top After 60 Years, a Room-Temperature Maser
"most in the field gave up on masers and moved on to lasers, which use the same principles of physics, but work with optical light instead of microwaves."
what the hell? microwaves are still EM radiation. EM radiation is light. thus a maser is just a regular laser in a different wavelength, no more different from a green laser vs a red laser....which are also just different wavelengths of light.
about a year and a half ago
top Audi Gives Silent Electric Car Synthetic Sound
Burns gas and ozone for no reason.
top Code Cleanup Culls LibreOffice Cruft
"...and it probably isn't because the code base is especially bad."
Yes, it does mean that. Thousands of lines of deprecated code implies it was written in a sloppy and disorganized way and this is not only an indicator but, I would argue, a definition, of a terrible code base.
top Software Bug Caused Qantas Airbus A330 To Nose-Dive
I can't help wondering just how could a piece of code, which presumable didn't test its' input data for validity before acting on it, become part of a modern jet's onboard software suit?"
I'm surprised there are people who think that we have the technology to program computers to make decisions about how to control things like airplanes better then a human being.
Computers excel at solving mathematical problems with definitive inputs and outputs, but our attempts to translate the problem of controlling an airplane, or an organism, into a simple circuit...will necessarily be limiting.
They can only test that the computer program will behave as expected, but there is no test to prove that the behavior we attempted to implement is actually a "good" way to behave under all circumstances.
top Reverse Robocall Turns Tables On Politicians
While I am ALL for bombarding our sometimes misguided, uninformed or overzealous congressmen with public opinion...I have a fear that giving people the ability to set up automated calling in this fashion would just overwhelm their call centers to the point where they just stop picking up the phone and listening to the public at all.
top Paper On Super Flu Strain May Be Banned From Publication
The concept of publicizing security flaws makes some semblance of sense in the security world, but when it comes to viruses that could wipe out 50% of the world's population...because patches can be easily made and distributed rapidly over the internet.
When it comes to vaccines, that is NOT the case. It could take years, decades, or possibly never to create a vaccine..or the only vaccines might be too expensive or difficult to distribute on the scale that is necessary.
With a population of over 7 billion, not ALL rational people, not ALL happy people, I'm sure there are some individuals out there sick enough to want to destroy the human race. By reducing that barrier to entry to...perhaps...little more than the $20 it costs to purchase an online journal...it becomes an immediate death sentence for billions of people.
So shut the f* up about your ultra forward thinking concept of sharing info on how to kill us all, you sadist.
top Ask Slashdot: Post-Quantum Asymmetric Key Exchange?
I would probably inform some major banks, CC companies, etc and offer to withhold the secret for $10,000 a day up till 1 month. Then I'd go public and collect some of the prizes and scientific awards, retire and live a life of luxury never having to work again.
top Ask Slashdot: P2P Liability On a Shared Connection?
Anybody could keep a log of their downloads and then simply delete the infringing files from the log before presenting it into evidence. This does not prove or even give credence to your defense, but the fact that you kept such meticulous logs shows that you had a reasonable suspicion that you might be brought into court for something...which makes you look even more guilty than before.
top Ask Slashdot: Best Adventure Game To Start With?
Quest for glory 1 VGA remake
top Is the Business Card Dead?
Joel Bauer makes a very persuasive argument here in regards to professional business card design. Honestly anyone who is considering getting a business card should watch this video:
top CS Profs Debate Role of Math In CS Education
What's the difference between a computer scientist and a programmer?
Typically, the computer scientist is great at math but can't program, and the programmer is great at programming but stinks at math.
Unfortunately computer science has become a bit too broad to have an easy definition, however, the one thing that almost every hot field of computer science has in common is a heavy reliance on math. For example, to name just a few,
- natural language processing (predicate logic, probability...) - computer graphics (projective geometry and numerical optimization) - computer vision (projective geometry, advanced linear algebra, numerical optimization) - computer security (aka cryptology, modular arithmetic) - quantum computing (you don't even want to know)
top Ask Slashdot: Is the Recycle Bin a Good GUI Metaphor?
You are correct that it is pointless to delete things twice. However you are wasting your time and defeating the purpose of the system by emptying your recycle bin.
Unless you are running some ancient relic of a home desktop, storage space should hardly be an issue. When deleting extremely large files they bypass the recycle bin and are directly deleted...so there is no need to pedantically empty it. As you noted, it is a waste of user time to do so.
