Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Stroustrup chose proportional-width (Score 4, Interesting) 394

All code in Stroustrup's "The C++ Programming Language" is presented in a proportional-width font: "At first glance, this presentation style will seem 'unnatural' to programmers accustomed to seeing code in constant-width fonts. However, proportional-width fonts are generally regarded as better than constant-width fonts for presentation of text. Using a proportional-width font also allows me to present code with fewer illogical line breaks. Furthermore, my experiments show that most people find the new style more readable after a short while."

Not only is the font proportional, but it's bold, italic, and serif as well. Now, reading a textbook is of course pretty different from editing on-screen, but I remember reconsidering some of my habits after reading that book. That code ain't hard to read.

Comment Re:Cheap Printer? (Score 1) 970

My dirt-cheap Brother DCP-130C came with full cartridges. I guess that's because the fixed costs of producing two lines of ink for the same printers are too high. HP, Epson and Canon sell a lot more printers and ink.

The downside to this printer is that it refuses to print anything, even plain b/w, once one colour cartridge is empty. I fooled it with a piece of black tape.

Comment Re:it's all about screen size (Score 1) 220

"Scrolling the text sideways"? It doesn't sound like you ever tried a decent mobile browser, like Opera Mini. It reflows text and resizes images to fit your little 3 inch window. For a whole lot of sites out there, neat and simple tricks like that work brilliantly.

As for the rise of web apps that the article brings up, that's where a mobile browser like Opera Mini falls short.
Media

AACS Hack Blamed on Bad Player Implementation 272

seriouslywtf writes "The AACS LA, those responsible for the AACS protection used by HD DVD and Blu-ray, has issued a statement claiming that AACS has not been compromised. Instead, they blame the implementation of AACS on specific players and claim that the makers of those players should follow the Compliance and Robustness Rules. 'It's not us, it's them!' This, however, does not appear to be the entire truth. From the Ars Technica article: 'This is an curious accusation because, according to the AACS documentation reviewed by Ars Technica, the AACS specification does not, in fact, account for this attack vector. ... We believe the AACS LA may be able to stop this particular hack. While little is truly known about how effective the key revocation system in AACS is, in theory it should be possible for the AACS LA to identify the players responsible for the breach and prevent later pressings of discs from playing back on those players until they are updated. As such, if the hole can be patched in the players, the leak of volume keys could be limited to essentially what is already on the market. That is, until another hole is found.'"

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...