Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Verizon To Shut Down App Store By January

UninformedCoward Yay! (59 comments)

And there was much rejoicing.

about 2 years ago

University Students Become Superheroes To Teach STEM Education

UninformedCoward Back story flaw? (55 comments)

A lab accident that transformed them from normal scientists to super-powered members of The Scientific League of Superheroes.

Super heroes: We're here to teach you about lab safety!
Students: How did you become super heroes?!
Super heroes: A lab accident...
Students: ...

more than 2 years ago

Tennessee Passes Bill That Allows "Teaching the Controversy" of Evolution

UninformedCoward Re:The Bill (1108 comments)

I thought the same thing after reading the actual bill. Creationism is a theory and now teachers can't be reprimanded for pointing out its weaknesses.

more than 2 years ago

Tennessee Passes Bill That Allows "Teaching the Controversy" of Evolution

UninformedCoward The Bill (1108 comments)

In case you want to read the bill. I think 1D is the main issue.

more than 2 years ago

Ask Slashdot: Dividing Digital Assets In Divorce?

UninformedCoward And what about other stuff? (458 comments)

Domains, hosting, email, sensitive data backups and social media are all good examples but what about the really important stuff. How do you plan on splitting all that World of Warcraft gold?

more than 2 years ago

Why the Number of O's In LOL Matter On YouTube

UninformedCoward Re:Of course it matters (186 comments)

If you're over the age of 13 and still use "LOL", you should kill yourself.

more than 2 years ago

Satellite Captures Burning Man From Space

UninformedCoward Re:Typo Nazi (141 comments)

Hey! How do you know that mistakes didn't make his posters?

about 3 years ago

Biological 'Logic Circuit' Destroys Cancer Cells

UninformedCoward Re:I'm not counting. (98 comments)

1, it is only the 2nd of Sept.

about 3 years ago

Anonymous Hack One Gigabyte of Data From NATO

UninformedCoward Re:Shares (304 comments)

They probably are a security company.

more than 3 years ago

Women Remain the Ignored Audience In Gaming

UninformedCoward Re:The community (432 comments)

I wanted to add to this as I feel it makes a very valid point. Not only is this true but depending on the genre, the vulgarity can become much more than just vile/despicable. Why? A large part of the competitive gaming scene, or at least in more competitive games, 'psyching' the enemy can be a very viable strategy. As the gaming community has been over saturated w/ male gamers, they are more than used to the back and forth ridicule in these games. It probably only takes one instance of being called the worst possible expletive known to the female gamer to be turned off from that game.

more than 3 years ago

China Building World's Biggest Radio Telescope

UninformedCoward Size (121 comments)

I was at the Arecibo telescope last month and after seeing it in person I think it is no surprise China is building a larger one. 1000ft seems pretty small when standing on the dish.

more than 3 years ago

CNET Sued Over LimeWire Client Downloads

UninformedCoward Re:Quote (206 comments)

Best QOTD ever!

You will be a winner today. Pick a fight with a four-year-old.

more than 3 years ago

Robots 'Evolve' Altruism

UninformedCoward Re:Evolution? Not hardly... (360 comments)

From TFA

In real life, random mutations build up over many generations, leading to adaptations that help organisms better survive in their environment. In the simulation, the researchers replicated this process by randomly varying the strengths of the various connections that made up the robots' nervous systems.


more than 3 years ago

Favorite Sony Gaffe?

UninformedCoward Re:Other OS (329 comments)

And in all fairness, Sony only made Other OS to dodge export/import taxes by listing the console as a PC.

more than 3 years ago

Osama Bin Laden Reported Dead, Body In US Hands

UninformedCoward Re:War is not for trials (1855 comments)

you cannot fight real bullets with lawyers no matter how many lawyers you have.

But I am willing to try.

more than 3 years ago

77 Million Accounts Stolen From Playstation Network

UninformedCoward DRM (645 comments)

Hows that online requirement DRM working out for you guys?


more than 3 years ago

Graphene Super Paper Is 10x Stronger Than Steel

UninformedCoward Recycle! (244 comments)

And apparently it is recyclable into boots! Amazing!

more than 3 years ago

Ask Slashdot: Do I Give IT a Login On Our Dept. Server?

UninformedCoward HIPAA (1307 comments)

Taken from wiki. This is a breach on at least 3 HIPAA technical safeguards.

Technical Safeguards – controlling access to computer systems and enabling covered entities to protect communications containing PHI transmitted electronically over open networks from being intercepted by anyone other than the intended recipient.

Information systems housing PHI must be protected from intrusion. When information flows over open networks, some form of encryption must be utilized. If closed systems/networks are utilized, existing access controls are considered sufficient and encryption is optional.

Each covered entity is responsible for ensuring that the data within its systems has not been changed or erased in an unauthorized manner.

Data corroboration, including the use of check sum, double-keying, message authentication, and digital signature may be used to ensure data integrity.

Covered entities must also authenticate entities with which they communicate. Authentication consists of corroborating that an entity is who it claims to be.
Examples of corroboration include: password systems, two or three-way handshakes, telephone callback, and token systems.

Covered entities must make documentation of their HIPAA practices available to the government to determine compliance.

In addition to policies and procedures and access records, information technology documentation should also include a written record of all configuration settings on the components of the network because these components are complex, configurable, and always changing.

Documented risk analysis and risk management programs are required. Covered entities must carefully consider the risks of their operations as they implement systems to comply with the act. (The requirement of risk analysis and risk management implies that the act’s security requirements are a minimum standard and places responsibility on covered entities to take all reasonable precautions necessary to prevent PHI from being used for non-health purposes.)

more than 3 years ago

Ask Slashdot: Do I Give IT a Login On Our Dept. Server?

UninformedCoward Scrubs? (1307 comments)

Wait! jddorian?! Like JD, John Dorian, from the show Scrubs? I love that show!

more than 3 years ago

Tennessee Bill Helps Teachers Challenge Evolution

UninformedCoward Bias Article (735 comments)

Read the actual bill, the Science Mag reporter is a moron.

more than 3 years ago


UninformedCoward hasn't submitted any stories.


UninformedCoward has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>