Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Judgment Day (Score 2, Funny) 134

"By the time Skynet became self-aware it had spread into millions of computer servers across the planet. Ordinary computers in office buildings, dorm rooms; everywhere. It was software; in cyberspace. There was no system core; it could not be shutdown. The attack began at 6:18 PM, just as he said it would" an artificial intelligence conference in California. Judgment day has arrived. Now we just need to perfect time travel.

Comment A sad day for our society (Score 4, Insightful) 1718

Rather than responding to the darkness of terror with the cleansing sunlight of truth and free discussion, major discussion sites like Reddit are shutting down discourse on this major event? This is a grave disservice to everyone who believes in a free and open society. Comments that offer nothing but vitriol, hate, and anger should certainly be moderated, but locking and deleting entire threads because the task facing the moderators is too hard is not the answer.

I cannot imagine what the families and friends of those killed and injured are going through. Instead of politicizing this hours after it occurred, how about everyone take a long moment to focus on supporting those whose loved ones were killed or whose loved ones are still in limbo in the hospital. There will be plenty of time for fingerpointing, anger, and hate later. Showing the best humanity has to offer is the best response to the worst humanity has to offer.

Comment Re:Advanced? (Score 1) 97

If you read the article, and the linked narrative by 4a.m. (the person who actually figured out the copy protection), it was not an elementary procedure to rip the data from the disk for the Internet Archive upload. The disk is unreadable by nearly all utilities available for the Apple II, and incompatible with modern disk drive systems, which expect very specific disk formatting and file structures. Security through obscurity and antiquity... I congratulate 4a.m. on a very impressive rip - I'm glad people still know how to do things like this with 35 year old technology and that programs like this won't be lost to the ages.

Comment Re: WTF (Score 1) 348

The use of the backspace button to move "Back" in a browser is a holdover from the days of Netscape Navigator and its atrocious interface. Microsoft adopted it in I.E., and then all subsequent browsers adopted it for compatibility. Firefox has a configuration setting for what Backspace does. Why shouldn't Chrime?
More than once, I've accidentally "clicked" outside a text area (particularly easy to do on a laptop trackpad) and then hit backspace, thinking I was still in a text entry box, obliterating everything I entered when the browser moved "Back."
Use Ctrl+Left Arrow or Ctrl+Right Arrow to go Back and Forward. This works in all modern browsers and across all platforms, and is unambiguous. Command left-bracket and Command right-bracket also work in Apple's Safari. I'm sorry you'll have to move your fingers a few more inches to save the rest of us hours of frustration.

Comment Article is about computers OUTSIDE the classroom.. (Score 5, Informative) 310

The summary makes it sound like computers in the classroom are the problem. That's not what the article says at all. The teachers' union is accusing out-of-school exposure to "instant gratification" digital devices and games for ruining attention-spans before kids are old enough to go to school. The article claims youngsters are aggressive and inattentive due to past conditioning by games and always-on entertainment. It doesn't even mention computers or tablets in school. Misleading title & summary.

Comment In the operating room, detecting blood oxygenation (Score 1) 322

The hospital I work at uses Invos / Somanetics 5100C monitors which perform Near Infrared Spectroscopy (NIRS) monitoring of blood for patients under anesthesia.

This is the monitor:

These monitors run on Linux, a fact I learned when I watched one boot up the other day. It showed its Linux Kernel version and then ran through the typical 5-10 pages of gray text before loading the user interface. They basically have about a dozen hard buttons on the front (no touchscreen) and some specialized ports for the cables to the NIRS sensors. They work great and do exactly what they're supposed to.

Comment "Reply" is the problem (Score 4, Insightful) 568

I think the problem may simply be that teachers perceive they will lack the time to answer questions / comments they receive from parents via email if they open this pandora's box. I know a similar feeling is present in much of the health care industry and other "social service" sectors. The more available one is via "always on" technology, the more time one will have to spend on addressing communications conveyed via this additional medium. Businesses see it all the time - think how much time each day the stereotypical Dilbert-like employee must spend on emails compared with time spent addressing paper memos and phone calls alone (which still exist today) prior to the advent of email. Teachers fear their already strenuous schedule will become even busier. It takes a lot more time for a parent to pick up a phone or write a letter to contact the teacher... and I think that's how a lot of teachers like it.

Comment Self-restraint and following the rules (Score 5, Insightful) 154

Being a juror stinks - I think most everyone agrees on that. But the rationale behind restrictions like this makes sense: communication about the case outside the courtroom may result in a juror's opinion being changed by friends, family, Facebook contacts, etc.

It's hard for some people to slow down and refrain from tweeting of Facebook posting every last thing they do every day... but I'm sure we'd all appreciate a fair trial without undue influence from bystanders who don't know all of the facts if we ever find ourselves seated at the defendant's table one day...

This is one time when following the rules can have enormous consequences. Far too many people see jury duty as a joke, or otherwise don't follow the rules in other areas of their life (parking in handicapped spots to run into the store for "just a minute," taking things from work because "nobody will miss it") and this transfers to abiding by the rules set forth by the judge at trial. It's a joke for some people - and that's just disrespectful.

