Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Confusing symbols (Score 1) 1268

I remember seeing this kind of notation in my grade school textbooks. (I'm from Denmark by the way.)
Though usually it'd be presented with otherwise marked fields, rather than parentheses, and accompanied by short instructions. In earlier grades accompanied by a drawing representing the kind of problem solving needed, instead of written instructions. Like this:

Fill in the blanks, so both sides are equal:
4 + 3 + 2 = ___ + 2

In later grades, regular equation notation was then introduced, substituting x and y for blanks to fill in. Then you'd get a question like this:

Find the value of x in each equation:
4 + 3 + 2 = x + 2
x = ___

GNU is Not Unix

GCC Moving To Use C++ Instead of C 546

An anonymous reader writes "CodeSourcery's Mark Mitchell wrote to the GCC mailing list yesterday reporting that 'the GCC Steering Committee and the FSF have approved the use of C++ in GCC itself. Of course, there's no reason for us to use C++ features just because we can. The goal is a better compiler for users, not a C++ code base for its own sake.' Still undecided is what subset of C++ to use, as many contributors are experts in C, but novices in C++; there is a call for a volunteer to develop the C++ coding standards."

Comment Re:FLOSS software? (Score 1) 356

My following argument might not work if you follow it through, but consider it anyway.

Every time you consume a plant, you might deny an animal a source of food or a space for living. What if you eating an apple caused a sparrow to die of hunger, who could otherwise have survived off that apple? In this way, consuming plants might also negatively affect animals.

Comment Closed source? No. (Score 5, Insightful) 372

Huh?

H.264 is not "closed source", it's an open standard with open source encoders (famous x264, everything points to it being the best quality encoder available anywhere) and decoders (libavcodec), it's just that a bazillion companies have patents that cover every corner of video coding. It might be "unfree", but it's certainly not "closed source" or "closed standard" or "proprietary".

Comment Re:14k buys a lot of film. (Score 1) 347

Last time I had a 35mm film developed (which was late last year), apart from the negatives, I got digital prints of it. I didn't ask for it, but it's what I got. Naturally the negatives were developed chemically, as that's required, but after that most shops will scan the negatives and produce digital prints from that. And it isn't even cheap. Don't get me started on the price of getting low-resolution (about 5-6 MP JPEG) scans burned onto a CD, it's ridiculous.

Comment Re:I dont' see it this way (Score 1) 385

The "make a contract with us, get a phone and pay for it monthly" came maybe 4-5 years ago, and they're not still even locked the operator you bought it from

Not so in Denmark, I remember seeing operator-sponsored phones since the GSM network was first introduced 15 or so years ago, and I believe they have been SIM-locked as well most of the time.

Comment Re:Remote code execution is LOW impact? (Score 3, Insightful) 759

There's no remote code execution possible with this on XP, only DoS. You can make the system essentially freeze while the packeting is going on but that's it. Only Vista and Server 2008 have remote code execution exploits from this bug.

Also you can only exploit this if the machine has software accepting TCP connections. If you have an (application) firewall blocking all incoming connections with no exceptions (such as XP SP2+ has by default) there's no real problem.

Privacy

Tracking Stolen Gadgets — Manufacturers' New Dilemma 250

heptapod sends in a story from the NY Times about a growing problem for the makers of high-tech gadgets: deciding when and how it's appropriate to track a stolen device. With the advent of ubiquitous GPS and connections to services like the Kindle book store, the companies frequently have a way to either narrow down a user's location or impede use of the device. But some, like Amazon, are drawing a hard line when it comes to establishing that the device was actually stolen. "Samuel Borgese, for instance, is still irate about the response from Amazon when he recently lost his Kindle. After leaving it on a plane, he canceled his account so that nobody could charge books to his credit card. Then he asked Amazon to put the serial number of his wayward device on a kind of do-not-register list that would render it inoperable — to 'brick it' in tech speak. Amazon's policy is that it will help locate a missing Kindle only if the company is contacted by a police officer bearing a subpoena. Mr. Borgese, who lives in Manhattan, questions whether hunting down a $300 e-book reader would rank as a priority for the New York Police Department."

Slashdot Top Deals

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...