Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

After 60 Years, a Room-Temperature Maser

junglebeast microwaves radiation is still light (102 comments)

"most in the field gave up on masers and moved on to lasers, which use the same principles of physics, but work with optical light instead of microwaves."

what the hell? microwaves are still EM radiation. EM radiation is light. thus a maser is just a regular laser in a different wavelength, no more different from a green laser vs a red laser....which are also just different wavelengths of light.

about 2 years ago
top

Code Cleanup Culls LibreOffice Cruft

junglebeast Your programmers suck? (317 comments)

"...and it probably isn't because the code base is especially bad."

Yes, it does mean that. Thousands of lines of deprecated code implies it was written in a sloppy and disorganized way and this is not only an indicator but, I would argue, a definition, of a terrible code base.

more than 2 years ago
top

Software Bug Caused Qantas Airbus A330 To Nose-Dive

junglebeast How should a computer behave? (603 comments)

I can't help wondering just how could a piece of code, which presumable didn't test its' input data for validity before acting on it, become part of a modern jet's onboard software suit?"
---

I'm surprised there are people who think that we have the technology to program computers to make decisions about how to control things like airplanes better then a human being.

Computers excel at solving mathematical problems with definitive inputs and outputs, but our attempts to translate the problem of controlling an airplane, or an organism, into a simple circuit...will necessarily be limiting.

They can only test that the computer program will behave as expected, but there is no test to prove that the behavior we attempted to implement is actually a "good" way to behave under all circumstances.

more than 2 years ago
top

Reverse Robocall Turns Tables On Politicians

junglebeast Unexpected consequences (252 comments)

While I am ALL for bombarding our sometimes misguided, uninformed or overzealous congressmen with public opinion...I have a fear that giving people the ability to set up automated calling in this fashion would just overwhelm their call centers to the point where they just stop picking up the phone and listening to the public at all.

more than 2 years ago
top

Paper On Super Flu Strain May Be Banned From Publication

junglebeast What if it CAN't be fixed? (754 comments)

The concept of publicizing security flaws makes some semblance of sense in the security world, but when it comes to viruses that could wipe out 50% of the world's population...because patches can be easily made and distributed rapidly over the internet.

When it comes to vaccines, that is NOT the case. It could take years, decades, or possibly never to create a vaccine..or the only vaccines might be too expensive or difficult to distribute on the scale that is necessary.

With a population of over 7 billion, not ALL rational people, not ALL happy people, I'm sure there are some individuals out there sick enough to want to destroy the human race. By reducing that barrier to entry to...perhaps...little more than the $20 it costs to purchase an online journal...it becomes an immediate death sentence for billions of people.

So shut the f* up about your ultra forward thinking concept of sharing info on how to kill us all, you sadist.

more than 2 years ago
top

Ask Slashdot: Post-Quantum Asymmetric Key Exchange?

junglebeast Re:Not so worried about quantum (262 comments)

I would probably inform some major banks, CC companies, etc and offer to withhold the secret for $10,000 a day up till 1 month. Then I'd go public and collect some of the prizes and scientific awards, retire and live a life of luxury never having to work again.

more than 2 years ago
top

Ask Slashdot: P2P Liability On a Shared Connection?

junglebeast Re:Log NAT Translations (346 comments)

Anybody could keep a log of their downloads and then simply delete the infringing files from the log before presenting it into evidence. This does not prove or even give credence to your defense, but the fact that you kept such meticulous logs shows that you had a reasonable suspicion that you might be brought into court for something...which makes you look even more guilty than before.

more than 2 years ago
top

Ask Slashdot: Best Adventure Game To Start With?

junglebeast Easy answer! (480 comments)

Quest for glory 1 VGA remake

more than 3 years ago
top

CS Profs Debate Role of Math In CS Education

junglebeast Computer science is mostly math (583 comments)

What's the difference between a computer scientist and a programmer?
Typically, the computer scientist is great at math but can't program, and the programmer is great at programming but stinks at math.

