Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:instant disqualification (Score 1) 648

I was pretty sure that APL had killed compactness as a measure of the power of a programming language once and for all. I guess people are still making this argument.

(~ R R.× R )/ R (left arrow) 1 (down arrow) R

There's the the equivalent code in APL even more dense. (well more or less slashdot doesn't let the characters go through the preview)

Comment Say what ? (Score 4, Insightful) 191

There is a similar problem with copyright law in the U.S., where changes to the law in the 1970s and 1990s have made it almost impossible for copyrights to ever expire. The changes favor the corporations rather than the individuals who might actually create the work.

Wow it's amazing how if you hate something enough you can see everything as justifying your hatred.

Having copyright extend ever longer is both stupid and counterproductive, but it's no way comparable to changes that take away a creators right to profit from their creations. Arguably it makes the creations more valuable and makes it easier to invest in creating material for either a corporation or an individual. Contrast that with a law from the article that "If the Japanese government changes the patent law it means basically there would no compensation [for inventors]." Apples to Orangutans here.

With so many very good arguments about why copyright needs to be reformed there's no need to make bad ones.

Comment Re:"Free Market" religion (Score 1) 182

Those bills weren't a product of Title II regulation, and you know it.

Forcing the ISPs to lease the lines out to other players, and hence creating actual competition and a plethora of mom and pop ISPs? That WAS a product of Title II regulation.

You sir, are a liar.

Really when did this happen ? ATT was regulated on this basis for 60+ years, and it wasn't till the consent decision and the telecommunications act of 1996 that you had competition in the phone sector. Putting Comcast/ATT/Verizon under Title II isn't going to give anyone access to their lines, it will give them the right to hang lines from the phone poles, for a reasonable rate. That's a far cry from allowing anyone with routers/billing software to buy wholesale and undercut the incumbents.

So while you think me a liar, I have to see you as uninformed

Submission + - Star Trek Continues Kickstarter 2.0 (kickstarter.com)

The Real Dr John writes: Vic Mignogna and crew have launched their second Kickstarter campaign to produce 2 or more additional episodes of Star Trek Continues, a fan-based web series finishing up the 5 year mission of the original Star Trek television series. The first Kickstarter campaign raised enough money for 4 episodes, 3 of which have already been aired. Depending on how much funding they get this time, they plan to produce up to 4 additional episodes.

Submission + - Verizon Grateful To Researcher Who Spotted Flaw In MyFiOS App (itworld.com)

jfruh writes: When Randy Westergren, acting out of curiosity, investigated Verizon's Android MyFiOS app for security vulnerabilities, he spotted some big ones, and let the telecom giant know about them. Somewhat amazingly, Verizon didn't react by punishing the messenger, but rather fixed the problems right away and gave him a free year of FiOS for his trouble.

Submission + - Report: NSA Can Hijack Existing Malware Botnets (itworld.com)

jfruh writes: According to a new report derived from the treasure trove of documents leaked by Edward Snowden, the NSA uses hijacks existing criminal botnets for its own purposes. Computers already infected by run-of-the-mill crooks might find themselves repurposed by the NSA, and then launching attacks that would be difficult to trace back to the shadowy security agency.

Submission + - Microsoft Outlook Users In China Hit With MITM Attack

BarbaraHudson writes: Online censorship watchdog Greatfire.org said the organization received reports that Outlook was subject to a man-in-the-middle (MITM) attack in China. A MITM attack intrudes on online connections in order to monitor and control a channel, and may also be used to push connections into other areas — for example, turning a user towards a malicious rather than legitimate website.

The attack involved a pop-up warning message in the email client. Once clicked upon, the user's emails, contacts and passwords could then be logged by the cyberattackers.

The attack on Microsoft systems comes after recent MITM attacks which reportedly have taken place against Google, Yahoo and Apple in China. Users of foreign services, such as Microsoft's Outlook or Gmail, are being forced to use local services instead — which the Chinese government can monitor to weed out signs of dissent.

Submission + - GCHQ intercepted emails from The New York Times, Reuters, BBC, and others (theguardian.com)

An anonymous reader writes: GCHQ's bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK's largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals.

Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency's intranet as part of a test exercise by the signals intelligence agency.

Slashdot Top Deals

What hath Bob wrought?

Working...