employed DNA analysis on the blood-soaked shawl of one of the Ripper's victims, and has declared it in a new book an unambiguous match with
wouldn't just reveal the identity of the victim. ("y'see, it was a man's- blood!" "y'see the ripper had cut 'imself shav'n that morning" "y'see the worker girl she had 'er own knife a'course")
let's imagine that a majority of Slashdot readers is in favor of net neutrality -and- typically doesn't want to click to grind through to get the gist.
"House members plan to try and add an amendment to H.R. 5016 the Financial Services and General Government Appropriations Act to block funding of FCC network neutrality rules. so since the "FCC's (current proposed) network neutrality rules" suck, then we -want- this plan to add an amendment to succeed? or... since "Public Knowledge is asking citizens to tell Congress to stop meddling with net neutrality." we should instead want congress to leave the FCC alone (and its current commissioner, Tom Wheeler, fresh from the telecom industry)
please explain, in simple terms, on which side we "news for nerds" ought to feel about this news item!
They do in Seattle and SF and Chicago at least (often, but not always Sikhs). they started as drivers and now own a medallion. often they are paying off loans for it. and along comes Bezos backed Uber...
the cities demanded that they buy them to do business. now some of these cities are negotiating with Uber. how does your trusting immigrant business owner feel now?
...making something functional with less than optimum resources (cf MacGyver, bodge-up, gerryrig, uzw). which preceded the notion of "one who gains unauthorized access to computers" by oh... perhaps a whole !@#n seven years.
here's another current worthy tome which supports that earlier notion, and thus causes undue confusion: Hacker's Delight, which gets down to the hardware bits with some amazing cycle optimizations
yep. along with all the rest of the BLAS, EISPACK, CERNLAB, MINPACK, SOFA, ATLAS, EIGEN,
I really don't understand the "scientific computing
this is what it does: It provides the necessary software to support a private, possibly semi-secure, social network. Think: Facebook, but small and secret, presumably to protect your membership from an oppressive large authority.
(this post is a traditional trick to get someone who actually can answer this sensible question to become so enraged by this incorrect reply that their activation energy is achieved and we get a good answer. so take what i've written up there as false bait. (this works particularly well when one wants a clear definition to obscure technical terms. just get yourself on a Haskell board, and write: "monads? simple! they're factory objects that provide closures for a formal lambda expression" then watch the horror and outrage and eventually you get the correct answer from the former lurker class))