Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:Their work is being wasted. (Score 1) 128

* If you suspend your laptop, then resume, the network manager prompts you to ask whether you want to reconnect to the WiFi point which you were using before. Why? It doesn't prompt you at boot, just after a resume. Yes, of course I want to carry on using the WiFi I was using a moment ago.

I have never had that problem. Must be a problem with your configuration? File a bug or ask on IRC.

* By default, if you drag a window to the top of the screen it causes the window to be maximised. Yes, I know they copied this from some other desktop, but it doesn't make it any less idiotic. It's overloading a gesture to do something different, and leaving you no way to do the old thing which the gesture used to do. It doesn't even make it any easier to maximise a window, because you could always double click on the title bar to achieve the same thing. It does however mean that if you want a number of tall windows (making best use of your large monitor) you have to jump through hoops to achieve what should be easy.

Doubtless others can provide lots of other examples.

I always use Super (aka Windows-Key) + Click + Drag to move the window around. Then you don't have to grab the top of the window, it works on the entire are. Also try Super + Rightclick for resizing. Works on almost all window managers.

Comment Re:Their work is being wasted. (Score 2) 128

"Gentoo fucks up the compilation part to a large extent" ... no it doesn't. It is true though that Gentoo upgrades sometimes need attention for resolving blocks. But in return you get a bleeding-edge, super-stable, polished system. It is extremely rare to see compilation errors, and they are usually fixed within days. Gentoo is a big community...

As for GNOME 3, I use it and I like it. It gets notifications out of the way until I have time and focus to attend to them. It does everything I need it to, it is consistently designed and behaves smoothly.

I don't get all the GNOME3 hate. I guess you want something that behaves like Windows 95-2000, but configurable. Great, enjoy KDE, GNOME 2, Xfce or whatever GNOME fork. But not all of us want to relive that time forever.

PS: KDE's Akonadi is a major screw-up.

Comment Re:Jblues, spin-doctor hired by the Malay regime (Score 1) 117

To all, if you really want to know the truth, please go find out what has happened to Ms. Lina Joy, a Malay Muslim who converted into Christianity and ended up being forcefully locked up and is being brain-washed by the Malay regime.

The following link tells all !

The link does not say that. It says that it is a difficult bureaucratic process. The link also states that 16 people have before renounced Islam and converted to another religion.

Comment Re:It's been 24 years (Score 1, Informative) 152

It has been fixed in the kernel, but many programs and libraries still use (sometimes accidentally casting into) 32 bit ints, and even parts of the Linux Kernel, such as file systems. Databases also use 32 bit timestamps. So deployment of a Linux kernel with 64bit time_t will not automatically heal everything.

Some links:
I like this one: "What's the worst that could happen?" :)

Comment Open source command interface? (Score 1) 99

Is there any open-source voice command interface? Something simple, which runs commands?

I would even be happy if I could record some commands and define what to run when I say that. Or if it had some learning interface where I can define "oh I meant that existing command, next time you know this pronounciation variant".

Comment Re:Like the DragonFly BSD approach? (Score 1) 131

I can't find it now, but somewhere on the NameSys website they had an interesting piece on what made them so successful in writing a fast filesystem.

Essentially, and I am quoting from memory now, classical file system codes start with a grand idea of what *should* be a fast architecture (e.g. B/B+/dancing trees, etc.), then code that in all at once until perfection, and finally benchmark the finished product.
In contrast, they would try an implementation of a feature, then quickly benchmark it on several file systems for performance, then try another implementation. Because they had a quite flexible code base, they could do this write-test-rewrite cycle very quickly, and converge on the best solutions through experiments. That was their secret sauce. Perhaps all FS code has to become more playable for key advances.

Then also they developed this plugin architecture with which you can activate and exchange various features of the FS. Well, Linux developers really didn't like that because it looks complex and is unlike any other FS in Linux.

Comment Re:What did you expect to happen? (Score 4, Interesting) 103

It is not really a security flaw, it is a choice of design, and the extension showed what the consequences are -- namely that you can find out the habits and travels of a person, remotely.
This is similar to the mobile phone metadata, from which you can learn everything* about a person


*You put in some assumptions too, and being very confident about the conclusions of that person may have low validity, but that hasn't stopped the NSA.

Comment Re:Puzzling (Score 4, Informative) 46

The relative velocities are quite low, because there is very little gravity. So their plan was not to make a jet system that reduces the landing velocity (you may be thinking of the moon landing), but instead to use a cold-gas jet to press the lander onto the surface. That system, unfortunately did not fire. Secondly (and perhaps related?), the trigger that should launch harpoons to anchor the lander did not execute. That is why it did not land, but bounce off again.

Comment Re:Barking at the wrong tree (Score 2) 114

People share links on Facebook, and re-tweeting is one of the core features of Twitter (culture), which always lets you retrace the original poster.

I think this is more about meme-sites, where pictures (and cartoons, infographics, etc.) are *copied* rather than linked to the original website, often stripping away the original author. Therefore you have websites that do not produce their own content, but bundles (and earns money with advertisement). When the original authors claim their copyright, the site complies, but the stream (and people's attention) has moved on, so it does not matter and they get away with it.

Comment Re:Narrowminded Fools (Score 3, Insightful) 313

Wow, what a load of rubbish.

Your post can be summarized in 3 sentences:
1) Legitimate militaries will not follow/trust the treaty
2) Uncontrolled individuals/groups will ignore the treaty
3) Something like this has never existed, there is no centrally controlling authority and/or treaties can not work.

You are wrong on all three. I just need to mention the treaty on landmines (Ottawa Treaty). It works. You can control the market and the militaries, at least the bulk of it. Also for chemical weapons there is a treaty, and it works. Even for chemical weapons (Chemical Weapons Convention) the number of incidents from uncontrolled individuals/groups is low.

Some of your points are also rubbish, like:
(X) Requires immediate total cooperation from everybody at once
(X) I don't want the government limiting my arsenal

This is not fantasy, banning weapon technology world-wide has been done before. Countries joined voluntarily, one by one, and are controlled by each other.

Comment Re:OpenBSD? (Score 1) 66

You can achieve the same level of security with Hardened Gentoo Linux (PaX, Grsecurity2, which is Gentoo with different flags) .
The only small difference is that strcpy is still allowed (applications should move to strlcpy/strpcpy instead).

Then again, I don't use hardened Gentoo, because last time I tried (couple of years back), it was hard to maintain on a simple desktop.

Other distributions that use PaX:

Comment How does that compare to desktops? (Score 4, Informative) 195

Similar statements could be made for desktops, where tray icon pop-ups for updates, email and chat notifications distract and interrupt workflows.

Maybe both for desktops and cars, this problem can be solved by detecting whether the user is currently focussed (on the road or a task) or relaxed/idle, and may be interrupted. Mylyn is a very impressive demo of thinking in this direction, I would like to see more of it.

Comment Re:Weird (Score 1) 146

There are some very nasty pieces of work on that list, rapists and murderers who presumably managed to get a removal order from within prison

Do you have any reasons for your presumption, or are you just babbeling? Maybe they were falsely convicted as rapists and murderers, the ruling overturned and they do not want to be called rapists and murderers every time someone types their name into Google, for the rest of their lives. The fraction of falsely accused rapists is somewhere between 10-40%, and that stigma does not go away.