Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Author draws a false dichotomy (Score 1) 406

"When doctors or nurses use their knowledge of anatomy in order to torture or conduct medical experiments on helpless subjects, we are rightly outraged. Why doesn't society seem to apply the same standards to engineers?" If the doctor uses their knowledge of anatomy to conduct medical experiments, do we blame the person that created the tool, the tool, or do we blame the doctor? When someone uses a weapon to kill someone, do we blame the person that created the weapon, the weapon, or the person using the weapon. Too often we will blame the doctor if they did something wrong, in modern day history if someone did something wrong it is not their fault. Its the weapon, the parents, etc. Engineers are tasked with creating an item (be it a weapon, or a car) to be safe as possible to the user. They have no moral obligation to prevent it from being used incorrectly.

Comment Re:Depends on your criteria (Score 1) 1174

The best plug is a Speakon connector. You twist to make the connection, it locks in place. If modified (for a ground pin) you could easily have the ground connect first in any plug. With the design, its hard to have any key or item go into the either plug. Now only if they could be used for power instead of just for audio/video.

Submission + - Windows 7 "show stopper" bug 1

BoostFab writes: InfoWorld reports about Critical Windows 7 bug risks derailing product launch. An apparent fatal flaw in the NTFS driver stack may bring Microsoft's Windows 7 impending victory parade to a grinding halt. Oh boy! It appears that Microsoft's glowing track record with Windows 7 is about to come to an abrupt and unceremonious end. According to various Web sources, the RTM build 7600.16385 includes a potentially fatal bug that, once triggered, could bring down the entire OS in a matter of seconds.

Comment Accident-proof or Accident-resistant? (Score 2, Insightful) 743

Have Volvo engineers ever driven in ice and snow? If they haven't then they know that no vehicle is accident-proof. Accident-resistant maybe, but not accident-proof.

Accident-proof == No matter what conditions you drive in, and no matter how you drive, you will not get into an accident.

Accident-resistant == Depending on the conditions and driving patterns, there are extra features to help prevent an accident.

If this car is accident proof, then I would expect to go 70 mph down an icy road and expect to stop in the same about of time that I expect to stop in excellent conditions without hitting the stopped car in front of me or going into the ditch.
PC Games (Games)

Submission + - Pong turns 35

I_am_Rambi writes: On November 29th, 1972, Pong was released. "Pong was the first video game to achieve widespread popularity in both arcade and home console versions, and launched the initial boom in the video game industry."
The Courts

Submission + - U.of Oregon Says No to RIAA; ID no good

NewYorkCountryLawyer writes: "The University of Oregon has filed a motion to quash the RIAA's subpoena for information on student identities, in what is believed to be the first such motion made by the university itself, rather than by the students, and the first instance of a State Attorney General bringing a motion to quash an RIAA subpoena. The motion (pdf) explains that it is impossible to identify the alleged infringers from the information the RIAA has presented: "Five of the seventeen John Does accessed the content in question from double occupancy dorm rooms at the University. With regard to these Does, the University is able to identify only the room where the content was accessed and whether or not the computer used was a Macintosh or a PC.... The University cannot determine whether the content in question accessed by one occupant as opposed to another, or whether it was accessed instead by a visitor. Two of the seventeen John Does accessed the content in question from single occupancy dorm rooms....No login or personally identifiable information, i.e. authentication, was used by the Does to access the university's network because none is required. The University cannot determine whether the content was accessed by the room occupant or visitor. Nine of the seventeen John Does accessed the content in question from the University's wireless network or a similar system called the "HDSL Circuit." These systems do record a user name associated with the access. For these John Does, the University can determine the identity of the individual who bas been assigned the user name, however, it is unable to determine whether the content was accessed by the individual assigned that user name or by someone else using the computer associated with the user name. In the case of sixteen of the seventeen John Does, .... it is not possible for the University to identify the alleged infringers without conducting interviews and a forensic investigation of the computers likely involved." The AG's motion further argues (pdf) that "Plaintiffs' subpoena is unduly burdensome and overbroad. It seeks information that the University does not readily possess. In order to attempt to comply with the subpoena, the University would be forced to undertake an investigation to create discovery for Plaintiffs — an obligation not imposed by Rule 45. As the University is unable to identify the alleged infringers with any accuracy, it cannot comply with its federal obligation to notify students potentially affected by the subpoena." One commentator has likened the AG's argument to saying, in effect, that the RIAA's evidence is "rubbish"."

Slashdot Top Deals

It is difficult to soar with the eagles when you work with turkeys.