Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:ask a 12 year old (Score 2, Insightful) 381

Mega Man 9 is awesome. I'm glad they stuck with the 8 bit graphics (and stayed 2D). I hate it when 2D games go 3D. It almost never works out well.

The castlevania games have stayed 2D (for the most part) and are pretty fun too. Castlevania: Symphony of the Night is in my shortlist for best game ever.

I think too many games focus on the graphics these days and forget that better graphics does not equal more fun. Pac-man, Donkey Kong, Space Invaders, Missile Command, Joust etc weren't fun because we could tell what the blobs were. They were fun because the game's mechanics were solid and simple enough for just about anyone to understand. They take 5 minutes to learn and lifetime to master.

Comment Re:Quantum Key Exchange not Quantum Computing (Score 1) 233

Since I was asked a couple times, here are my references.

Brown, Julian - "Minds, Machines, and the Multivers: The Quest for the Quantum Computer"

Williams, Colin P. and Clearwater Scott H. - "Explorations in Quantum Computing"

Simon Singh, - "The Code Book"

I also have a computational physics degree and would reference the text books if I currently had access to them (so yes, I'm also referencing my ass that sat through 4 years of physics classes).

There's also the obligatory wiki references.
Quantum Cryptography
Quantum Computer

Quantum cryptography does not use cubits. The photon used to exchange keys are specifically polarized. They are not in a superposition of polarizations. The "quantum" part comes in because, when a polarized photon hits a polarization screen that is at a 45 degree angle to the photon's polarization, there is exactly a 50% chance that the photon will go through due to quantum mechanics.

It is possible to use a photon as a qubit but it is very limiting. You have to have qubits that will interact with eachother. That is difficult with photons. You also have to have some way of storing them. A photon is very difficult to trap.

Some other methods of qubits are Heteropolymer (plastic), Ion Trap, Cavity QED and NMR.

Heteropolymer uses a laser pulse at specific energies to excite the outer electrons in plastic atoms to either an excited state or superposition of excited and ground states. We have these. The problem again is getting them to interact as needed.

Ion Traps use electromagnetic fields to trap a single ionized atom. The ions can in a grounded state or excited state. Ion trap qubits provide a method for interaction but they can only interact with their neighboring qubit. This method has been used to create an 8 qubit quantum computer.

Cavity QED (Quantum Electrodynamics) uses the polarization of photons for the qubits. We've got an XOR gate for this, but, as stated before, it's hard to store a photon.

NMR (Nuclear Magnetic Resonance) uses a sample of some liquid. Each atom in the liquid ends up being a qubit by using the spin of nucleus of one of the atoms in the molecules. It uses current technology (similar to MRI) and just about any liquid can be used. However, it's not an isolated system so it decoheres extremely fast (it naturally exits it's state of superposition).

According to D-wave systems (a company that sells quantum computers), superconductors can also be used for qubits. Using supercooled aluminum and niobium to cause the electrons to form Cooper pairs (bosons) which can be used as qubits. I don't know a lot about that method but you can read about it at D-wave QC hardware and Wiki: Superconducting QC

Heisenberg was driving down the road and got pulled over. The cop asks him, "Do you have any idea how fast you were going?" Heisenberg replies, "No, but I know exactly where I am!"


Tool To Allow ISPs To Scan Every File You Transmit 370

timdogg writes "Brilliant Digital Entertainment, an Australian software company, has grabbed the attention of the NY attorney general's office with a tool they have designed that can scan every file that passes between an ISP and its customers. The tool can 'check every file passing through an Internet provider's network — every image, every movie, every document attached to an e-mail or found in a Web search — to see if it matches a list of illegal images.' As with the removal of the alt.binary newgroups, this is being promoted under the guise of preventing child porn. The privacy implications of this tool are staggering."
The Courts

