Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:It probably comes down to ... (Score 2) 86

Indeed. That is why I am interested in different schools of thought in mathematics. For example, the ancient Greeks were builders rather than mathematicians, and therefore solved different problems or similar problems in another way. I would not know how to prove Pythagoras' theorem without the Greek school of thought. On the other hand, the Arabic school of thought brought us abstract thinking. It took aerodynamics to add boundary layer theory to computational mathematics.

The most interesting thing can occur when those schools of thought are mixed. Hodographic transformation as used in aerodynamics is very similar to a Burrows-Wheeler transform in computer science, but the application is totally different. Who knows what other differential equations solving techniques could yield better data compression, for example?

Comment Re:True enough (Score 2) 518

And so was bombing Iraq. While I don't agree with the terrorists, I can understand that they return the "favour" that has been done to them (one of the terrorists apparently came from Iraq). I mean, the main difference between "shock and awe" and "terrorism" is "us" and "them". I just don't understand why they do this to France.

Comment Re:Huh (Score 2) 187

Yes, only it is illegal to even discover the backdoors. This is great for security firms. Those firms are off course not notified of the backdoors, but it will be illegal to report those malicious pieces of code. Unless they are programmed by a non-government criminal, in which case it is their job to disclose them. Nice!

Comment Re:Why "IoT" security is so critical (Score 1) 148

Well, one of the reasons that these devices are connected is to harvest data. That is why they are open to the net in the first place, and that is the major security problem. If such a device only accepts traffic from the local network with decent encryption, it creates too little data to even get noticed. But if it blabs to the outside world all the time, it is literally begging to be used as an infiltration vector.

Marvelous! The super-user's going to boot me! What a finely tuned response to the situation!