Become a fan of Slashdot on Facebook


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:All bullshit (Score 5, Informative) 237

He was 17, she was 15 when the sex occurred. He didn't rape her. She regretted it afterwards, and either cried rape or was forced to cry rape by her parents.

18, not 17. It's in the article:

But at its core, the case was about an intimate encounter last year between a 15-year-old girl and an 18-year-old acquaintance, and whether she consented as it escalated.

And he was convicted because his story wasn't credible. He (now) claims he suddenly saw the light, seconds before penetrating her. And yet, for days afterwards she was texting him to ask whether he used a condom, and she went to a pharmacist for emergency contraception. Are those the actions of someone who wasn't penetrated? Add to that the fact that he repeatedly changed his story, and it's very easy to see why a jury didn't believe him.

And yet, despite all that, they didn't convict of rape. So you're right on that count, Anon. So why all your crying and attacking the victim?

Comment Re:From TFA: bit-exact or not? (Score 1) 160

There used to be a web page called "Your Eyes Suck at Blue". You might find it on the Wayback machine.

You can tell the luminance of each individual channel more precisely than you can perceive differences in mixed color. This is due to the difference between rod and cone cells. Your perception of the color gamut is, sorry, imprecise. I'm sure that you really can't discriminate 256 bits of blue in the presence of other, varying, colors.

Comment Re:From TFA: bit-exact or not? (Score 5, Insightful) 160

Rather than abuse every commenter who has not joined your specialty on Slashdot, please take the source and write about what you find.

Given that CPU and memory get less expensive over time, it is no surprise that algorithms work practically today that would not have when various standards groups started meeting. Ultimately, someone like you can state what the trade-offs are in clear English, and indeed whether they work at all, which is more productive than trading naah-naahs.

Comment Re:Does any one care? (Score 1) 440

The primary test for all kinds of organized crime is that there has to be an agreement between the involved parties, an understanding to commit a crime together. That is usually the difficult part to prove.

A torrent is more like a mob. You can leave or join at any time and nobody else cares much. There's very little organisation. I don't think you could successfully bring an organized crime charge against a mob.

Comment wrong approach (Score 1) 44

What we need more is a base model of distrust.

The primary design error in networking was to trust other devices. If we had designed networking from the start under the assumption of malicious intruders, we would have things like "to do anything, you need a token that proves you're allowed to do it". It would be in the protocols.

On embedded devices, I want a networking stack that will cryptographically check all incoming packets, and at the lowest level discard them if they don't carry a valid token. Nothing gets even processed unless you are authorized to interact with the device.

Comment Re:Does any one care? (Score 1) 440

this torrent is legally questionable to download

Depends on your jurisdiction.

In many jurisdictions, data about real-world facts cannot be copyrighted, so the only theoretically copyrightable parts are the texts that users wrote (profile texts and emails), and I would guess that AM is not the coypright holder (thought they could have a clause in the contract saying posting something on the site is a transferal of copyright).

So they could claim trade secret, but in many jurisdictions once your secret is no longer secret, it is not a trade secret anymore. Basically, the courts refuse to participate in the "let's sue everyone because the whole world knows" scenario.

Since you don't have a connection to the original hackers, what crime you think they would sue you for?

Comment Re:pros and cons (Score 1) 108

True to some extent. I didn't say forget all good practice.

But, for example, for the game listed in my .sig I wrote a lot of very specific GIS code. Yes, I could have spent the additional time and conceptual work and written a generic "find object on map based on criteria" service and maybe it would be useful in some future project.

But with what I've learnt doing it the way I did, I could write another task-specific piece of GIS code in half the time that the abstraction would cost me, with none of the overhead and performance impacts.

Comment pros and cons (Score 1) 108

There are definite advantages to a solo-programmer project.

For starters, you can take shortcuts you couldn't take in a team, because there is a reason that you have all these coding styles and guidelines and templates and levels of abstraction and frameworks and all that other stuff, and the reason is "you are not the only person working on this project".

Well, if you are a lot of these constraints disappear. I love to write code with a low amount of abstraction, because yes, I understand its advantages, but if I need to hop through 20 levels of abstraction before I find the place where the actual (potentially buggy) calculation is being done, that's just a chore. In a team, where other people re-use your code, you want modular.

There are projects you can do alone. In fact, a lot of applications can perfectly well be written by one person with enough time. I've got probably a million lines of code in various projects that are all one-man projects or started out that way.

And frameworks make your job easier not more difficult. There is so much stuff in them that you don't have to re-invent or write yourself. I wrote one complex web-app using pure PHP and I don't want to ever do that again. With Symfony2 (my choice ATM) or whatever other framework you like, you can have a basic app running in one day.

What I find to be the problem more and more is not that you need more programmers. But that you need designers and graphics artists and UX experts to make a competitive software, application, website, etc. today.

Back in C64 times, you could draw a couple sprites yourself, even if you were not an artist. Yeah, they would not look as great, but it was good enough. Today, peoples standards are higher and while you can make a 12x21 pixel that looks similar to what a real artist might make, you will not do something that comes even close at 128x128.

So in summary: Absolutely, you can code a reasonably complex application with one programmer. Aside from a few edge cases it is really hard to create the whole application with everything as one person. Though in parts you can simply buy what you can't make yourself. Icons are not a problem to get for free or for money, for example.

Comment Re:Does any one care? (Score 4, Interesting) 440

Yes, because this data set gives us interesting insights into so many topics. From figuring out what your chances of actually meeting a woman on such sites, to demographical analysis (how does the data set in the AM database vary from the average demographics? How can we explain the difference? Self-reporting bias (i.e. presenting yourself better than you are), of course, but maybe there is more?

Blackmailing these people really is just skiming the surface for easy-to-catch fish. If you dig deep into such a dataset, who knows what you can find?

Are their profile texts included? I'm sure you can do so many interesting linguistical analysis if you have both the texts and the demographic data. I know this has been done in the past on other dating sites for research projects, but here you have an even more specific set. We can measure deception in written language - do these profiles show above-average signs of deception, or are these people who deceive their spouses honest to their potential online partners?

Comment Wait until the terrorists get hold of this tech. (Score 1) 179

It would be useful both for disrupting "business as usual" that they don't like and herding crowds into range of a more lethal device.

I can imagine several of them being flown into, and triggered in, sessions of a legislature that authorized them. But I somehow doubt that would actually happen, even in tyrannical foreign regimes. If the legislature is giving the tyrant and his security forces what they want, why use it on them? And if the opposition can get them in there with "less than lethal" weapons packages, "more than lethal" would be even easier, and have a more lasting effect on future legislation. (Realpolitik is a bitch.)

egrep patterns are full regular expressions; it uses a fast deterministic algorithm that sometimes needs exponential space. -- unix manuals