Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy

Judge Rules Defense Can Use Trayvon Martin Tweets 848

theodp writes "The NY Times reports a judge in the second-degree murder case against George Zimmerman has ruled that Trayvon Martin's school and social media records should be provided to the defense. Judge Debra S. Nelson said Martin's Twitter, Facebook and school records were relevant in the self-defense case. In those instances, showing whether a victim 'had an alleged propensity to violence' or aggression is germane, the judge said. The defense also got permission for access to the social media postings of a Miami girl who said she was on the phone with Martin just before the shooting. Time to update the Miranda warning to include: 'Anything you Tweet or post can and will be held against you in a court of law'?'"

Comment Re:Not So Fast On The Pointers (Score 1) 326

I think this is what he prefers to see in code:


struct node {
        int x;
        struct node *next;
};
struct node *list_head;
int main(int argc, char *argv[]) { // create a list
        delete_item( &list_head );
}
void delete_item(node** pp, int i) {
        for ( node* entry = *pp; entry; entry = entry->next ) {
                if (entry->x == i) {
                        *pp = entry->next;
                        delete entry;
                        break;
                }
        }
}

Comment Re:Ikea jerker and a normal table (Score 1) 347

I did this about 6 months ago and it's working out great. I would also recommend getting a drafting chair so that you can "sit" at the desk when needed without having to adjust the height. You WILL get tired of standing all the time and it's probably better for your body to alternate between the two.

Comment Re:TWM: The others are just copies (Score 1) 654

Yep, all of our college workstations ran TWM as the default. If you really knew what you were doing, you compiled or borrowed FVWM from someone else and built up an awesome config file.

You could always tell who was a hardcore hacker because they had either A) a highly customized FVWM or B) a single window in TWM running emacs, vi or gdb. Everybody else had a mess of windows strewn about the TWM desktop.

Comment Re:NTP and hospitals (Score 1) 290

Can't speak for all medical equipment, but I worked on a major IV pump and it used time in exactly this way. The dosages were rate or interval based and the pump strictly used the internal clock to calculate elapsed time. There was a "clock" on the display but it was only used for display purposes, you could set it for 1:00 am Mar 3, 1983 and it would still work correctly.

Comment Missed the Acer Iconia (Score 1) 270

After using the G-Tablet for a few months, I gave it up in favor of the Acer Iconia. The Iconia runs Android 3.0, has GPS, supports a Bluetooth keyboard and has good viewing angles which G-Tablet had problems with.

Certainly not as small as an iPad but it's been a pleasure to use. I mainly use it for testing Flash games. I looked at a more than a few of the devices in the article and none of them could compare to the G-Tablet or Iconia.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...