Palin E-mail Hacker Indicted 846

doomsdaywire writes "A University of Tennessee student who is the son of a Memphis legislator has been indicted by a federal grand jury on charges of hacking Republican vice presidential candidate Sarah Palin's personal e-mail. [...] If convicted, [David C.] Kernell faces a maximum of five years in prison, a $250,000 fine and a three-year term of supervised release. A trial date has not been set."
The Courts

Buffalo Tech Gets New Trial On Wi-Fi Patent 78

MrLint writes "It's been a long, nearly two years of silence since CSIRO won a patent battle against Buffalo Tech, causing an injunction preventing the Austin company from selling wireless routers. On September 19, 2008, a Federal Circuit Court of Appeals ruled that CSIRO patent claims are invalid and Buffalo is getting a new trial. With any luck, we will be able to get our grubby hands on low-cost Wi-Fi routers again!"

Ask Blizzard Employees About Things That Matter 504

In just a few days, some of us will be making the trek to this year's Blizzcon event in Anaheim, CA. In addition to the interesting announcements, sneak peeks, and other distractions, we will be sitting down with several Blizzard employees to answer any questions you might have. So far we have scheduled some time with Chris Sigaty, lead producer on StarCraft II; Jeffrey Kaplan (aka Tigole), game director for World of Warcraft; Leonard Boyarsky, lead world designer on Diablo III; and Paul Sams, Blizzard COO. Please address your questions to one (or several) of these candidates and try to keep them civil and on topic. Questions about Diablo III's art style will most likely be omitted since we have limited time and that dead horse has already been beaten into submission. The usual Slashdot interview rules apply, but beyond that, the sky is the limit.

Commerce Department Pushing For New "Copyright Czar" 294

TechDirt is reporting that those all-too-familiar "stats" surrounding the cost of piracy are being trotted out in an attempt to push through a new "Copyright Czar" position. "In urging President Bush to sign into law the ProIP bill, which would give him a copyright czar (something the Justice Department had said it doesn't want), the US Chamber of Commerce is claiming that 750,000 American jobs have been lost to piracy. Yet, it doesn't cite where that number comes from."

Senate Votes To Empower Parents As Censors 418

unlametheweak recommends an Ars Technica report that the US Senate has unanimously passed a bill requiring the FCC to explore what "advanced blocking technologies" are available to parents to help filter out "indecent or objectionable programming." "...the law does focus on empowering parents to take control of new media technologies to deal with undesired content, rather than handing the job over to the government. It asks the FCC to focus the inquiry on blocking systems for a 'wide variety of distribution platforms,' including wireless and Internet, and an array of devices, including DVD players, set top boxes, and wireless applications."

Plug-In Hybrids Aren't Coming, They're Here 495

Wired is running a story about the small but vocal, and growing, number of people who aren't waiting for automakers to deliver plug-in hybrids. They're shelling out big money to have already thrifty cars converted into full-on plug-in hybrids capable of triple-digit fuel economy. "The conversions aren't cheap, and top-of-the-line kits with lithium-ion batteries can set you back as much as $35,000. Even a kit with lead-acid batteries — the type under the hood of the car you drive now — starts at five grand. That explains why most converted plug-ins are in the motor pools of places like Southern California Edison... No more than 150 or so belong to people like [extreme skiing champion Alison] Gannett, who had her $30,000 Ford Escape converted in December. Yes, that's right. The conversion cost more than the truck."

KFC Beefs Up Secret Recipe Security Screenshot-sm 10

For more than 20 years, the secret KFC recipe has been in a filing cabinet equipped with two combination locks in company headquarters. To reach the cabinet, you have to open up a vault and unlock three locks on a door. Only two executives at any time have access to it and the company refuses to release their name or title. The company uses multiple suppliers who produce and blend the ingredients but know only a part of the entire contents. All this was not enough for KFC, so Colonel Harland Sanders' handwritten recipe of 11 herbs and spices will be removed Tuesday from safekeeping at KFC's corporate offices and security improvements for the recipe will be made at headquarters. KFC hired off-duty police officers and private security guards to bring the document to an undisclosed location in an armored car. The recipe will be slid into a briefcase and handcuffed to security expert and former New York City police detective, Bo Dietl. Isn't the secret ingredient love?

