Follow Slashdot stories on Twitter


Forgot your password?

Comment 5.95 Seconds (Score 1) 91

Sarah, a cheetah at the Cincinnati Zoo, set the 100 meter record for land mammal in June at 5.95 seconds--four seconds better than Bolt. This works out to 37.6 mph. While a cheetah in the wild might not quite hit that mark, they are easily faster than Bolt or 'bot, and do so on unprepared terrain, and often with zigs and zags chasing prey. DARPA has a way to go.

Comment Spend Money to Save Money (Score 1) 551

I'm working with a SOHO on a workstation refresh. The brand new Lenovo workstations don't come with OS disks (only the burn-your-own recovery disk option). So, we either have to buy Win7 OS media (which, in my mind, makes licensing tricky), or accept the OS load as is, and try to surgically remove anything bloaty. Either way, no good option when you are only talking about half-a-dozen workstations.

We're trying to de-bloat.

I contrast this with big companies I work for/with. With hundreds or thousands of seats, they have the critical mass to justify an Enterprise Licenses with Microsoft that means they get what they need. Buy a hundred workstations, and blast down a clean, standard image. As an added perk, they don't have to troubleshoot too deep, just re-blast.

Comment Join the Real World (Score 1) 439

My office supplies me an e-mail account for work. I accept the privacy implications there (i.e. there are none). I also have various personal e-mail accounts. I assume my employer won't have access to them (absent a subpoena), and I take into account whatever privacy concerns might be associated with the service I choose to use.

Assuming that Yale isn't blocking access for other mail services, I fail to see how this is any different. Use the account for school related matters, and get your own account for private messages.

Of course, this also means that Yale's IT organization has taken into account the implications outsourcing has on the school's intellectual property, etc. As part of the RFP and selection process, these items should be taken into account to ensure the outsourcer's offering has sufficient controls. This is really no different than any large organization choosing to select Exchange, Notes, GroupWise, or outsourcing the service through any number of third party providers. *I do recognize that Google Buzz does change the thought process for GMail users. Of course, that is also a contract issue with Google-as-outsourcer (i.e. privacy and intellectual property protections should be built into the contract, and the outsourcer is obliged to ensure their offering meets the contract specifications).

Comment Re:yes (Score 1) 1049

I totally agree--make it look professional. In an age of free e-mail, there really is no excuse for cutegirl1998 or gamerstud on a resume. I've spoken to recruiters as well as ready scores of job hunt sites. Having an e-mail address based on your name is recommended. In addition to putting on a more professional face than webgod1998, it helps make sure that "Resume of John Deaux.doc" will be associated with

Comment Trickle Down (Score 1) 814

When I got my first Mac, my daughter (almost 5) inherited my old PC. I twas good enough for light web surfing/educational games. If/when she needs more power, we'll revisit it. However, a six-year-old Pentium IV seems to be good-enough for her. So, I suspect that a chunk of the "Mac-and-Windows" households have an older system that has been displaced by a newer one.

Comment Moot Point? (Score 1) 436

I get the whole notion, that the best you can hope for in relating an IP to a specific entity is, most narrowly, a computer, or, more broadly, a network. I wonder what the practical effect of the ruling will be?

If an IP is suspected of criminal activity, and it can be related to only a particular network/house, the case may not be a slam dunk. However, it may well be enough to create all sorts of joy for that network/house. It's probably enough probably cause for a warrant which will then find all computer attached to that network confiscated. If they can pin the behavior to a specific machine, then anyone who had access to that machine could be under suspicion.

If you run an open WiFi site, the net could be broadened to any computer the the radius of your signal--the neighbors will love you. Even though one can make the arguement that some random car with a laptop might have parked in front of your house, and you might carry the day in court, you'll still have a lot of hassle and legal fees.

(And that doesn't include anything that might shake out from what's on those computers (child porn, etc.), discovered as a consequence of the search. For that matter, how are charges filed for such a thing on a shared computer?)

I'm not sure the RIAA would be able to get such warrants/subpoena based solely on an IP address. While it will prevent them from simply creating suits based only on IP address, at the end of the day it's just one more hoop to jump through.

At the end of the day, that's my point: while it definitely raises the bar for legal action, I'm not sure it does much more than that in practice.

Note that I'm not a lawyer--this could be 100% bunk (or more!).

Comment Shredder (Score 4, Interesting) 527

I periodically contract with a company to dispose of old hardware for my company. The first time i talked to them, they mentioned they shredded old media. I assumed he meant floppies and tapes and the like. Given the nature of the material, it didn't seem that impressive, but certainly nice. When I got the estimate, I was a bit shocked--why was it so high? Then they explained--by "media," they meant hard drives. They sent me a PDF on the equipment. Hard drives are removed from machines, and placed on a conveyor belt. This fed the hard drive into the shredder. On the other end, bits of metal came out. I begged them to let me operate it--just for one or two drives. Damn lawyers!

Submission + - Stem Cells Shown to Protect Dying Motor Neurons

Penguinshit writes: "Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease characterized by rapid loss of muscle control and eventual paralysis due to the death of large motor neurons in the brain and spinal cord. Growth factors such as glial cell line derived neurotrophic factor (GDNF) are known to protect motor neurons from damage in a range of models. Human cortical neural progenitor cells derived from fetal tissue (ie. stem cells) can be expanded in culture for long periods and survive transplantation into the central nervous system, in some cases making large numbers of GFAP positive astrocytes. They can also be genetically modified to release GDNF and thus act as long-term 'mini pumps' in specific regions of the brain. In this study a team at UW-Madison's Waisman Center genetically modified human neural stem cells to release GDNF and transplanted them into the spinal cord of rats with mutant SOD1. Following unilateral transplantation into the spinal cord of the rats there was robust cellular migration into degenerating areas, efficient delivery of GDNF and remarkable preservation of motor neurons at early and end stages of the disease within chimeric regions.

This work is especially important to me, as I have been living with ALS for almost three years."

Submission + - New antibiotics for pathogenic attacks of bacteria (

allengineering writes: "A team of research directed by the pr. KIM Kyung-Gyu of the Faculty of Medicine of the University of Sungkyunkwan discovered the structure of the protein Rse B playing an essential part in the transmission of the signals of stresses resulting from the pathogenic attacks of bacteria. The article is been published in the edition of May of the Proceedings of the National Academy of Sciences of the the USA (PNAS). This projection should make it possible to develop new antibiotics."
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.

Submission + - a real telemarketer filter

hate-those-telemarketers writes: I just had one of those telemarketers call me despite being on the do-not-call list. There's still organizations that don't need to adhere to that list. Having googled the caller-id I came accross that seems to be a very comprehensive database of annoying caller-id's calling. What's even better is that in the "about" tab there's a script for asterisk to check all calls against that database. This is like a IP-list for spammers only for real telephony. Fantastic. I've implemented this and now I wish I weren't on the do-not-call list to see telemarketers deal with the very annoying Telemarket torture script that can be found on this site: rketer+Torture woo-hoo!!!

Slashdot Top Deals

Everyone can be taught to sculpt: Michelangelo would have had to be taught how not to. So it is with the great programmers.