Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:biometric time clocks (Score 1) 578

Some Addtional Comments:

there are 3 ways to Authenticate someone - Something you Own, Something you know, and something you are. Choose 2 for best results.

The something you own didnt work. Adding something you know (like a pin) wouldnt work because there is no benifit to keeping it private - on the contrary - you get paid an extra half day for disclosing it. - persumably your bank account has money in it, so you are motivated to not disclose the pin. Therefore the best option is something you are - Most people would not cut off their thumb for a half day of pay.

With the comment about fireing people - Its a unionized shop. this makes it more dificult, and you actully have to catch the culperts before you can peanlize them.

Comment biometric time clocks (Score 4, Insightful) 578

I installed these at a client.
The issue was the employees would take an afternoon off to go to an appointment, and get buddy to clock them out at the end of the day - The emplyoee would then get paid for an afternoon they didnt work.

The time clocks have a fingerprint scanner. You place your thumb on the device as you punch out. Now buddy cant swipe out for you, and you cant defraud your employeer.

They also had biometric locks instead of prox cards on the doors. Much more convieient then having to remember a card the few days when i was on site.


Space Photos Taken From Shed Stun Astronomers 149

krou writes "Amateur astronomer Peter Shah has stunned astronomers around the world with amazing photos of the universe taken from his garden shed. Shah spent £20,000 on the equipment, hooking up a telescope in his shed to his home computer, and the results are being compared to images taken by the Hubble Space Telescope. 'Most men like to putter about in their garden shed,' said Shah, 'but mine is a bit more high tech than most. I have fitted it with a sliding roof so I can sit in comfort and look at the heavens. I have a very modest set up, but it just goes to show that a window to the universe is there for all of us – even with the smallest budgets. I had to be patient and take the images over a period of several months because the skies in Britain are often clouded over and you need clear conditions.' His images include the Monkey's head nebula, M33 Pinwheel Galaxy, Andromeda Galaxy and the Flaming Star Nebula, and are being put together for a book."

Comment Re:sloppy engineering (Score 1) 118

its still not incorrect as they stated that it was in standard time. if they only stated 5pm Pacific time, one would assume the current Daylight Savings time.
Canadian (and American I think, but dont hold me to it) Tide and Current tables are in Standard time, so you need to remember to add the hour when you are in Daylight Savings Time, otherwise your calculations are off, and you can hit low things, and run around on high things.

Comment umm.. Not Throttleing (Score 5, Insightful) 282

Umm.. thats not throttling, it applying QOS (Quality of service) Throttling would slow your traffic all the time, where as this applies prioritization to data that needs it. Packets have a qos field that says the priority they should be given..

Im glad there is a telco that will respect QOS - I've wasted a week with a voip problem, only to learn that the telco was shaping traffic and discarding everything above 3mb without paying attention to QOS Flags.. Allstream charges more for this!

Comment Reasons Piracy Continues (Score 3, Insightful) 262

Piracy exists in Somalia because the government lacks sufficient ability and influence to stop it.
It continues largely because the international community that has the ability to stop it, doesnt have the reason to. Modern warships can sink targets they cant visually see. The Gulf of Aden is large, but its not that large.

Most ships, even if owned by a western company, are flagged in a Convenient state - Panama, Liberia etc. these countries love the revenue form being a flag state but have no means of protecting their flagged ships. Most ships are crewed by non western crews.. many from the Philippines, Bangladesh, etc. again countries with limited abilities to protect their nationals internationally.

The west has many ships in the area, however they are reluctant to act for political reasons, if no nationals are involved, or its not a home flagged ship, its really not the concern of the country. The pirates get their million dollar ransom, which to a pirate is a wind fall, but to a shipping company, used to paying $60000/day fuel bills, really isnt that big a deal. Furthermore the risks to the pirates are relatively small - the French raided a la Poinete, a yacht that was taken by pirates and was crewed by french nationals, and the Indians sunk a Pirate mother ship last week. So for the pirates 2 out of over 100 incidents ended badly. To stop the pirates, the western world needs to actively seek them out, hunt them down and stop them from taking ships, as well as recapturing ships by force. When pirates begin to face the consequences - to this point there have been almost none, then they will cease their actions, because taking a ship no longer results in a quick profit for the prirates, and the risk of death goes up significantly for the actual takers of the ship.

Incidentally, the IMO is now recommending ships hire private security to protect them in troubled waters. Blackwater international has also purchased ships. The 18th century tales of piracy make a difference between a Privateer and a pirate a privateer was a mercenary ship working for a nation, to harass enemy shipping - they could take prizes, but paid a percentage to the crown, and wouldn't attack friendly shipping. a pirate had no Letter of Marque, paid no commissions, and attacked who he wanted when he wanted...

everything old is new again.

One final aside, those whom complain about copyright infringement by referring to it as piracy do a great disservice to the victims of piracy, imagine having your office attacked by men armed with machine guns and RPG's and your only defense is to run, and spray the attackers with a fire hose. from the floor above..

Wireless Networking

Submission + - Canadian wireless carrier number portability

maxrate writes: March 14 2007 in Canada marks the start of mandatory wireless cellular carrier number portability. If you are in Canada you will be happy to know that the CRTC mandated that cellular customers may move their cellular numbers from one carrier to another. ity It will be interesting to see how quickly carriers are able to facilitate transfer requests. For the moment I am happy with my carrier and have no desire to move, however I can recall on a few occasions where this would have been an excellent option.

Submission + - Knex Machine Gun

edmandu writes: "Here's an impressive machine gun made out of K'nex that fires off 10 shots per second. The gun's creator writes: "It uses a bullet-type design i made 4 years ago and i put them all on a chain; so it can shoot as many times as you want, it just takes a while to make more bullets. The one i made shoots about 30 Ft at 10 shots per second and has 40 "bullets" on its chain." Here is a link to some instructions on instructables and a link to a video of the machine gun in action."
Hardware Hacking

Submission + - Bizarre IT setups.

MicklePickle writes: I was talking to a co-worker the other day about the history of our company, (which shall remain nameless), and he started reminiscing about some of the IT hacks that our company did. Like running 10BaseT down a storm water drain to connect two buildings, using a dripping tap to keep the sewerage U-bend full of water in a computer room, (huh?). And some not so strange ones like running SCSI out to 100m, and running a major financial system on a long forgotten computer in a cupboard.
I know that there must be a plethora of IT hacks around. What are some you've seen?

Slashdot Top Deals

"You can't get very far in this world without your dossier being there first." -- Arthur Miller