Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Humans communicate 10 bits per second? (Score 3) 251

I didn't read the article. However even if this is bytes there's so much that is missed!

I look at a tree, recognize it and say "tree" in less than a second.

I can throw a ball against a wall and catch it before it hits the ground. Now give me a completely different size/weight ball and I can do the same (within tolerances of weight and size).

There is communication in both of those in which massive amounts of information is consumed and processed. For example the tree, 32 bits of information is relayed. However if I speak it then there is inflection, volume, direction, body language and intent that are all communicated in a short time.

Even though nothing is typed/spoken with the ball there is an output, catching the ball, that requires a tremendous amount of bandwidth utilized by a human.

Human Computer interfaces have a long way to go to catch up to these types of things; however, I think someone is raising an alarm about something that has no near term danger and just from the porn perspective will be developed as soon as is humanly possible. Think Matrix and Mouse pushing the girl in the red dress to Neo... The first in the porn industry to do that get's money from 99% of the world's men and a good portion of the world's women. Same thing happened with VHS....

Comment Malicious actors will not follow rules (Score 2) 176

" In addition, the research doesn't include the possibility of someone maliciously trying to hit an aircraft."

Why are we continuously discussing rules and regulations that will have zero impact on a malicious actor. If it's available to the general population but "regulated" only those bent on malicious actions will break those rules.

I'm all for reasonable rules; "don't fly your drones around an airport; don't discharge a firearm within city limits; drive on the proper side of the road; ..."

Will any of those rules stop someone from attempting to down an aircraft using a drone? Someone attempting to plow through a crowd using their car?

It would seem the things that give us the most freedom, aka liberty, are those things that are most regulated. A drone gives us a huge amount of freedom to do so many different things, including observe authority. It would seem those making the rules have a conflict of interest here...

Submission + - Birth of a black hole caught on camera (extremetech.com)

infodragon writes: For the first time the birth of a black hole has been caught on camera. RAPTOR, or RAPid Telescopes for Optical Response, was able to quickly detect the initial changes that prompted a closer look. What resulted was the largest gamma ray burst ever detected and greater than theoretically possible. To say the least, this is a valuable and exciting find that will add to our understanding of the universe!

Submission + - Apple: Don't make nuclear weapons using iTunes (cnet.com) 4

infodragon writes: Excerpt from EULA Paragraph G: "You also agree that you will not use these products for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of nuclear, missiles, or chemical or biological weapons."

Comment Re:Wayback machine? (Score 1) 480

Its not so grey as one would think.

Unless he was an employee (i.e. work for hire), which I doubt as he states contract; and unless the contract has some extremely strong language as to who owns the copyright then the originating developer has the copyright, the client has a license (This is the default of copyright law.) I have been in the situation of developing code as a contractor, there was lots of legal paperwork involved up front, but nothing stipulated the transfer of copyright to the corporation. This was a fortune 500 company and the code was for the only profitable division of the company for three years. When I wanted the code for another project that had nothing to do with them I stated this clearly when my contract ended. All their best attorneys got involved and I just maintained my right to the code, I did not get any attorneys involved. The end was a very nicely worded contract stating they, the client, would receive unlimited license to the code and a gentleman's agreement I would not compete with them. Fortunately it was a good relationship and I did not need an attorney. In the end their attorneys conceded that there was no way for them to obtain a true copyright unless the original contract started this was the intent, or that I signed it over at the end (which I was unwilling.)

To sum it up, employees are screwed; contractors have the option not to be screwed.

Hope this helps...

Android

Submission + - How do you store sensitive data on your mobile devices?

infodragon writes: I'm just now seriously diving into the mobile world and have many questions surrounding all the devices, apps and options. However, one stands out; How do I protect sensitive data? On Linux this question is easy, I use RAID 1/5/6, depending on need, with LVM in the middle and topped with LUKS. This setup is very powerful and extremely flexible. Is it possible to match the strength of LUKS on Android? iOS? What are the solutions the /. crowd has used?

Comment Re:You're asking the wrong question. (Score 1) 878

I picked up a large base of C code of a guy who would only code when he was drunk. It was the biggest mess I ever saw, except a small part that was commented, "I did this sober because it had to be fixed yesterday..."

In his case mind altering substances helped, but he had no business coding to begin with.

I had the misfortune of meeting one of his team mates who was consulting for the firm to "bring us up to speed." 60's throwback begins to describe him, which explained the other mass of rambling code I had to deal with. You could tell, by the names of functions and variables, when he had the munchies/giggles and it got dark when he was paranoid. Humorous to go through, terrible to maintain. Oh yea, did I mention this software was operating networks of ATMs, as in peoples money?!?

Comment Re:Umm (Score 1) 510

They were on a pretty good UPS system connected to a GFI breaker. The room was climate controlled so unless something very weird happened I don't think electrical or environmental were an issue.

Comment Re:Umm (Score 1) 510

I couldn't agree more... But what's best often meets real world. It was a skunkworks project with no budget. It was amazing we got things working the way we did and the results got the attention it needed and then the resources were allocated.

The server was the old 737(?) pin first gen amd64 bit system. 64 bit Gentoo linux with software raid running the 5 SATA 80GB Seagate HDs. 2Gb of ram for a DB of 150GB of which 80% of the data was accessed on a daily basis... It was CRAZY project put together with the lowest of budget that achieved results good enough to actually get resources allocated rather than "it's good! keep it up!"

Gotta love the reactions on /.

Comment Re:Umm (Score 1) 510

That and the fab process is so precise that a fault is replicated so precisely that after 90 days of 24/7 operation they all failed within 24 hours, 4 failing in 8 hours. So it was engineered bad luck!

Anyway I glad those days of system admin are behind me, I'm with my passion now which is HPC C++ development. Those experiences stuck with me and give me much more respect for the admin of the HW I now use. It's funny and sad to watch their expressions when I talk to them intelligently and with respect. It's like they've never had that happen before.

Slashdot Top Deals

A committee takes root and grows, it flowers, wilts and dies, scattering the seed from which other committees will bloom. -- Parkinson

Working...