Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Perfect solution (Score 1) 277

The ideal gaming platform would be one where not just the game but most of the electronics that have traditionally been in the console are also in the cartridge. Mass production of cartridges would keep that affordable to the end user. The console would effectively just be the power supply and monitor and controller interconnects.
This approach has many benefits including:
* New games could take full advantage of new hardware and general tech advances.
* Games hardware could be custom tailored for each game.
* Owners would never need to upgrade their base console.
* Cartridges would be practically impossible to pirate cost-effectively.

Comment Re:And this is why... (Score 1) 389

as a user you NEVER HAVE TO GIVE THEM ROOT ACCESS. Ever!

How are you planning on patching your OS without root ? Running software that binds to privileged ports ? Add devices to the system that require drivers ? Partition and/or format an external drive ? Etc, etc.

windows? I have to write to that abortion called the registry that is in the system folder.,

You mean the transactional database with per-user permissions ?

Oops install software? I need to write to system and system32.

No, you don't. Certain applications might require it, but it's not an OS issue.

Look I got me a open door into the system...

No, you don't. Create and modify are different things.

Comment Re:For those unfamiliar with UK .gov investigation (Score 1) 650

What they did was not illegal though, which is the point. The police investigated for illegal activities that the bulk of them were not involved in.

Those that did break the law are being prosecuted.

The expenses system as it existed was pretty scandalous (claiming for moat cleaning, duck islands, family members as employees etc), but it was not illegal.

Cellphones

Submission + - Unsolicited SPAM via Text Msgs 2

An anonymous reader writes: Received a spam text msg Tue, ignored it. Got two Wed, so I whois'd domain names, got an admin contact on the phone, he assured me they don't scrape phone numbers, and said I have to respond to them to take me off their list (although he said he couldn't FIND me on their list). Gotten four Thurs (so far), so I called my cell phone provider — lady said I had to respond with STOP to each one, after which it becomes illegal.

a) I would never (knowingly) opt into something as stupid as this; b) thought unsolicited commercial text msgs from someone I have no business relationship with were already illegal (yes, I've put my cell number on that govt donotcall list).

Getting them from 778-93 www.myedu411.com, 862 452 3918 www.EDUCATION6.com, 347 681 5006 www.CASH1600.com, 347 462 6581 www.CASH1900.com, and 347 981 2161 www.LOAD300.com, so far. Seems not right that I should have to reply STOP to each one to make them go away. Advice?
Microsoft

Submission + - Small design firm sues Microsoft over Bing name 1

Sammy writes: A small St. Louis company is suing Microsoft for using the name "Bing" without permission for its recently launched search engine. Bing! Information Design LLC v. Microsoft Corporation was filed on December 16, 2009 in the Circuit Court of the City of St. Louis and alleges "trademark infringement, unfair competition, and tortious interference with business expectancy." The small company claims it has been using the Bing name since 2000 and has applications pending to register the trademark, while Microsoft only launched Bing in May 2009.

Ars Technica

Submission + - Not Just Drones; Military Aircraft Susceptible Too (wired.com) 2

azoblue writes: Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room. That means militants have the ability to see through the eyes of all kinds of combat aircraft — from traditional fighters and bombers to unmanned spy planes. The problem is in the process of being addressed. But for now, an enormous security breach is even larger than previously thought.

Comment Re:Good Riddance (Score 1) 796

I have all the bills I can go to my credit card. If there's a mistake I can contest the charge.

Only seven bills do I pay by cheque: trash pickup (I prepay for the whole year by cheque), natural gas (has $5 service charge for credit card payments), electricity (same $5 service charge), water/wastewater (city won't do recurring credit card billing, so it's not convenient), house payment and loan payment (which I overpay to reduce principal), and of course the credit card.

My credit card company keeps sending me cheques in the mail that apply to the credit card account, but I doubt my gas, electric, or water bill will accept them for automatic recurring bill pay. Or at least, I'd hope my credit card company wouldn't.

Most of my bills would convert a check to an EFT anyway so I wouldn't get the canceled cheque back. My bank doesn't even give me back what canceled cheques do come in anymore: I get reduced single-sided photocopies instead. I couldn't even get a copy of, for example, Krusty the Klown's Cayman Islands Off-Shore Holding Corporation's endorsement stamp.

