Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Here's a real situation. (Score 1) 317

The tact a lawyer is generally obliged to take is: advise the border guard that the information on the laptop is not controlled by the lawyer, and that the lawyer does not have the authority to give up the password.

A lawyer holds client information under the protection of solicitor-client privilege, and cannot be compelled even by court order to disclose that information, save exceptional circumstances (crossing a border not being one of those).

As a lawyer, the examples I keep in my back pocket if I am asked by a border guard to give up a password, after explaining the above, include: What if I represented a member of the border patrol in a potential dispute against their employer? Or a dispute between the border service and another branch of government? With my password, the border service could obtain access to communication that gives them an unfair edge, or perhaps inflames what would be an otherwise docile dispute. More importantly: would you or your colleagues, as border guards, seek the advice of and speak candidly with a lawyer about a potential dispute when you know that your employer might well be reading it?

Privilege lives high atop the field of concerns for lawyers, because anything that puts a chill on the communication with and advice of lawyers undermines the rule of law. Among other problems, not having rule of law puts a damper on the legal business, though it has historically been good for the hired-goons business.

The US and Canadian border guard in my experience steer respectfully clear of privilege.

Comment: Re:Unlocked (Score 0) 47

Sure the NUC is, but the point of the article seems to be the next generation of Intel processors.

If he actually meant the NUC the core of the NUC is a kit for OEM's to create prototypes for embedded systems and hobbyists to do the same. The BIOS by default is Intel Visual BIOS which is designed for configuration even of things like fan speeds and clocking. And of course that BIOS can be blown away and replaced easily by design. So I'm not sure how that makes the problem of ignorance any better.

Comment: CF card (Score 1) 464

by DrYak (#49170429) Attached to: Ask Slashdot: Old PC File Transfer Problem

PCMCIA memory card might do it, if you could find one (or more) spare?

Finding a real genuine PCMCIA memory card might be hard.
But they are directly compatible with CF card.

So using a dumb CF card to 16bit pc card adapter gives a way to copy the data out of the old machine.
Then putting the CF card into any USB card reader (or in a pinch, a CF card to IDE adatper, as long as you pay attention to PIO vs UDMA) will help copying the data into a modern machine.

Comment: Enlightenment where is it now? (Score 1) 91

by jbolden (#49159111) Attached to: Xfce 4.12 Released

BTW, what happened to E17? I remember Enlightenment being the darling-child of WMs in the Linux community. Is it nowadays to difficult to configure and/or install?

There is an OS called Tizen, Enlightenment Foundation Libraries are the core of it. Enlightenment still exists is getting better but its been moving away from just a cool window manager to a full on GUI for its OS.

Comment: Re:More of this (Score 1) 166

by jbolden (#49146703) Attached to: Microsoft's Goals For Their New Web Rendering Engine

Well said, excellent comment. Just a correction. CR LF (Windows), LF (Unix) and CR (Macintosh) so there are still 3. Also 0x00 is still used for lots of mainframe data for end of line though that gets a bit more tricky since the underlying concept of file doesn't map as well.

As CRLF was most common on teletypes.

Comment: Re: Hard to believe (Score 1) 166

by jbolden (#49146587) Attached to: Microsoft's Goals For Their New Web Rendering Engine

I don't know that's true. Gecko is open source as well. I'd say Webkit is likely dominant because Google picked it as an alternative to Firefox and Google's programmers plus Apple's programmers worked cooperatively for years. That pairing could have happened on a closed source project under a licensing agreement as per many other projects jointly developed.

The other thing I think that helped Webkit is that Webkit was designed from the ground up to be useful for other applications to build small custom browsers like one sees in many mobile apps.

Comment: Re:Hard to believe (Score 1) 166

by jbolden (#49146521) Attached to: Microsoft's Goals For Their New Web Rendering Engine

Yes I can. That's the sort of stuff they did say 20 years ago. They were advocates of both standards and individual experimentation. So for example they liked Flash being cross platform but wanted Active-X for when developers wanted platform specific features.

10 years ago their goal was to retard progress on the web.

Comment: Re:One thing for sure (Score 1) 531

by jbolden (#49145957) Attached to: Machine Intelligence and Religion

I'm not sure it is such a long time at all. How much does the complexity of computer systems increase every 5 years? How far is something Google's engine from being an autonomous, self improving analysis system far smarter than a human? As for self replicating code is what is self replicating not the AI. The same way that cultures break themselves into individual brains and replicate partial copies of the culture into new brains.

Human resources are human first, and resources second. -- J. Garbers

Working...