Unfortunately computer science has become a bit too broad to have an easy definition, however, the one thing that almost every hot field of computer science has in common is a heavy reliance on math. For example, to name just a few,
- natural language processing (predicate logic, probability...)
- computer graphics (projective geometry and numerical optimization)
- computer vision (projective geometry, advanced linear algebra, numerical optimization)
- computer security (aka cryptology, modular arithmetic)
- quantum computing (you don't even want to know)

more than 3 years ago
top

Ask Slashdot: Is the Recycle Bin a Good GUI Metaphor?

junglebeast Don't fight the system (465 comments)

You are correct that it is pointless to delete things twice. However you are wasting your time and defeating the purpose of the system by emptying your recycle bin.

Unless you are running some ancient relic of a home desktop, storage space should hardly be an issue. When deleting extremely large files they bypass the recycle bin and are directly deleted...so there is no need to pedantically empty it. As you noted, it is a waste of user time to do so.

However I can't tell you how many times I have found occasion to desire something that was previously deleted...perhaps months ago. Sometimes we make stupid decisions. Sometimes when going through and cleaning up files we accidentally delete the newer version and leave the older version. Sometimes when working ona project we make changes that later on don't end up working out so well and we decide we want to roll back to a later date. There are countless unpredictable reasons why we may want to retrieve a previously deleted file.

The correct way to use the recycle bin is to delete things and then forget about them. If you ever need that space, which you won't, you can manually empty it. Until that time, it is a waste of your time to empty it, and will probably come back to bite you someday when you realize it was a providing a function that's actually useful.

I think anyone who swears theyve never needed to recover a deleted file is either full of it or has a bad memory.

more than 3 years ago
top

How Do You Store Your Personal Photos?

junglebeast Re:a good home backup strategy (680 comments)

Good point, I will move them out of there.
About the static electricity thing, I actually wrap the drives in the original static protective plastic that they come in before putting them in bubble wrap for shock absorbency.

more than 3 years ago
top

How Do You Store Your Personal Photos?

junglebeast a good home backup strategy (680 comments)

I use three hard drives in my main computer. One small drive for the OS and installed applications, a second large drive to store my media (1 TB is sufficient for me), and a third drive to hold backups. Differential backups are automatically made for WIP data on a nightly schedule, everything else is automatically done on a weekly schedule.

Every few years I pull the hard drive and wrap it in some bubble wrap, package it into a cardboard box with the date on the outside and give it to my parents to store in their attic as a fallback.

The total cost of this operation comes down to about $100 every three years.

more than 3 years ago
top

Why haven't you bought a tablet?

junglebeast Missing option (459 comments)

Why WOULD I buy a tablet? Seriously? Do they have any purpose other than saying "hey look at me I have a tablet" ? Completely useless in comparison to a laptop for computing, and useless in comparison to an e-reader for reading.

more than 3 years ago
top

45 Years Later, Does Moore's Law Still Hold True?

junglebeast Self fulfilling prophecy (214 comments)

Chip makers intentionally regulate (slow down) their advancement to meet Moore's law because it allows them to make greater profits by forcing user's to upgrade on a regular basis, while still giving them enough time to thoroughly test the next iteration and make a profit on it.

more than 3 years ago
top

'YouCut' Targets National Science Foundation Budget

junglebeast Unexpected outcomes of research (760 comments)

Good research is usually applicable in other places as well. For example, this "frivolous" research such as understanding sound might translate into advances in sonar or sonic weapons or sonic manipulation, and "frivolous" research into soccer player dynamics could translate into better AI for robotic warriors, UAV's, etc. People researching pointless game theory for making Checkers AI can translate into improvements in AI such as robots that can play Jeopardy or outsmart opponents on the battlefield. Even completely unrelated things can be useful when there are mathematical or computational similarities that aren't obvious at the surface. For example, the problem of moving a jointed arm is essentially identical to the problem of reconstructing a 3D camera, and it might be solved using a technique that was originally invented as a path-finding algorithm for a soccer player. If you only fund research specifically related to, say, military designs, then these happy accidental discoveries wouldn't happen so much and fewer people would be interested in doing research in 1 particular area that is deemed "worthy."

