Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:lol = laughing out loud? WTF? (Score 1) 274

From the filed doc:

One particularly useful application of the invention is to interpret the meaning of shorthand terms. In one embodiment, a group of databases may be provided that each define one or more shorthand terms. These definitions may be structured in the database as shorthand terms paired with longhand terms. For example, one database may define the shorthand term "LOL" to mean "laughing out loud." Another database may instead define "LOL" to mean "lots of laughs." A database may also include multiple definitions for a given term. For example, a user's personal database may have two entries for the shorthand term "OMW" including "on my way" and "oh my word"

Comment Re:Not a fun conclusion... (Score 1) 185

So you'd think that a business would research and develop a phone to give to it's employees to come up with great ways of using it, and then not sell that phone to comsumers, just the software?

Really?

We've seen what the other vensers think of an open system and room to play. They give it the "Misery" treatement. It's be better for Google to release the phone under an open source hardware license to get it out there for others to improve on, and use their software on! Best deal for them and for gaining market share.

Comment Re:Sounds like an open-and-shut false-arrest case. (Score 3, Informative) 550

From the article:

Slightly confusing, because Bieber's Twitter account-presumably the one the cops wanted Roppo to use-does indeed show that he asked his fans to leave

at 4:30 pm Eastern:
"They are not allowing me to come into the mall. If you don't leave I and my fans will be arrested the police just told us.

And then:
"The event at Roosevelt Mall is canceled. Please go home. The police have already arrested one person from my camp. I don't want anyone hurt.

Comment Re:You laugh, but.... (Score 4, Informative) 502

They're in for a long battle.

Considering that the fix to this is already written out in one line of code in the same thread on the same day here:
https://www.redhat.com/archives/fedora-devel-list/2009-November/msg01055.html

And they have already admitted that the default security setting is not consistent with the philosophy they had built the Linux system on in the past. That's a pretty good turn around time for a mistake in the security area of an OS.

Comment Re:Should stop getting cancelled LATE (Score 1) 708

Some build the reset feature into the story arcs and you land up with Dr WHO

It's so long running they lost some of the original seasons in trying to recycle the tape back in the 60's
The recent reboot is more dramatic but they aren't straying very far from the base premis and way of writing. Some of the best episodes were guest writers that loved the show. Douglas Adams wrote some great ones.

Comment Re:This is just baffling! (Score 3, Interesting) 549

Easy solution for Google.

1. Block any and all direct links to Newscorp owned sites in the search results.

2. Downrank any sites that link to Newscorp owned sites as irrelevant linking. (They have this for counteracting googlebombing.)

3. Systematically provide alternative sources for any search results that would have linked to Newscorp owned sites.
.

So eventually even a search for "Newscorp" brings up every one of their competitors websites bashing them for being stupid, old, ignorant and irrelevant.

Comment Re:Vampire (Score 3, Interesting) 481

Not many people remember that "standard" vampires heal and that it lends to improvements. Therefore you would have the option of encasing your heart with metal shielding and making small bending pathways for the openings for bloodflow (if needed). If you made the casing out of strong enough material and during the proceedure moved the heart a couple inches out of position you'd be pretty safe. Barring of course the full military attacks.

So I'd pick the Vampire option with plans for the wolverine upgrade package.

Comment Re:Headline appears to be inaccurate. (Score 1) 152

Then they would have keylogger records, not email to present him as evidence. They would not be able to view recieved emails, just typed ones. And if that's the case he probably copied and pasted the bulk of the info rather than type it out. Most keylogging software doesn't capture that.

Or they used the keylogging to gain accoount passwords, which is very near theft. What if they see online banking passwords too?

Slashdot Top Deals

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...