Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Chromebook (Score 1) 283

Most Chromebooks are rated in the 9 to 12 hour range.
You'll be good for a solid 8 hours of work.
Install Linux using Crouton and you'll have a full Linux environment running native (ChromeOS built on top of Linux so full Linux uses the same core OS. You can hotkey between ChromeOS and Linux.

Submission + - Chinese Scientist Found Breakthrough Vaccine/Cures for All Viral Infections (scmp.com)

hackingbear writes: Chinese scientists may have found the key to creating effective vaccines for the world’s deadly viruses including bird flu, SARS, Ebola, and HIV. An experiment by a research team at Beijing University was hailed as “revolutionary” in the field in a paper published in the latest issue of Science magazine on Friday. The live virus used in the vaccine used by the researchers had its genetic code tweaked to disable the viral strains’ self-replication mechanism. But it was kept fully infectious to allow the host animal cells to generate immunity. Using live viruses in their fully infectious form was considered taboo, as viruses spread rapidly. Vaccines sold and used widely today generally contain either dead or weakened forms of viruses. The animals infected with virus were cured after receiving the injection, according to the paper. This breakthrough promises to simplify the process of producing vaccines, which may help scientists develop effective vaccines or even cures for various viruses – such bird flu, SARS, Ebola and HIV – within weeks of an outbreak.

Comment Re:Chromebook (Score 1) 283

Get a Chromebook with a good x86 processor and lots of memory.
They are fast and have good battery life.
You can run Linux using Crouton and hot key between Chrome and Linux. It's a full Linux environment running natively so you can install a Windows VM if you need to.

Submission + - ForgeRock Seem to be Distancing Themselves from Open Source (forgerock.org) 1

Guy Paddock writes: As recently reported on Hacker News, ForgeRock — the company who develops OpenAM, OpenDJ, and OpenIDM — has cut off public access to the latest CDDL code for their projects.

Based on revision history, ForgeRock quietly updated "How to Build" pages in Confluence on November 14th, 2016 to point to different, "public" repositories that only have source code from the last major version of each of their products. Then, in the early morning of November 29th, ForgeRock sealed off both source code and pull request access to all of the original repositories. Only the repositories containing the older, major release code are now available for public consumption.

The open source community is now left to speculate what role, if any, they will play in helping to shape the future of ForgeRock products. This may also have repercussions for small-shop deployments who rely on the open source edition for bug fixes and security updates.

To date, the company has made no formal press release or public statement about their plans, but rumblings in user forums have prompted Aaron Kozak, the Digital Marketing Coordinator for ForgeRock, to weight in.

Mr. Kozak responded to users' concerns by stating, "We apologise for any inconvenience our recent changes may have caused. We are preparing for the next major release of the ForgeRock Identity Platform and as part of this process, we are no longer providing public access to our nightly builds and source code for the upcoming platform release. Open source downloads are still available via https://backstage.forgerock.co...."

When asked whether access to the latest code (the "trunk") would be restored after the upcoming releases, Kozak did not speculate, and offered only a statement that, "I’m sure that more details will be made available with the new release in the near future, but unfortunately I do not have any more information at this time."

Submission + - Virginia spent over half a million on cell surveillance that mostly doesn't work (muckrock.com)

v3rgEz writes: In 2014, the Virginia State Police spent $585,265 on a specially modified Suburban outfitted with the latest and greatest in cell phone surveillance: The DRT 1183C, affectionately known as the DRTbox. But according to logs uncovered by public records website MuckRock, the pricey ride was only used 12 times — and only worked 7 of those times. Read the full DRTbox documents at MuckRock.

Submission + - Nuclear Bailout for Excelon Again (bnd.com)

mdsolar writes: A nuclear power plant “bailout” bill appears set to become law after making its way through the Illinois House and Senate on Thursday.
The legislation funnels $235 million a year to power-producing giant Exelon Corp. for 13 years. The money subsidizes unprofitable nuclear plants in Clinton and the Quad Cities that Exelon said would be shuttered over the next 18 months.
Opponents argued that it was wrong to subsidize a company that remains profitable, and that coal-fired power companies haven’t gotten such help. They also argued it will cost consumers.