more than 3 years ago
top

Thief Posts His Photo To Facebook Victim's Account

junglebeast Re:No backup? WTH? (222 comments)

To quote a Mozy user,
http://mozy.com/blog/misc/backing-up-hundreds-of-gigabytes-with-mozy/

"Gregory had mentioned that there is a 5mbps upload speed cap. In my experience, it’s much lower than that. The fastest I have seen uploads are around 1.8mbps or so. So maybe a 2mbps upload cap. "

I currently have about 1 TB of material that needs to be backed up. That will take 48.5 days to make the initial backup using Mozy...or about 2 hours to backup to another HDD. Honestly I think most people acquire or create new data faster than you could upload with a continuous stream...not to mention that if your upload pipe was 100% filled all the time, it would congest your ability to download or use the internet in any useful way.

Of course, backups are useless if you only make them once, so I want to do a backup about once a week. Guess which option I use??

more than 3 years ago
top

The Case For Lousy Passwords

junglebeast It is not true that your passwords are insecure (343 comments)

To quote the referenced article,

"Why is Ophcrack so fast? Because it uses Rainbow Tables. ....If you've salted your password hashes, an attacker can't use a rainbow table attack against you-"

In other words, any service with 1/10 of a brain will salt their passwords and be immune. They are also only vulnerable if they let their system get hacked and database stolen.

In other words its the same classic trade off as ever: you have to trust the person who runs the service to know what they are doing with your password. But if they do know what they are doing, then you shouldn't have to worry.

more than 3 years ago
top

Researchers Develop Genuine 3D Camera

junglebeast 360 yes, 3D no (96 comments)

Because all the camera focal points are approximately at the same location, the images can be stitched together in software to create a full hemispherical view. This is essentially the same type of snapshot that is used in Google street view, and allows you to look in different directions.

In order to change position, however, requires depth information. Because the focal points are not EXACTLY at the same location, it is theoretically possible to estimate depth, although the practical reality is that the precision of these depth estimates are sensitive to image resolution and the ratio between baseline and depth.

Even if each individual camera was something like 14 megapixel, the accuracy of depth estimations would be so terrible as to be completely useless for anything more than a few feet away from the device. The author's neglect to mention this critical short-falling in their demonstration...

more than 3 years ago

Submissions

top

Most evil software patent?

junglebeast junglebeast writes  |  more than 3 years ago

junglebeast (1497399) writes "1) Highlighting search results (Google, No. 6839702)
2) Multiple-choice questionnaires (Microsoft, appl. 20100311031)
3) Use GPU to process video (Microsoft, No. 7558428)
4) Mouse-over images (Abelow, US. 5,251,294)
5) Generic user interface with icons (Henderson, US. 5,072,412 )
6) Shut down button (Microsoft, US. 7,788,474)
7) Point-to-point internet connection (Hutton, US. 6,108,704 )
8) Using a computer to do anything at all (Microsoft, No. 666 )"
top

Arrr ye a pirate, matey?

junglebeast junglebeast writes  |  more than 4 years ago

junglebeast (1497399) writes "a) I have never in my life downloaded any pirated media or software
b) I have downloaded pirated media and or software, but not frequently
c) I routinely download pirated material and have never been caught
d) I routinely download pirated material, and have received letters asking me to stop from copyright holders and/or ISP"
top

Deleted facebook wall posts return to haunt

junglebeast junglebeast writes  |  more than 4 years ago

junglebeast (1497399) writes "If you're using the internet these days, you probably use facebook. You probably have some wall posts that not everyone needs to see that you deleted, and you probably thought that, having deleted them, nobody would be able to see them anymore. At least, this is what I thought. But when I checked my facebook page today, all of the wall posts I had previously deleted were there again. After refreshing and revisiting the page, they disappeared back into the void...but then when I came back again to check, they had all been resurrected and they seem to be back for good. All of those who have questionable content which they deleted from their walls should take this as a warning."

Journals

junglebeast has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...