Adding features does not necessarily increase functionality -- it just makes the manuals thicker.