Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Because the math is apparently not that easy (Score 3, Informative) 85

If I understand correctly what I'm reading about the biomarker gasses, it's not just the absence or presence of a gas or gasses, but the quantities, and the profile of those quantities in normal vs. diseased lungs. So, they're hooking it up to a pattern classifier. In the prototype stage you need a computer with a fair amount of power --- fortunately these days a smart phone will do. Down the road I imagine they could hook it up to a FPGA or six and eventually engineer it down to one chip, but that's a lot more engineering and likely years down the road.

Comment Re:Can Trump win over all? (Score 1) 879

He came from way behind to win the nomination. It's not a stretch to believe he could come from behind to win the general election as well. It's a tough path, but he can hit Clinton from the left and the right on economic and foreign policy issues. His main disadvantage is that he alienates people, and Clinton knows how to make someone else's gaffe stick.

Comment I remember that site (Score 4, Interesting) 264

I remember it was hot in 2001. I remember visiting again in 2004 and it was desolate. I'm surprised it lasted this long.

You know what site I really miss? Segfault.org. That was seriously funny stuff, and ahead of its time. Too bad the hard drive on which it ran crashed and left an unrecoverable mess.

Comment Non-Paywalled Story (Score 4, Informative) 126

Via the New York Post:

US officials confirmed that operations launched out of Fort Meade have focused on disrupting the group’s online activities. The officials said the effort is getting under way as operators try a range of attacks to see what works and what doesn’t. They declined to discuss details, other than to say that the attacks include efforts to prevent the group from distributing propaganda, videos, or other types of recruiting and messaging on social media sites such as Twitter, and across the Internet in general. Other attacks could include attempts to stop insurgents from conducting financial or logistical transactions online. Several US officials spoke about the cyber campaign on condition of anonymity because they were not authorized to discuss it publicly. Much of the effort is classified.

Slashdot Top Deals

System checkpoint complete.

Working...