Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Not a tank (Score 1) 232

Many early tanks (up through WW2) had anti-tank capabilities (indeed, the first tanks had no reason to have anti-tank capabilities - there were no other tanks to fight against). The main distinguishing features of a tank are its armor (which need not necessarily be very heavy - just enough to deflect small arms fire), its tracks, and the fact that it has some sort of weapon mounted on a turret.

The Panzer I was classified as a light tank but was armed only with MG13 machine guns. The British Vickers Light Tank Mk VI likewise only had .50cal and .303cal machine guns.

Comment Re:Don't let them patent it! (Score 1) 80

Rhino runs an interpreter that first compiles JavaScript into its own pseudo-bytecode, and then interprets the pseudo-bytecode. I believe what Oracle is proposing is to compile JavaScript directly into Java bytecode, using the new features of the JVM to handle the dynamic aspects that weren't possible with previous versions of the JVM.

Intel

Submission + - Intel predicts 10GHz chips by 2011 (geek.com)

An anonymous reader writes: I stumbled across a story that was posted back in 2000, where Intel was predicting 10GHz chips by 2011. The comments people left predicting the future (today) was an extremely good read.

Comment Re:What a tool (Score 1) 505

You should just put a big banner across the top of the screen that reads: "BIG BROTHER IS WATCHING YOU." The government in 1984 gave full disclosure as well.

That said, they are your children, and by extension it's probably your computer as well (or at the very least, your Internet connection), so you're well within your rights to monitor how it is used. It isn't really even necessary to actually do any monitoring. As long as they believe they're being monitored, the effect should be the same.

Microsoft

Submission + - Microsoft's New Plan For Keeping the Internet Safe (itworld.com) 1

itwbennett writes: Microsoft Corporate Vice President for Trustworthy Computing Scott Charney used to think it was the responsibility of ISPs to keep hacked PCs off the Internet. Now, he says the burden should be on consumers. Speaking at the RSA Conference, Charney suggested that the solution may be for consumers to share trusted certificates about the health of their personal computer: 'The user remains in control. The user can say I don't want to pass a health certificate,' he said 'There may be consequences for that decision, but you can do it.'

Comment Contact Info Sharing is Optional (Score 1) 459

If any of you had bothered to read TFA, you'd notice that sharing your address and phone number is entirely optional for the user on a per-app basis. They just split the "Request for Permission" dialog into two options instead of one: 1. Access my basic information (the only option up until now) and 2. Access my contact information. Why anyone would actually choose the second option is beyond me (maybe they anticipate someone developing some sort of app that sends notifications via text messages), but it's not as if they're forcing you to share the information, or even making it likely that you'd accidentally share it.

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...