However I can't tell you how many times I have found occasion to desire something that was previously deleted...perhaps months ago. Sometimes we make stupid decisions. Sometimes when going through and cleaning up files we accidentally delete the newer version and leave the older version. Sometimes when working ona project we make changes that later on don't end up working out so well and we decide we want to roll back to a later date. There are countless unpredictable reasons why we may want to retrieve a previously deleted file.
The correct way to use the recycle bin is to delete things and then forget about them. If you ever need that space, which you won't, you can manually empty it. Until that time, it is a waste of your time to empty it, and will probably come back to bite you someday when you realize it was a providing a function that's actually useful.
I think anyone who swears theyve never needed to recover a deleted file is either full of it or has a bad memory.
top How Do You Store Your Personal Photos?
Good point, I will move them out of there.
About the static electricity thing, I actually wrap the drives in the original static protective plastic that they come in before putting them in bubble wrap for shock absorbency.
top How Do You Store Your Personal Photos?
I use three hard drives in my main computer. One small drive for the OS and installed applications, a second large drive to store my media (1 TB is sufficient for me), and a third drive to hold backups. Differential backups are automatically made for WIP data on a nightly schedule, everything else is automatically done on a weekly schedule.
Every few years I pull the hard drive and wrap it in some bubble wrap, package it into a cardboard box with the date on the outside and give it to my parents to store in their attic as a fallback.
The total cost of this operation comes down to about $100 every three years.
top Why haven't you bought a tablet?
Why WOULD I buy a tablet? Seriously? Do they have any purpose other than saying "hey look at me I have a tablet" ? Completely useless in comparison to a laptop for computing, and useless in comparison to an e-reader for reading.
top 45 Years Later, Does Moore's Law Still Hold True?
Chip makers intentionally regulate (slow down) their advancement to meet Moore's law because it allows them to make greater profits by forcing user's to upgrade on a regular basis, while still giving them enough time to thoroughly test the next iteration and make a profit on it.
top 'YouCut' Targets National Science Foundation Budget
Good research is usually applicable in other places as well. For example, this "frivolous" research such as understanding sound might translate into advances in sonar or sonic weapons or sonic manipulation, and "frivolous" research into soccer player dynamics could translate into better AI for robotic warriors, UAV's, etc. People researching pointless game theory for making Checkers AI can translate into improvements in AI such as robots that can play Jeopardy or outsmart opponents on the battlefield. Even completely unrelated things can be useful when there are mathematical or computational similarities that aren't obvious at the surface. For example, the problem of moving a jointed arm is essentially identical to the problem of reconstructing a 3D camera, and it might be solved using a technique that was originally invented as a path-finding algorithm for a soccer player. If you only fund research specifically related to, say, military designs, then these happy accidental discoveries wouldn't happen so much and fewer people would be interested in doing research in 1 particular area that is deemed "worthy."
top Thief Posts His Photo To Facebook Victim's Account
To quote a Mozy user,
"Gregory had mentioned that there is a 5mbps upload speed cap. In my experience, it’s much lower than that. The fastest I have seen uploads are around 1.8mbps or so. So maybe a 2mbps upload cap. "
I currently have about 1 TB of material that needs to be backed up. That will take 48.5 days to make the initial backup using Mozy...or about 2 hours to backup to another HDD. Honestly I think most people acquire or create new data faster than you could upload with a continuous stream...not to mention that if your upload pipe was 100% filled all the time, it would congest your ability to download or use the internet in any useful way.
Of course, backups are useless if you only make them once, so I want to do a backup about once a week. Guess which option I use??
top The Case For Lousy Passwords
To quote the referenced article,
"Why is Ophcrack so fast? Because it uses Rainbow Tables.
....If you've salted your password hashes, an attacker can't use a rainbow table attack against you-"
In other words, any service with 1/10 of a brain will salt their passwords and be immune. They are also only vulnerable if they let their system get hacked and database stolen.
In other words its the same classic trade off as ever: you have to trust the person who runs the service to know what they are doing with your password. But if they do know what they are doing, then you shouldn't have to worry.
top Researchers Develop Genuine 3D Camera
Because all the camera focal points are approximately at the same location, the images can be stitched together in software to create a full hemispherical view. This is essentially the same type of snapshot that is used in Google street view, and allows you to look in different directions.
In order to change position, however, requires depth information. Because the focal points are not EXACTLY at the same location, it is theoretically possible to estimate depth, although the practical reality is that the precision of these depth estimates are sensitive to image resolution and the ratio between baseline and depth.
Even if each individual camera was something like 14 megapixel, the accuracy of depth estimations would be so terrible as to be completely useless for anything more than a few feet away from the device. The author's neglect to mention this critical short-falling in their demonstration...
junglebeast has no journal entries.