Comment Re:but what are the hardware costs? (Score 1) 534

Predators are controlled from Creech AFB, NV for the combat portion of the flight. Approach and landing are locally controlled. Note: For USAF assets only. As for CIA/other assets, who knows where they are controlled from? Payload information can be downlinked from the Predators/UAVs to local receivers as well as transmitted via satellites to various DCGSs (Distributed Common Ground Stations), and I suspect that's what the bad guys are seeing.
Google

Submission + - Google Launches Public DNS Resolver (blogspot.com)

AdmiralXyz writes: Google has announced the launch of their free DNS resolution service, called Google Public DNS. According to their blog post, Google Public DNS uses continuous record prefetching to avoid cache misses- hopefully making the service faster- and implements a variety of techniques to block spoofing attempts. They also say that (unlike an increasing number of ISPs), Google Public DNS behaves exactly according to the DNS standard, and will not redirect you to advertising in the event of a failed lookup. Very cool, but of course there are questions about Google's true motivations behind knowing every site you visit...
Science

Submission + - Scientists discover how DNA is folded within the n (sciencedaily.com)

mikael writes: Sciencedaily.com is reporting that scientists have discovered how DNA is folded within the nucleus of a cell such that active genes remain accessible without becoming tangled. The first observation is that genes are actually stored in two locations. The first location acts as a cache where all active genes are kept. The second location is a more denser storage area where inactive genes are kept. The second observation is that all genes are stored as http://web.mit.edu/newsoffice/2009/3d-genome.html ">fractal globules which allows genes that are used together to be adjacent to each other when folded, even though they may be far apart when unfolded.
Medicine

Submission + - H2S might be key to suspended animation. (cnn.com)

Ch_Omega writes: According to this article, Mark Roth, a biologist at the Fred Hutchinson Cancer Research Center, has been able to put fish embryos, fruit flies and even mice in what can be described as a form of suspended animation. From the article:

"The air we breathe is 21 percent oxygen. At 5 percent, (...) fish and flies — like us — would be dead in a few minutes. At 0.1 percent, it [is] another story. "You get a state of suspended animation and the creatures do not pass away, and that's the basis of what we see as an alternative way to think about critical care medicine," Roth says. "What you want to do is to have the patient's time slowed down, while everyone around them [like doctors] move at what we would call real time. (...) While it's true we need oxygen to live, it's also a toxin. (...) Scientists are starting to understand that death isn't caused by oxygen deprivation itself, but by a chain of damaging chemical reactions that are triggered by sharply dropping oxygen levels. The thing is, those reactions require the presence of some oxygen. Hydrogen sulfide takes the place of oxygen, preventing those reactions from taking place. No chain reaction, no cell death. The patient lives."

Comment Re:How about Air Traffic Control? (Score 1) 158

that's the other $22M in "what kind of project costs $32M".

I'm envisioning distributing the hardware among the radar centers proportional to traffic within the radar range area, to maintain locality of information. The important concepts that have received much more research and practical exploration over the years include search spaces and interconnection spaces - what are the possible trajectories, who needs to know and how urgently do they need to know, and at what point should the responsibility be handed off. Between the approaches used in massively multiplayer flight/space simulations, cell phone organization, etc., I'm convinced that a robust yet cost-scalable approach can be done at the quality level required for such a life-critical application. The project started in the 1980s was still based on strongly centralized control because the distributed model had not yet been demonstrated successfully. Just as RAID proved itself, I believe distributed processing is ready for ATC.

Comment Re:Mod parent up (Score 1) 235

So is spyware is already "banned" by privacy laws, why do we need this separate P2P legislation?

When spyware uploads your tax return, there is no way that is an accident, and it is also likely that the spyware didn't get on your system with your permission. Spyware is covered by existing laws because it is trying to do something bad.

P2P software is generally on your system because you wanted it there. When it uploads your tax return, it is most likely an accident. The P2P software is not doing something bad--it's doing exactly what you installed it to do. You just botched the configuration, or didn't realize that there was a need to configure it.

Hence, laws against spyware are not applicable. This law isn't about banning P2P. It's about making sure the people who install P2P software are aware of the consequences, so they can use it safely, which is quite different from what the spyware laws do.

Submission + - Legal Code in a version control system? (cnsnews.com)

coldmist writes: Sen. Thomas Carper (D.-Del.) said: "So, legislative language is so arcane, so confusing, refers to other parts of the code--'and after the first syllable insert the word X'--and it's just, it really doesn't make much sense." So, why don't they put it in SVN (or some similar VCS) where people can tkdiff the changes (ie new legislation is in a branch) or output a patchset? If a bill is passed, it's merged into the trunk. It just seems so logical to me, yet I can't find any mention of doing this on the web. What do you think?

Slashdot Top Deals

You have a tendency to feel you are superior to most computers.

Working...