Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:relative to what? (Score 1) 148

In special relativity lets say I'm sitting next to someone and then I go for a walk and come back. When we compare clocks they will be the same since otherwise there would be symmetry breaking and we could establish a preferred inertial frame.

You don't need to factor in acceleration to have the clocks get out of sync, just remember that changing directions means you won't be at rest the whole time in any reference frame:

Inertial frame of your friend: First you move away with say 1 m/s. Halfway through you move towards him at 1 m/s. You're moving, so your watch will be slow when you return.

Inertial frame of you walking away: First your friend moves away at 1 m/s. Halfway through you start moving in the same direction at 2m/s. You're moving faster, so your watch will be slow when you catch up with him.

Inertial frame of you walking back: First you move at 2m/s, while your friend falls behind at 1 m/s. Halfway through you stop moving, and wait for your friend to catch up. You've been moving faster, so your watch will be slow when he reaches you.

Comment Re:SSL certs are both over-trusted and under-trust (Score 3, Informative) 194

I agree it's stupid how browsers show self-signed certificates as more dangerous than plain HTTP.

The difference between paid-for certificates and self-signed certificates means more than just who promises authenticity though: The certificate's signature can be checked against the certificate shipped with the browser, thus preventing MITM attacks.

Basically:

  1. HTTP: everybody on the network can read your stuff, including passwords etc. They don't even need to perform a MITM attack. With a simply MITM attack they can also alter content.
  2. Self-signed HTTPS: your traffic isn't that easily sniffable anymore, but an attacker can perform a MITM attack to read/alter your data. He'd intercept all your browsers' requests, including the certificate, and replace them with his own.
  3. CA-signed HTTPS: an attacker can't perform a MITM attack, because intercepting the certificate request means it's signature won't match with the CA-cert that your browser shipped with.

Thus paid-for certificates mean you won't get MITM'd, the part where the CA also verifies identities is just bonus.

Comment Re:I'm not exactly impressed... (Score 1) 190

That's way too much if you're planning on scanning the entire population looking for autism, but as this article notes it could be useful for diagnosis:

The first thing to remember is that this is a scientific paper, and this result is first and foremost of research interest: it provides clues towards the biology, and ultimately the causes, of autism.

But let's suppose you're a clinician and you have someone who you suspect may have autism, but you're not sure. They're a tricky one, a borderline case. You use this system on their brain and it says they are autistic. Should that factor into your decision? It depends. The fact is that rather than an either-or result, the SVM returns a distance from the hyperplane for each brain. You can see this clearly in the plot above.

In my opinion, if you have a borderline case, and the machine says he's borderline, then that's not much help, and it doesn't matter if he's just over the line, or not quite over it. You already knew he was borderline.

But if the machine says that he's deep into the autism space, then I think that is something. It tells you that his brain is very typical of people with autism.

Comment Re:Profit? (Score 1) 216

Although modded funny, parent actually has a good point.

Sure, some people might have a strong preference for a specific drink, but others would likely not really care: they're thirsty, want something to drink from the machine, but don't really care what, and the recommendation is probably easiest to order, so they go with that.

And of course the machine might be influenced a bit by customer demographics, but a smart machine would try to sell more expensive drinks, or the ones it has most left of, saving on refilling costs.

Comment Re:Why approximate numbers? (Score 1) 309

They only solved each position in 20 moves or less, not necessarily in the least possible moves for that position. Since there already was a known position that takes 20 moves this was sufficient to prove 20 moves is the maximum needed, and this sped up the solving by a factor of 1000ish.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...