Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:If it were me... (Score 2) 236

by pellik (#49475959) Attached to: Chess Grandmaster Used iPhone To Cheat During Tournament
This sort of happened a few years ago with a tournament in Croatia with Borislav Ivanov ( The cheating player had his friends analyzing the games that were broadcast live. They suspected him of cheating and disabled the broadcast, and he promptly fell apart. Interestingly, his wiki page makes it look like he may be innocent but statistical analysis is very clear (

Comment: Re:Competition rules (or lack thereof) (Score 1) 236

by pellik (#49475925) Attached to: Chess Grandmaster Used iPhone To Cheat During Tournament
Normal time control for tournament games in the US can be as much as 3 hours per side, and it's not uncommon for games to go the full 6 hours. Furthermore, there are typically two games per day. Not allowing people to get up and leave the playing area would just not be practical.

Comment: Re:Oh God No... (Score 1) 222

by pellik (#49151389) Attached to: Harrison Ford To Return In Blade Runner Sequel
Ridley Scott should never have tried to imply that Deckard was a replicant. It's a terrible choice for the movie and it's clearly not in line with the book. The story is about the dehumanization of Deckard while simultaniously humanizing the replicants. Deckard being a replicant just doesn't make sense in that context and ruins the entire point.

Comment: inter-agency sharing (Score 1) 406

by pellik (#49123273) Attached to: NSA Director Wants Legal Right To Snoop On Encrypted Data
My concern is this-
The NSA decrypts all messages to see if they need to read those messages. Those decrypted messages go into a database which, like the cellphone metadata database, is opened to other agencies (the police) to browse. Pretty soon the only messages the police will need a wiretap to gather are those which are easiest to collect.

APL is a write-only language. I can write programs in APL, but I can't read any of them. -- Roy Keir