Submission + - Rowling wins Lexicon Lawsuit

SpicyLemon writes: According to, JK Rowling has won her lawsuit against RDR Books.

JK Rowling has won her claim that a fan violated her copyright with plans to publish an A to Z of Harry Potter. A US judge ruled today that the unauthorised guide would cause her irreparable harm as a writer.


Russia and Georgia Engaged In a Cyberwar 276

doctorfaustus writes "I first picked this up in bits and pieces last week off Daily Rotation. A more in-depth story is available at ZDNet, which reports 'a week's worth of speculations around Russian Internet forums have finally materialized into a coordinated cyber attack against Georgia's Internet infrastructure. The attacks have already managed to compromise several government web sites, with continuing DDoS attacks against numerous other Georgian government sites, prompting the government to switch to hosting locations to the US, with Georgia's Ministry of Foreign Affairs undertaking a desperate step in order to disseminate real-time information by moving to a Blogspot account.' There is a question whether the computer work is being done by the Russian military or others. ZDNet's story offers further analysis of the attacks themselves and their origins. Some pretty good reporting." And reader redbu11 contributes the news that Georgia seems to be censoring access to all Russian websites, as confirmed by a Georgian looking glass/nslookup tool. The access is blocked on DNS level (Italy censored the Pirate Bay in the same way). Here are a couple of screenshots (in a language other than English) as of Aug 12th 5:40 pm: nslookup — FAIL, nslookup — OK.

ComputerWorld guy CWmike adds "In an intriguing cyberalliance, two Estonian computer experts are heading to Georgia to keep the country's networks running amid an intense military confrontation with Russia. Poland has lent space on its president's Web page for Georgia to post updates on its ongoing conflict with Russia. Estonia is also now hosting Georgia's Ministry of Foreign Affairs Web site."

Home Science Under Attack In Massachusetts 1334

An anonymous reader tips a guest posting up on the MAKE Magazine blog by the author of the Illustrated Guide to Home Chemistry Experiments. It seems that authorities in Massachusetts have raided a home chemistry lab, apparently without a warrant, and made off with all of its contents. Here's the local article from the Worcester Telegram & Gazette. "Victor Deeb, a retired chemist who lives in Marlboro, has finally been allowed to return to his Fremont Street home, after Massachusetts authorities spent three days ransacking his basement lab and making off with its contents. Deeb is not accused of making methamphetamine or other illegal drugs. He's not accused of aiding terrorists, synthesizing explosives, nor even of making illegal fireworks. Deeb fell afoul of the Massachusetts authorities for... doing experiments... Pamela Wilderman, the code enforcement officer for [the Massachusetts town of] Marlboro stated, 'I think Mr. Deeb has crossed a line somewhere. This is not what we would consider to be a customary home occupation.' Allow me to translate Ms. Wilderman's words into plain English: 'Mr. Deeb hasn't actually violated any law or regulation that I can find, but I don't like what he's doing because I'm ignorant and irrationally afraid of chemicals, so I'll abuse my power to steal his property and shut him down.'"
The Military

Military Spends $4.4M To Supersize Net Monitoring 76

coondoggie writes "Bigger, better, faster, more are the driving themes behind the advanced network monitoring technology BBN Technologies is building for the military. The high-tech firm got a $4.4 million contract today from the Defense Advanced Research Projects Agency (DARPA) to develop novel, scalable attack detection algorithms; a flexible and expandable architecture for implementing and deploying the algorithms; and an execution environment for traffic inspection and algorithm execution. The network monitoring system is being developed under DARPA's Scalable Network Monitoring program which seeks to bolt down network security in the face of cyber attacks that have grown more subtle and sophisticated."

Slashdot Top Deals

Premature optimization is the root of all evil. -- D.E. Knuth