Comment Wireless = National, Wired = Local (Score 2, Interesting) 124

In answer to the question from the original post... I think there are no hearings about wired communication "monopolies" because there are a variety of wired providers nationally, even if only one or two of them service each domicile or office. There's still comparatively heavy competition in most markets for wired communications services. Wireless, on the other hand, utilizes a finite resource (EM spectrum) and the 4 remaining carriers are largely the only ones available in the US. If I move from Miami, Florida, to Miami, Ohio, I probably have the same options available to me. Virgin Mobile, Boost, Wal-Mart Mobile, etc. all lease their spectrum from one of the big 4, so they aren't true alternatives or competitors. Three providers (or really two providers since I don't count Sprint) controlling all of the cell network EM spectrum seems like a very bad idea. I think that's why Congress is more concerned about the wireless merger than the paucity of wired communications providers serving Podunk, Montana. Other thoughts on this?

Comment Page Up and Page Down don't work right (Score 1) 2254

The Slashdot search / feedback / submit story / login / join banner covers part of the text content on the page. When you hit page up or page down, the first line of the next page is hidden beneath that banner and you have to scroll up a few lines to see it. Very annoying. This happens on the latest Google Chrome and the latest Firefox on Windows 7, 64-bit edition. Please fix this CSS glitch! The content shouldn't appear beneath the top banner on the page!

Comment Re:Innocent until proven guilty? (Score 1) 794

Not all information was meant to be public. War is messy. International diplomacy is messy. Secrets are the currency of both effective war and international policy. Taking masses of secret documents, obtained illegally, and placing them online is not "freedom of the press." If the founders and operators of Wikileaks are so interested in freedom of information, why not post Assange's (and the other wikileaks operators') phone numbers, current locations, dates of birth, complete records of biometric data, family relationships, addresses and phone numbers of their family members, bank account numbers, credit card numbers, license plate numbers, etc. on the site? What does WIKILEAKS have to hide?

They're brave enough to post the secrets of others. Now they should post their own.

Freedom of the Press is wonderful... reprinting stolen, illegally obtained information that may (in the case of the Afghanistan war documents) put the lives of US Citizens at risk is an act of war. If this type of nonsense happened 30+ years ago, these server nerds would have been ERASED by the CIA.

Nowadays, everyone likes to play 5-star general quarterback from their Herman-Miller ergonomic chairs and question everything the government does. Everyone is suddenly an expert on diplomacy, war policy, etc. etc. The reason we have a government is to provide for the common defense of our nation, and to promote welfare within our country. This information does nothing to "educate" the public to help it make better decisions about the direction in which to take the country any more than the information about Wikileaks' operators would help believers of its misguided mission. It is a political stunt by a meek man who will forever spend his life on the run, and who will go down in history as the messiah of anarchists everywhere.

Comment Re:Post the IP address (Score 5, Informative) 765

OK, I'm going to post the IP since it's been requested. According to Gmail, it was last accessed 3 hours ago from this IP. The IP address has been the same EVERY time it's been accessed, starting June 28, 2010. It traces to Cincinnati Bell's Fuse Network (a home internet service). I can't get anywhere with Cincinnati Bell's customer service. "Customer privacy rules," they say.

Here's the IP: 208.102 (DOT) 223.137
I split it up so auto-filters and bots wouldn't find it.

Thank you everyone and anyone who may be on the inside of 'Ma Bell who can help me track this thief down. I apologize if this is a TOS violation for Slashdot, but I am really at wit's end and have PROOF that this is the IP that's violating my account. I need your help.

Comment Re:If you do most of the work... (Score 5, Interesting) 765

I got the IP tracked down to Fuse Network on Cincinnati Bell's home internet service. I'm not going to post the IP address here since that probably violates the TOS of Slashdot or something. I will try calling Cincinnati's police tomorrow, but with the size of the city - and the fact the crime took place in Indiana - i doubt I'll get anywhere.

Submission + - Retrieving a stolen laptop by IP address alone? 1

CorporalKlinger writes: My vehicle was recently burglarized while parked in a university parking lot in a midwestern state. My new Dell laptop was stolen from the car, along with several other items. I have no idea who might have done this, and the police say that without any idea of a suspect, the best they can do is enter the serial number from my laptop in a national stolen goods database in case it is ever pawned or recovered in another investigation. I had Thunderbird set up on the laptop, configured to check my Gmail through IMAP. Luckily, Gmail logs and displays the last 6 or 7 IP addresses that have logged into your account. I immediately stopped using that email account, cleared it out, and left the password unchanged — creating my own honeypot in case the criminal loaded Thunderbird on my laptop. Last week, Gmail reported 4 accesses from the same IP address in a state just to the east of mine via IMAP. I know that this must be the criminal who took my property, since I've disabled IMAP access to the account on all of my own computers. The municipal police say they can't intervene in the case since university police have jurisdiction over crimes that take place on their land. The university police department — about 10 officers and 2 detectives — don't even know what an IP address is. I even contacted the local FBI office and they said they're "not interested" in the case despite it now crossing state lines. Am I chasing my own tail here? How can I get someone to pay attention to the fact that all the police need to do is file some RIAA-style paperwork to find the name associated with this IP address and knock on the right door to nab a criminal and recover my property? How can I get my laptop back — and more importantly — stop this criminal in his tracks?

Slashdot Top Deals

Faith may be defined briefly as an illogical belief in the occurence of the improbable. - H. L. Mencken