×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Commenters To Dropbox CEO: Houston, We Have a Problem

Kardos Re:Drop Dropbox (447 comments)

Perhaps once the client is open source then the "Zero Knowledge" will begin to apply

about a week ago
top

UN Report Reveals Odds of Being Murdered Country By Country

Kardos Liechtenstein (386 comments)

here I come!

about two weeks ago
top

Under the Chassis: A Look At Tesla's Battery Shield

Kardos How much titanium (152 comments)

is there in one of these plates? Are they detachable by thieves to be sold for the metal value?

about two weeks ago
top

The Highest-Flying Wind Turbine

Kardos Helium (143 comments)

This can never scale due to helium scarcity. While even low-quality helium would undoubtedly work for this application, the quantities required to build these at scale would drive the price through the roof.

about three weeks ago
top

MIT Researchers Bring JavaScript To Google Glass

Kardos Now it's doomed (70 comments)

So how long is it going to be before someone writes some sort of java script that blinds the user?

about three weeks ago
top

Malware Attack Infected 25,000 Linux/UNIX Servers

Kardos Re:FreeBSD 9.1 (220 comments)

Here's the complete check from http://www.welivesecurity.com/...

The command ssh -G has a different behaviour on a system with Linux/Ebury. A clean server will print

ssh: illegal option -- G

to stderr but an infected server will only print the typical “usage” message. One can use the following command to determine if the server he is on is compromised:

$ ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo "System clean" || echo "System infected"

about a month ago
top

Is DIY Brainhacking Safe?

Kardos Of course (183 comments)

I did it last week. Setting up the electrodes was the easy part. The hard part was setting up the electrodes!

about a month ago
top

Your Next Online Order Could Be Delivered To Your Car's Trunk

Kardos Re:This seems like a good idea at first, but (162 comments)

It would make sense for people who drive to work, and leave their car in the parking lot from 9-5. These people will not be home to accept delivery because they're at work. That's the subset of people that this idea targets; not everybody.

about 2 months ago
top

FCC Planning Rule Changes To Restore US Net Neutrality

Kardos Excellent (235 comments)

I wonder if that We The People petition had anything to do with this..

about 2 months ago
top

California Fights Drought With Data and Psychology, Yielding 5% Usage Reduction

Kardos Re:flow = pressure/resistance (362 comments)

Might work for showers, but not for people filling bathtubs and washing machines.

about 2 months ago
top

California Fights Drought With Data and Psychology, Yielding 5% Usage Reduction

Kardos Re:compare water usage with "average"? (362 comments)

Who's going to notice? Are the numbers available such that an interested person could verify the computation of the average?

about 2 months ago
top

Gabe Newell Responds: Yes, We're Looking For Cheaters Via DNS

Kardos Re:Why do we still allow this sort of overeach? (511 comments)

I can't speak for android, but BB10 gives pretty good control over permissions. There are a bunch of categories that you can control access (GPS location, phone, contacts, email, text messages, stored files, internet, etc). Many apps that request permissions will still run without them, for example a weather app can get location from GPS if you allow it, otherwise you specify the location you want the weather for. Of course, some apps won't run if you don't give them all permissions - these get promptly deleted.

about 2 months ago
top

Gabe Newell Responds: Yes, We're Looking For Cheaters Via DNS

Kardos Re:Why do we still allow this sort of overeach? (511 comments)

> It seems these days most apps are hostile to the users, it's time we treated them as such and stopped letting them have the run of our computers.

Well that the tradeoff when it comes to closed source software. You have to trust that the provider of the binary is Not Evil.

> It's time we eliminate this idea that every app has access to every file on our computers.

Mobile has made some progress here with "App Permissions", such that you can limit what an app can do. It's easy to do this when you build a new system, apps have to conform to it. With PCs, the "app can do whatever it wants" has been standard for years and it'll be hard to change it.

about 2 months ago
top

Would Linus Torvalds Please Collect His Bitcoin Tips?

Kardos 136 dollars? (231 comments)

A morning's worth of developer wages collected over half a year? Plus it's not money, the effort to get that converted into money is probably more than a morning. Why bother?

about 3 months ago
top

Cameron's IP Advisor: Throw Persistent Copyright Infringers In Jail

Kardos The only solution (263 comments)

is not to play the game. The rise of creative commons and the like will end this oppressive copyright regime. Free software and free culture is the only way to go.

about 3 months ago
top

Target Credit Card Data Was Sent To a Server In Russia

Kardos Re:it DOES matter! (137 comments)

You're right, the cost of fraud is spread out thinly over a variety of things, and yes, we're a bit less well off than we would be in a fraud-free scenario. It's very much like insurance, although less explicitly spelled out. A loss due to shady criminals, or a loss due to lightning strike, it's still a loss.

about 3 months ago

Submissions

top

University of Tokyo scientists levitate and move objects in 3D using sound

Kardos Kardos writes  |  about 4 months ago

Kardos (1348077) writes "Scientists at the University of Tokyo have demonstrated levitation and movement of objects in three dimensions using focused sound waves. The technology uses a phased array of speakers to produce an "ultrasonic focal point" capable of suspending small objects. The position of the focal point can be moved (gradually) leading to a control of an object's position in three dimensions. Parlour tricks aside, what are the uses and limitations of this technology? What would be the largest object one might control with such an array?"
Link to Original Source
top

Hawking to accept position in Waterloo, Canada

Kardos Kardos writes  |  more than 5 years ago

Kardos (1348077) writes "Despite the denial of rumours, Hawking has accepted an appointment as a distinguished research chair at the Perimeter Institute in Waterloo, Ontario Canada. It appears that Hawking will only spend summers in Canada but should lead to a close partnership between the recently founded institute and Cambridge University."
Link to Original Source

Journals

Kardos has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...