Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Really? (Score 2) 357 357

Good UIs should be designed to work with a single mouse button, because that means that they'll also work well with a touchscreen. There's nothing wrong with making some things faster with the right mouse button, which is how most Mac applications work. The right mouse button for the context menu was inherited from NeXTSTEP, where the 'normal' menu was a floating version and you could cause a copy of it to pop up wherever the mouse was with the right mouse button (RISC OS took this further and didn't have any kind of menu bar, using the middle mouse button to produce the menu on demand. Using RISC OS with a touchscreen or pen tablet was... interesting, and it only just counted as discoverable because the machines shipped with a mouse with the buttons labelled).

Comment Re: My Pet Peeves (recent Windows laptop keyboards (Score 1) 357 357

When I'm reading a document, I'll do two-fingered scrolling on the trackpad to navigate. I only use home/end and page up/down when I'm typing, to navigate within the document, and then I already have both of my hands on the keyboard. The function key can be pressed with the knuckle of the little finger of the left hand, so is pretty easy to hit.

Comment Re:The Microsoft key!!!! I've never used it...ever (Score 1) 357 357

Windows-R brings up the run dialog, which will autocomplete program names and used to be the fastest way of launching programs on Windows (it's well over 10 years since I last regularly used Windows, so I don't know if this has changed). Windows-D showed the desktop and Windows-F the system find dialog. All of these were pretty useful, but the key was still quite under-utilised.

Comment Re:The Microsoft key!!!! I've never used it...ever (Score 4, Informative) 357 357

Control and alternate already have well-defined meanings. Control is for entering control characters, alternate is for entering alternate characters. OS X uses both. UNIX keyboards used to come with a meta key, but this fell out of use as software was written for PCs without such a key. On OS X, the usage of the command key is inherited from classic MacOS: It's the modifier that you hold for commands. This means that the OS X terminal is the only graphical terminal that I've come across that doesn't suck for copy and paste. On OS X, every single program including the terminal uses command-C for copy and command-V for paste. The terminal is therefore free to use control-C for sending the character that they terminal recognises for SIGINT. Windows overloaded the alternate key for opening menus, which meant that it is no longer a convenient key if you need to enter non-ASCII characters (for example, a Euro symbol or a letter with an accent, which are both easy to enter on a Mac). Most desktop environments for Linux inherited a load of bad UI design from Windows before adding their own mistakes.

Comment Re:the most moronic subject matter on slashdot (Score 1) 312 312

it means they introduce programming to younger kids. you imagine kids chained in a classroom with their eyes propped open forced to watch bubble sort algorithms?

is learning music "forcing culturally objectionable content on our children"?

is learning math "forced march into the voodoo underlying antireligious science and anti free market economics?"

so i repeat: where the fuck do you low iq conspiracy theory morons come from?

it's actually a serious question. i have a serious difficulty understanding how a functioning human being can arrive at the deranged socially retarded concept you put forth in your comment. i'm 100% serious

Comment Re:memresistor? (Score 1) 159 159

The difference between persistent and temporary storage is important. Being able to have 128GB of RAM in a laptop that consumes no power when not being read or written would be a huge win (one of the reasons phones have limited RAM is that DRAM draws power all the time) would be very nice.

Comment Re:Thursday (Score 1) 99 99

Math and methodology only works if you know how and where to apply it. Not being an expert in any of the fields you are discussing, you wouldn't know.

That's hilarious. Data is data.

It doesn't matter where you apply your math or methodoloy, if you're doing them in an obviously incorrect way. A point which you keep seeming to miss. Scientists are not gods, they deal in the real world with real data just like so many others do.

Oh, the irony of you making that statement.

You don't seem to know what irony means either, Mr. Coward. Do you think I am not (or never have been) a scientist? On what do you base that assumption?

Comment Re:Thursday (Score 1) 99 99

Creationists only have to know a couple of things to call out a good number of biologists. Anti-vaxxers only have to know a couple of things to call out a good number of medical scientists. Moon landing crackpots only have to know a couple of things to call out a good number of NASA scientists. 9/11 Truthers only have to know a couple of things to call out a good number of materials scientists. Obama Birthers only have to know a couple of things to call out a good number of forensic scientists, etc.

The Dunning-Kruger table has been rather turned. Have fun.

Since it has been clearly explained to you many times that I am not any of those things, no they're not.

The only logical way to put those statements together is that you claim I am those things. It's not just an implication, or your final sentence would make no sense.

But making potentially damaging false claims about people in public, when you know (or reasonably should) that they are not true, is called libel. You know that, too.

So no, the tables aren't turned. They're right where they were before you made that ridiculous libelous comment. If anything, you have locked the tables firmly in place. That was a real dumbass thing to do.

I have to wonder why you keep doing it.

Comment Re:Improving data [Re:The Gods] (Score 1) 384 384

As I stated earlier: you can save all your misdirection. All it takes is simple logic to clearly show that Karl et al. results are an outlier.

I didn't exactly make this up, either. Lots of others have been saying it. In fact, even many of the big news sources haven't dared to touch Karl with a 10-foot pole. It's just that -- ahem -- "credible".

Serious (and valid) critiques of it started to appear even before it was officially published. And several papers have come out since which disagree.

I'm not going to go look them all up. But if you want a good idea of just how *desperate* this paper appears to be, have a look here.

No, I do not claim Watts is any kind of "final authority". It's just one example among many. If you haven't found at least 10 takedowns of the "science" in Karl et al., you haven't been looking. (Or paying attention.)

Your other rantings about past things you disagree with are of no interest to me. I stated it clearly enough in that last quote of me you supplied above. You're still doing the same old shit. Calling it something else wouldn't make it any more "charming". Actually, it would be lying.

Comment Re:Scripts that interact with passwords fields aws (Score 1) 364 364

" I've been in the software business for almost 40 years,"

Software, not security.

"I suggest you study texts on encryption, and maybe read the technical details of how a good cloud-based password manager like LastPass actually works"

https://blog.lastpass.com/2015...

That's all I fucking need to know. A piece of paper holding my passwords is more secure in my wallet than my passwords are with LastPass or KeepPass. I also have the ability to actually defend my stuff if someone tries to take it, whereas someone hacks your shit and it's gone, you're fucked. By the time you realize it, it's too late, they've made off with your stuff.

"Your super-whiz-bang method still requires a password, it seems"

Good authentication requires everything, including a password. We could switch to biometrics, you're fucked because there are any number of ways to get around that, including taking your head off. With a password added for second verification (or third verification, in this case) taking your head does me no good unless I was able to get the password from you before hand.

"How do you hash the passwords for your sites? Still using MD5?"

You silly noobs using hashes and salts. Nowdays smart people embed that information in an image file, good old steganography. You think you got a password database? Enjoy the cluster of hentai you just downloaded. Get past the fact that there's information inside the image? Good luck decrypting the white noise format used to encode it. Unless you have used my server software, you aren't going to be able to do much with it.

Do not underestimate the value of print statements for debugging.

Working...