Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment: Re:What a useless paper (Score 1) 181

by AnyoneEB (#48343225) Attached to: There's No Such Thing As a General-Purpose Processor

A genuinely interesting paper would have specific ideas for architecture capable of solving problems beyond the scope of current CPUs and GPUs.

A couple cool projects I've seen on making good use of dark silicon are GreenDroid and Chlorophyll, both of which are recent research projects on compiling for weird architectures that are specially designed to be energy efficient. If it's specialized for different applications that you want, then Anton is the closest I've seen; it's specialized for running physical simulations so it can do things like protein folding.

Comment: Re:Anonymity == being a schmuck for a good number. (Score 1) 728

by AnyoneEB (#48117343) Attached to: Why the Trolls Will Always Win

I agree that statistics require careful interpretation, and any claims made based on statistics require critical thought to determine if they are using statistics properly. There is, after all, another study someone else referenced in this thread that concluded the exact opposite by studying the proportion (not absolute number) of harassing tweets sent to a set of 65 celebrity Twitter accounts. I am unsure what your discussion of domestic violence statistics adds to this discussion other than giving an example of another emotional charged area where statistics are complicated.

The link I reference had two parts: (1) the actual study that showed the fake users created by the researchers which were identical except for gendered names resulted in 25 times as much harassment directed at the bots with females names and (2) the references to previous studies showing that reports of harassment are much more common from women. The assertion made by the article is that (1) supports (2). Note that in (1) the same researchers are the ones coding messages as harassing or not, so there is no separate subjectivity of men vs. women on what messages constitute harassment. That's why I cited it: it answers the question of "Do women get harassed equal to men and are just more vocal about it?" In fact, the data suggests women are less vocal about it.

Lastly, as I stated above, this whole argument is a tangent to the real issue which is "Trolling" or "Abuse". While you go pull more made up numbers to back your tangent, nothing gets done to resolve the real issue.

No disagreement there. The article is about abuse/harassment, not trolling, so the title is misleading.

Comment: Re:Anonymity == being a schmuck for a good number. (Score 1) 728

by AnyoneEB (#48114463) Attached to: Why the Trolls Will Always Win

I really wish we could just drop the sexism part of this right now. Both genders get attacked by these people.

Both do, but it *is* sexist. It is far more widespread and vicious towards women. Ignoring that is not helping.

Really now? Proof by assertion is not proof, it's an informal fallacy. Yes, even if you claim that not believing your assertion is "not helping". Prove that women get trolled more, and prove that the trolling is more vicious as you claim. I await your great study of everyone trolled on the Internet with eagerness.

While a complete census of internet trolling has not been conducted, it turns out there are statistics and they do support the GP: here's a study showing women get harassed at a much higher rate than men.

According to a University of Maryland study, online users who appear female are 25 times more likely to receive threats and sexually explicit messages than online users with male names.

and

The disproportionate targeting of women accords with statistics compiled by the organization Working to Halt Online Abuse (WHOA). In 2007, 61 percent of the individuals reporting online abuse to WHOA were female while 21 percent were male. 2006 followed a similar pattern: 70 percent of those reporting online harassment identified themselves as women. Overall, in the years covering 2000 to 2007, 72.5 percent of the 2,285 individuals reporting cyber harassment were female and 22 percent were male.

Comment: Useful programs (Score 1) 9

by AnyoneEB (#45176413) Attached to: Odds and Ends

My general strategy for performing simple tasks like generating a barcode or merging PDF files is to just do a search on my distro's package manager and there's usually a tool to do what I want (although it sometimes takes a bit of guesswork to figure out what it would be called). I don't remember what I used last time I needed to generate a (non-QR) barcode, but Debian only has one package simply named "barcode" which can probably generate whatever type of barcodes you need (also, there's tons of websites that will do it for you as well). For merging PDFs, I believe I've previously used pdfshuffler, which works fine.

Comment: Re:Decentralize Chat (Score 1) 242

by AnyoneEB (#43603205) Attached to: The Balkanization of Chatting

As much as I like the idea of decentralized protocols, the problem with decentralizing chat is that most of the nodes we are talking about are mobile devices and decentralized protocols tend to require a lot more communication---and therefore battery power---than centralized protocols where you leave the organization to the servers. Any decentralized protocol would probably have to handle that by somehow offloading the extra communication and computation to devices that are currently plugged in.

There is the additional problem that authenticating users in a decentralized fashion means that the is no equivalent to password recovery, but users might be okay with an account tied to their physical phone.

Comment: Re:Not google? (Score 3, Insightful) 81

Wikipedia's article on Mozilla Persona (which links to "How BrowserID differs from OpenID") clarifies that. While the site you are authenticating to gets the same information it would get via OpenID, the authentication provider doesn't know what sites you are using. Due to the indirection of storing the cryptographic credentials in the browser, the OpenID provider doesn't need to be contacted for every login and therefore doesn't know what sites you are logging into.

This is related to the design of Persona being browser-based instead of web-based, which also provides additional security (harder to fake a password entry box if it's normally generated by the browser).

