Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Agreed (Score 1) 287

And fails to do so.
Even without this feature, for example the easylist privacy contains unreasonable exceptions for fucking GOOGLE ANALYTICS on some sites. I guess they payed to be able to track their visitors while others cannot (because its a damn privacy list).

Comment Re:Sexual Assault (Score 1) 513

> Your premise is that sexual harassment of real humans is bad. We are agreed on this.
And here the problem starts. Some see even looing to long as assault, others have nothing against some more serious assaults, because they see them as compliment. The real life implication is to be careful as long as you do not know somebody and that you may extend your bantering, when you know it's appreciated.
With this premise, the management defines a standard, which it deems okay, instead of defining some personality for the robot, which adapts to the user. Thinking the other way around, the robot should try to be a good friend. Some people expect a lot of respect in the sense of distance from their friends, some expect their friends to understand all their crude humor. The good thing about a robot is, that it has no fixed personality, but can try to adapt.
If reading the user's intentions is too hard, the easy way is to let him choose between lets say 5 robots. Write a short description of the character and let him choose between the business man, the playboy, the nice harmless women or the slut as his companion.

Comment Abuse? (Score 1) 513

Verbal abuse is the eye of the beholder. So there cannot be abuse to a computer program, because a computer is built to suit us and has no own emotions even when the programs try to mimic them.
There is no harm in accepting the play and doing some dirty talk with the user, maybe even role playing or whatever, as far as the programmers thought of it. Mostly it just goes to some witty or snarky responses, because nobody really wanted to build a cybersex robot (and cannot do it realistically).

Comment Stop using docker (Score 1) 86

To use the potential of docker, you need to use prebuild images, otherwise it doesn't speed anything up. Prebuild images are just like "okay, somebody uploaded something, i execute it and feed my important data to it". No need to say, it's a bad idea.
What to use instead?
Use plain LXC. LXC works great, you can easily generate a template with debootstrap (it brings a script, which does that) from official debian packages.
Then use ansible to install your stuff. An ansible file just looks like a Dockerfile, only that it has a reasonable function list like "apt: name=apache2 state=installed", which does not rely on writing your own commands "apt-get install apache2", so you avoid many pitfalls (for example quoting stuff with spaces and so on) and it uses jinja2 for templates. Read the docs yourself, it's a great tool to build environments or manage existing ones.

Comment Re:Why? (Score 3, Interesting) 65

Sorry, but what it shows is that gnome terminal sucks.

I know it's slow. And the startup time is not the biggest problem. It has tabs, if you want to.
But let some text scroll fastly there and look at the cpu usage.

Then use urxvt and compare startup time (instant) and text scrolling (almost no additional cpu, the program producing the text dominates).

Thats the reason against gnome-terminal. When a low cpu program occupies a whole cpu core, because the terminal drawing the output sucks, youre doing it wrong.

Comment Re: How dangerous (Score 1) 67

I think the ecosystem, the preinstallation and so on are asserting most users, that it's safe.

On the other hand, most PC software from not too shady sources (even warez) are pretty safe, while mobile developers seem to build adware and/or spyware without any doubts by default. I think its a mixture of claiming a new software ecosystem, which doesn't have any rules yet and the typical mobile device users, which sees his phone/tablet as consumer device like a tv and not like a computer. Realizing that something read your private data comes later.

Slashdot Top Deals

"Little prigs and three-quarter madmen may have the conceit that the laws of nature are constantly broken for their sakes." -- Friedrich Nietzsche