“Here we go again, picking winners and losers,” said Sen. Kyle McCarter, R-Lebanon. “The money has to come from somewhere. This is a bailout for a very profitable company.”

Submission + - 6 seconds: How hackers only need moments to guess card number and security code (telegraph.co.uk) 1

schwit1 writes: Criminals can work out the card number, expiry date and security code for a Visa debit or credit card in as little as six seconds using guesswork, researchers have found.

Fraudsters use a so-called Distributed Guessing Attack to get around security features put in place to stop online fraud, and this may have been the method used in the recent Tesco Bank hack.

According to a study published in the academic journal IEEE Security & Privacy, that meant fraudsters could use computers to systematically fire different variations of security data at hundreds of websites simultaneously.

Within seconds, by a process of elimination, the criminals could verify the correct card number, expiry date and the three-digit security number on the back of the card.

Mohammed Ali, a PhD student at the university's School of Computing Science, said: "This sort of attack exploits two weaknesses that on their own are not too severe but, when used together, present a serious risk to the whole payment system.

Comment Re:a personal experience (Score 1) 228

It sounds immensely like you belief you hit an existence controlled or observed by an entity other than known ones.

It sounds to me like the GP hit upon a mode of perception of their own internal processes, by their own mind, and that no "outside" observer was invoked in these perceptions.

It sounds to me like a thought arose that contained an interesting question and jolted them from that mode of perception. But nothing in the GP's post sounds to me like it confirmed or stated any belief in kind of entity,

So the parent's message, quoted above, sounds to me *almost entirely* a statement about the author's own beliefs, masqueraded as a statement about someone else's. I.e. a projection, seeing things in the GP's post which aren't there.

With regard to saying anything about "known entities" as though those are factual things. It is debatable whether one's mind, one's internal process, and consciousness and sub-consciousness, are "known entities" or simply fantasy constructions or theories. I've met people I respect who hold that those ideas are dubious and should not be taken too seriously when making important decisions. Which leaves me wondering, what is meant by "known entities"?

Out of the two messages, the parent and the GP, the parent message strikes me as the more religious and dogmatic. This is because the GP showed that they were exploring a question about what is known to them personally by the best available empirical means, while the parent's message contains only statements about their own beliefs (as I see it, masqueraded via projection) without any empiricism indicated.

Comment Re:Strokes (Score 1) 560

Most strokes are due to clots, cutting off the supply to some areas of the brain; rather than bleeds.

Recovery from all major strokes, as far as I know, involve the brain doing some amount of "rewiring" to replace the functions of damaged areas, over a long period of time. In the short term, to the best of my knowledge you want to restore blood flow as quickly as possible to minimise damage to the deprived areas, as well as stimulating the brain in a variety of ways. (But you don't want bleeds or swelling due to over-reactions.)

In those circumstances, persistent, long-term reduced blood flow does not sound necessarily beneficial to me, as a guess. But I would welcome objective research because the short-term and long-term effect on symptoms is far from obvious.

That said, I have known stroke patients who reported that cannabis caused some of their symptoms to improve, such as slurring of speech and fluid mobility. Being self-reported it is hard to be sure objectively, and also perhaps there are short term effects which don't last. But the same symptom improvements are reported by some MS sufferers, and there is some scientific research to support it in their cases.

Comment Re: Why would this concern Trump? (Score 1) 184

Actually, only a Christian parent sends their kid to Sunday school.

That statement is demonstrably false.

My parents are not Christian, never have been, and neither am I. I am definitely not baptised, and as far as I know, neither are they.

But I was still sent to Sunday school. I think it is quite common.

Slashdot Top Deals

I have the simplest tastes. I am always satisfied with the best. -- Oscar Wilde

Working...