+ - European Court of Human Rights finds against copyright law-> 1

Submitted by admiral snackbar
admiral snackbar (2559943) writes "The European Court of Human Rights has declared that the copyright monopoly stands in direct conflict with fundamental Human Rights, as defined in the European Union and elsewhere. This means that as of today, nobody sharing culture in the EU may be convicted just for breaking the copyright monopoly law; the bar for convicting was raised considerably."
Link to Original Source
Science

+ - Ants Use Sound to Communicate->

Submitted by sciencehabit
sciencehabit (1205606) writes "A new study shows that even ant pupae—a stage between larvae and adult—can communicate via sound, and that this communication can be crucial to their survival. The young insects have a specialized spike along their abdomen that they stroke with one of their hind legs, similar to dragging the teeth of a comb along the edge of a table. This noise serves primarily as an emergency beacon, allowing the ants to shout for help when being threatened by a predator."
Link to Original Source

Comment: Re:Issues (Score 1) 376

by AnyoneEB (#41623437) Attached to: Why Do So Many Liberals "Like" Mitt Romney On Facebook?

The 47% figure is rather misleading because it only refers to the percentage of people paying federal income tax. It turns out there are multiple federal taxes on income, only one of which is called the federal income tax. Most of those 47% pay the payroll tax which is a regressive income tax. For detailed numbers see this chart which Google image search found on this CNN Money video. For those that don't want to click the link, the breakdown according to CNN is 53.6% pay income tax and the rest not paying income tax are split up as 28.6% pay payroll tax, 10.3% elderly with no income tax, 6.9% non-elderly with income under $20,000, and 1% other.

Once you eliminate people paying income/payroll tax and the retired elderly, that leaves at most 8% not retired but not making enough money to owe federal taxes. Some of those are unable to work. Some of those are unable to find a job. Some small proportion might really be lazy and leeching off the system like you are worried about... but that is almost certainly much less than 8% of the population and definitely a lot less than 47% of the population.

On top of that, remember this entire discussion is only about federal taxes. There are also state taxes, which are pretty universally regressive. Particularly, most states have a sales tax which hits the poor much harder as anyone earning so little they aren't paying income tax is probably buying necessities with all the money they do earn and therefore immediately paying sales tax on a large proportion of their income.

This article that I came across while searching for those figures tells a similar story with more exposition and citations.

Comment: Re:Funny block... (Score 1) 177

by AnyoneEB (#40372949) Attached to: Google Bars Site That Converts YouTube Songs Into MP3s

Posting to remove accidental negative moderation.

I agree. Computer users should not need to know the inner details of how everything works on their computer in order to use it. Also, this goes back to my sig: having (effectively) a single video sharing website on the internet is bad because it can unilaterally do things like this.

Comment: Re:Windows XP (Score 1) 577

I'm actually not clear on exactly how copyright works for the source code of closed-source products. My understanding was that the source is never published, so it is never copyrighted. Instead, I would expect it to be protected as a trade secret. That said, copyright of the binaries of a published product should be the same as the copyright on the source code, but presently there is no incentive for Microsoft to release the source code when their copyright expires (as that won't be for a very long time, they will have likely lost the source or simply no longer exist by the time that happens anyway).

Comment: Re:it would work as intended. more resources for f (Score 1) 577

The siblings have covered a lot of the issues with your suggestion. Wikipedia's page on philosophy of copyright might be informative as well. Other common arguments include the tragedy of the anticommons (having rightsholders for everything means doing anything new requires negotiating with too many different rightsholders) and the general fact that essentially all creative works build on prior creative works in some way, either direct retellings like many of Disney's movies or more indirectly like many fantasy books have elves that look a lot like those in Tolkien's Middle Earth.

There is also the complication that IP covers a lot of different things. Particularly I think there is a difference between artistic works like a novel and utilitarian works like Windows (and that there is not necessary a clear line between the two), but they are both covered by copyright under the exact same terms. Having copyright act differently for different works sounds messy and should probably be avoided in order to keep the law sensible, but both types of work have to be considered when arguing for how copyright should work.

For artistic works, the idea is that any published work is part of the collective culture and anyone should be able to build on it... with the exception that the author should have a limited monopoly on it in order to make money off of it. By having that time get too long, you get absurdities like the copyright status of the song "Happy Birthday to You" where the song has become part of American culture.

For utilitarian works, I think the argument might be closer to patents: the government wants to give some protection to new inventions in order to ensure a profit motive for developing them, but other companies should have access to old inventions in order to build on them. This doesn't quite work with software because there is no requirement tor release source code in order to get copyright on software. Of course, binaries alone can be useful and with effort can be modified to some extent if necessary.

The correct time-frame for both of those arguments is subjective and may be different, so the number that appears in copyright law should be a compromise between the two.

Comment: Re:Block Annoying Users (Score 1) 410

by AnyoneEB (#39601041) Attached to: Slashdot Coming Attractions
I am not sure if this is exactly what you want, but you could get pretty close by setting your foe modifier to -6 (assuming you never browse at -1, of course) and marking those users as foes (and perhaps removing them from your foes list later if you think they might write something you would want to read in a later discussion). You can set modifiers here, which I got to by clicking on the score of a comment and clicking the edit link next to a modifier. Also, if you do want to block any comments from the sibling poster, you can set your anonymous modifier to -6.

Our business is run on trust. We trust you will pay in advance.

Working...