Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:About CVS Only! Not SVN! (Score 1) 245

I was unaware CVS had any way to do this

CVS is just a layer on top of RCS. RCS stores all history for a given file, in a file in the RCS store named for that file.

Therefore to purge all history for that file, you delete it's repository file. Tada! Gone.

CVS is just a layer on top of something designed for single file programs, and it shows. It doesn't handle renames well. It doesn't handle getting arbitrary revisions of entire projects well. The more files you have in your project, the more overhead you'll consume attempting to track global project revisions.

SVN does at least fix some of that.

Comment Re:Bring the 10 Back (Score 1) 201

I found a lot of these problems were resolved by doing a system cache wipe ; it went from hardly charging at all to charging in sensible time. Currently the tablet has been sat lurking in an IRC channel on my nightstand, off charger, for at least a week, and still has more than 40% charge.

The only cable problem I had was when I dropped the thing on the floor when charging ; I had to rebend the shroud on the USB socket back into place. It's still a bit loose, depending on the cable you use.

Yes, you shouldn't have to tinker with things. I can't say I'm impressed with the overall quality of Asus's tablet offerings - my girlfriend has one of their transformer tablets, and the keyboard dock has failed - the connection seems to work fine, because the touchpad part still works... just the keyboard doesn't.

The Military

US Navy Develops Robot Boat Swarm To Overwhelm Enemies 142

HughPickens.com writes "Jeremy Hsu reports that the U.S. Navy has been testing a large-scale swarm of autonomous boats designed to overwhelm enemies. In the test, a large ship that the Navy sometimes calls a high-value unit, HVU, is making its way down the river's thalweg, escorted by 13 small guard boats. Between them, they carry a variety of payloads, loud speakers and flashing lights, a .50-caliber machine gun and a microwave direct energy weapon or heat ray. Detecting the enemy vessel with radar and infrared sensors, they perform a series of maneuvers to encircle the craft, coming close enough to the boat to engage it and near enough to one another to seal off any potential escape or access to the ship they are guarding. They blast warnings via loudspeaker and flash their lights. The HVU is now free to safely move away.

Rear Adm. Matthew Klunder, chief of the Office of Naval Research, points out that a maneuver that required 40 people had just dropped down to just one. "Think about it as replicating the functions that a human boat pilot would do. We've taken that capability and extended it to multiple [unmanned surface vehicles] operating together within that, we've designed team behaviors," says Robert Brizzolara. The timing of the briefing happens to coincide with the 14-year anniversary of the bombing of the USS Cole off the coast of Yemen that killed 17 sailors. It's an anniversary that Klunder observes with a unique sense of responsibility. "If we had this capability there on that day. We could have saved that ship. I never want to see the USS Cole happen again."

Comment Re:How about... (Score 3, Interesting) 482

Yeah, I can really relate to this.

The decent chaps (particulary ones who naievely point out "not all men..." before discovering this is like a red rag to a bull) are the ones who attempt to engage positively with these issues.. and because they are the ones trying to engage, they are often in receipt of some of the unpleasant feedback that should really be going to those other guys.

The problem is that once bitten, twice shy - it inclines most of us to back away and not prod that particular hornet's nest again. Which is a shame, because the idiots who create these problems in the first place are far more likely to listen to "bro's before ho's" - getting more of the decent men on side and active against their idiot step-brothers would be a victory for feminism.

I was really encouraged to see this point of view put forward by Emma Watson in her speech.

Both sides have something to learn - the well-meaning men need to learn that they don't need to engage with the women - they already *know* about discrimination. They need to engage with the misogynists.

And the feminists could help matters by swallowing some of their totally understandable rage and politely explaining this to us, instead of biting our heads off.

Comment Re:Camel = Horse designed by committee... (Score 2) 644

It's more of a task-switching thing for me.

I have multiple contexts I work in during the day. Each time I change tasks, but don't want to close the windows for the task I was doing before, I move to a new desktop. That, plus one desktop devoted entirely to communications (email, social media, etc), and I can switch between contexts with one or two ctrl-alt-arrow key combos, rather than painstakingly reconstructing the window layout each time I switch.

Until the OS supports saving a group of apps, complete with window position, open documents, etc (which would require a lot of app support), this is the best solution to task switching I've got.

Comment Re:In space (Score 1) 470

Virtual audio is how I reconcile it.

As atmospheric creatures, audio is an important and highly optimized sensory modality for us. It makes sense for ultra-modern space avionics to simulate audio in order to utilise this sense.

Comment Re:So the thought behind this is... (Score 1) 590

The uninformed want to know.

There in your question lies the answer.

People don't know what they look like from behind. In particular, for a woman, her rear profile is ascribed nearly as much allure as her front. It's inevitable that any woman with an interest in her appearance is going to want to assess her rear profile, and it's only a short step between wanting to see it, and wanting to photograph it, these days.

Government

Service Promises To Leak Your Documents If the Government Murders You 98

Jason Koebler writes With all the conspiracy theories surrounding some high-profile deaths in recent years, how can you, theoretical whistleblower with highly sensitive documents, be assured that your information gets leaked if you're murdered in some government conspiracy? A new dark web service says it's got your back. "Dead Man Zero" claims to offer potential whistleblowers a bit more peace of mind by providing a system that will automatically publish and distribute their secrets should they die, get jailed, or get injured.

Comment Re:Keep your important data on current storage. (Score 1) 113

it's basically a recording of the GDI commands.

There were a number of WMF exploits just because of this - because the WMF parser had insufficient bounds checking and you could pass malformed input directly to the Win32 API just by sending someone a picture.

This is also part of the reason that Microsoft Office Open XML isn't an implementable standard - because it contains a bunch of stuff that boils down to "call the Windows API".

Comment Re:Obama is but a puppet (Score 1) 236

Like many others have stated when confronted with this topic - I'd love to see them make a dramatization of the in-between years of Star Trek - the time between the present (or the near future), going through to the time of Zefram Cochrane and the subsequent ascent into the civilization that birthed Starfleet and the Federation.

Of course, the real "secret sauce" there is presumably that FTL travel means that previously scarce resources become much more readily available, as starships can visit locations where they are abundant and bring them back. This presumably ushers in an era of post-scarcity economics.

If you believe that these technologies can be achieved with mere Earthly resources, then perhaps we may even live to see it...

Comment Re:Good (Score 3, Insightful) 126

In addition to the notes that this is a minimal burden on most modern CPUs, Android L will offer much better battery life - on the same devices - owning to it's new execution environment, which will more than offset the additional cost.

I think it's a sop though - the problem, as demonstrated so well recently to a host of famous women, is not that your local device is terribly vulnerable. After all, we're talking one of the few pieces of data storage that most people will have on their person most of their waking hours.

The real problem is cloud storage. While much has been made of the tactics used to gain access to them, note that any sysadmin on the cloud services responsible likely has the same level of access. You'll only have "private" cloud when your device carrys a private encryption key that the service is not privy to - and this isn't going to happen on the big services (excepting MEGA, allegedly), because the reason they let you store your stuff on their cloud for free is because they can mine it for information. And could you really trust a "private" cloud client anyway? Who says the software doesn't leak your private key back to the author?

If you want private data, Free Software is really the only answer, and having your own private hardware would help too.

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...