Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Is any form of trivial encryption sufficient? (Score 1) 280

The way I see it, the problem with encryption is that it's generally computationally expensive and there are bandwidth overheads in performing strong worthwhile encryption. BUT, with the DMCA and other localised laws forbidding cracking of encryption, is strong encryption needed? Is it worth just encrypting things using a trivial dictionary or some such computationally trivial and zero bandwidth overhead system? That way if someone wants to look at the data, they'll need a warrant or else they'd be breaking the law. Is my thinking here valid?
Hardware

Submission + - World's oldest intact computer marks 60th birthday (abc.net.au)

atmurray writes: The forth computer to be made in the world and the first to be made in Australia has just turned 60.
Even better news is that this, the world's oldest intact computer, has been heritage listed which will see this important piece of history preserved for future generations.

Comment In some cases it could be ok... (Score 1) 502

As long as the program never runs with privileges different than the user installing it then it's not really a concern. In fact, it's not really any different to the user running whatever software they want in their home directory. However, as pointed out by many before, if the program runs with elevated privileges or under a different username or even worse, as root, than it becomes far too dangerous to allow. Hopefully a sane compromise can be achieved like only requiring root privileges to install programs that run elevated.

Comment The obvious question? (Score 2) 394

Wouldn't you BLOCK a person on facebook before getting a restraining order out on them? However, I don't disagree with this decision at all, and strongly agree with the previous comment:

Yep, not really news. Would "Woman with a Restraining Order Against Her Arrested for Calling and Hanging Up" make the front page? Even "Woman with a Restraining Order Against Her Arrested for Texting" wouldn't raise any eyebrows.

It's not newsworthy that a restraining order was violated. It's newsworthy that law enforcement are looking at the violation regardless of the communication channel. It's one more step towards realizing we don't need to create new laws with "e-this, or cyber-that" to have them apply to Internet traffic.

Comment Re:Typical redditor (Score 1) 137

OK so you've provided an edge case where a complex system would exhibit undocumented behaviour that the software engineers weren't aware of. What part of what I said is therefore Wrong? Just because things happen that aren't documented/expected, doesn't make them non-deterministic. If you want me to clarify what I said to the point of nitpicking fine. Digital hardware designers don't generally concern themselves with the analog behaviour of the underlying technology. Why? Because their lives are hard enough as it is dealing with digital stuff which they presume to be deterministic. Digital guys try and make the algorithm or code as simple as is practicable to minimise space whilst maximising space. Hardware just wouldn't be made if digital guys had to worry about non-deterministic effects of every latch and logic element in a design containing millions of such elements. Hell, digital hardware guys these days don't generally concern themselves with RTL, that's why we have languages like VHDL and Verilog.

Comment Re:Typical redditor (Score 1) 137

Leakage currents, neighbouring circuit interference and temperature are all able to be modelled (again, this is why Cadence et. al. are so expensive), plus hardware engineers worth their salt put in sensible tolerances for all these values. My point was, hardware design is comparably deterministic as software engineering. Sure, if you break the silicon or run it out of spec it stops doing what you designed it to do, but so does software.

Comment Just avoid linking to GPL libraries to start with (Score 1) 585

I've written a library which can be used fine without any GPL libraries but I wanted to add an extension that was essentially provided by an existing GPL library. So all I did is write a secondary library which links with my my original (non GPL) library and also the GPL library. I'm fairly confident all I have to do is license the second library under the GPL. It's clear my original library isn't a derived work of the GPL library (it doesn't even link with my secondary library nor the GPL library). Whilst the term "derived work" is a fairly legal term it isn't necessarily ambiguous or confusing to apply in the real world. I would think that the test "can my work operate in any form without the GPL work" is a fairly easy test to apply with regards to libraries and linking.

Slashdot Top Deals

Dinosaurs aren't extinct. They've just learned to hide in the trees.

Working...