Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Not a zero sum environment (Score 1) 554

In the digital realm it isn't a zero-sum game. If I help you write some code or share information with you then I don't lose it. In the physical world, if I share a cow or chicken with you then I have less food. It's easier to share when you don't lose that which you share.

Comment Highlighting invalid characters inside text field (Score 2, Informative) 281

I disagree philosophically with our current legal system allowing software patents. However it never ceases to amaze me how the internets take a patent, don't read it or understand it and then complain about things that don't even make sense in regards to the patent in question.

If you read the actual patent, it is talking about validating the text input as the characters are being typed in and highlighting the specific characters that don't match the regular expression. For example if you type in a SSN as: 1112-113-1111, then the 2 and 3 within the text field would be highlighted (e.g. highlighted red) as not matching the regular expression for a SSN. I think the key is that the error highlighting is done inside the text field. The highlighting of the text wouldn't occur until some timer expired (e.g. 200 ms without any new typing). This makes it so that the error highlights don't show up as you are typing but as soon as you stop. This is definitely more novel than the comments on this article make it out to be.

Should this or other software algorithms be patentable? No. However companies like IBM are forced to patent because if they don't then other patent troll companies sue them and win because they have trouble proving prior art. It is not illogical for companies like IBM to simultaneously pursue patent reform and continue to patent as much as possible under the current legislation. This is just taking advantage of the broken system while talking about how broken it is.

Comment Re:My experience in China (Nov. 2008) (Score 2, Insightful) 118

"This presents an interesting chicken and egg problem with circumvention software. How do you get the software in the first place if it's source of the software package is censored?"

apt-get install tor privoxy

I've been in countries where use of any method to circumvent state censorship is criminal, all known proxies are blocked, all proxifying/anonymising software websites are blocked, tor.eff.org is blocked and so on. But there are Debian mirrors hosted by the state funded university. No more censorship :-)

That implies you have a choice of which OS to use which just isn't the case in China. Most people use a cyber cafe connection running on Windows XP. Most Chinese simply can't afford the cost of a computer of their own. Nor could they afford the cost of an internet connection of their own.

Comment My experience in China (Nov. 2008) (Score 5, Interesting) 118

I went to China for vacation November 2008.  It was crazy watching the U.S. election from the Yengtze river.

Being the dork that I am I spent a good chunk of time playing around with the Great Firewall of China.  One thing that baffled me was the ease of which I could find "censored" material.  For example the wikipedia page for the Tiananmen Square protests was accessible (http://en.wikipedia.org/wiki/Tiananmen_Square_protests_of_1989).

Searching Google images for "Tiananmen Square" came back with hundreds of tanks, bloody civilians and the like - no different than in the U.S.

Yet some things were banned. I found that all the free http proxies that I tried were banned.  I couldn't get to wikileaks.org. And I couldn't get to the Tor website to download the installer.

This presents an interesting chicken and egg problem with circumvention software. How do you get the software in the first place if it's source of the software package is censored?  I ended up asking a buddy of mine in the U.S. to send me the Tor program via gmail, but not everyone has that option.

I was only on a very slow 8k/sec connection so at times it was difficult to tell if a site was banned or if it just was really slow.  I could only really tell by running a trace route.  It would always time out at the same router, presumably the router that bridged between inside and outside China.

In case anyone is interested here is a tracert going to a banned site.

C:\>tracert wikileak.org

Tracing route to wikileak.org [72.1.201.156]
over a maximum of 30 hops:

1   490 ms   298 ms   298 ms  220.192.136.4
2   298 ms   299 ms   299 ms  220.192.136.251
3   298 ms   280 ms     *     61.242.160.182
4   280 ms   342 ms   296 ms  211.94.54.205
5   432 ms   439 ms   439 ms  211.94.56.105
6   438 ms   459 ms   459 ms  211.94.55.5
7   358 ms     *     1107 ms  211.94.39.98
8   499 ms   480 ms   479 ms  211.94.55.250
9     *     1108 ms   479 ms  sl-gw22-ana-1-0.sprintlink.net [144.228.79.177]

10   498 ms   500 ms   518 ms  sl-crs2-ana-0-1-2-2.sprintlink.net [144.232.1.12
2]
11   518 ms   519 ms   539 ms  sl-crs2-fw-0-13-3-0.sprintlink.net [144.232.19.1
97]
12   536 ms   538 ms   558 ms  sl-crs2-kc-0-0-0-2.sprintlink.net [144.232.19.14
1]
13   537 ms   558 ms   538 ms  sl-crs2-chi-0-8-0-3.sprintlink.net [144.232.18.2
14]
14   528 ms   539 ms   539 ms  sl-st21-chi-11-0-0.sprintlink.net [144.232.20.21
]
15   537 ms   539 ms   540 ms  sl-bigpi4-209998-0.sprintlink.net [144.223.6.30]

16   536 ms   559 ms   539 ms  rc2ch-pos10-0.il.shawcable.net [66.163.65.41]
17   537 ms   719 ms   539 ms  rc1ch-ge1-0-0.il.shawcable.net [66.163.65.1]
18   556 ms   560 ms   559 ms  rc2sh-pos13-0.mt.shawcable.net [66.163.77.13]
19   558 ms   557 ms   559 ms  ra2sh-tge10-1.mt.shawcable.net [66.163.66.78]
20   597 ms   578 ms   580 ms  rx0sh-hydro-one-telecom.mt.bigpipeinc.com [66.24
4.255.38]
21   578 ms   559 ms   559 ms  142.46.128.14
22   779 ms   779 ms     *     tol-gsr.telecomottawa.net [142.46.130.10]
23     *        *        *     Request timed out.
24     *        *        *     Request timed out.
25     *        *        *     Request timed out.
26     *        *        *     Request timed out.
27     *        *        *     Request timed out.
28     *        *        *     Request timed out.
29     *        *     ^C
C:\>

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...