Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re: Chrome (Score 1) 97

The code for the DRM module Firefox uses is not part of the Firefox build system, but is downloaded at runtime. This can be done whether it's a Firefox built by Mozilla or not. So the DRM question has no bearing on whether you can call your version Firefox or not.

This series of blog posts: explains why Mozilla doesn't let just anyone call their modified version "Firefox".


Comment Re: Haha. (Score 1) 97

The bug is unfixed for philosophical reasons, not because it's hard to fix. The Bugzilla developers feel history should be immutable.

And there has been no rewrite into another language since that bug was filed; Bugzilla as released by Mozilla has always been in Perl.


Comment Re:"an act of social provocation"? (Score 1) 367

The funny (tragic) part is that the kind of people who tend to be strongly pro-gun, also tend to be strong against social programs that could prevent a great deal of the violence typically associated with guns.

Ain't that the truth...

It's not really the truth. If you doubt it, go to the neighborhoods in your city most thoroughly covered by "social programs."

I wouldn't go there unarmed, but that's up to you.

All of those violent neighborhoods would benefit from more of the law-abiding residents being armed to the teeth. The old saying goes "an armed society is a polite society," as nothing deters assholery so much as the sudden onset of room temperature-ness.

Comment Re:The Blame Game (Score 1) 1532

"Beyond that, failure to raise the ceiling would mean missed payments on existing U.S. government debt. And that might have terrifying consequences."

According to what I was told yesterday, this is unconstitutional. Debt payments _will_not_ be missed.

It would seem that Krugman is basing his entire article on incorrect information. The dollar will not become insolvent. The stock markets may crash, but that would only be due to canceled government contracts and 800 000 people out of governmental work.

Comment Re: Sounds good to me (Score 2, Informative) 555

"Brewed coffee should be enjoyed immediately!
"Pour it into a warmed mug or coffee cup so that it will maintain its temperature as long as possible. Brewed coffee begins to lose its optimal taste moments after brewing so only brew as much coffee as will be consumed immediately. If it will be a few minutes before it will be served, the temperature should be maintained at 180 - 185 degrees Fahrenheit. It should never be left on an electric burner for longer than 15 minutes because it will begin to develop a burned taste. If the coffee is not to be served immediately after brewing, it should be poured into a warmed, insulated thermos and used within the next 45 minutes."

Sounds like McDonalds was doing it right. I guess the woman that burned herself was unfit to experience coffee. Are you?

Comment Regexp::Assemble (Score 1) 190

Note first, I am _not_ saying to replace your call to grep with a call to perl. Perl _is_ fast on assembling strings into a great matching system, but it still takes a _very_ long time to parse, say, 65000 separate strings.

So combine them all into one. Use Regexp::Assemble. With a little bit of fidgetting, it works with GNU grep, as well. Here's an example script, that I've named regex-opt:

use strict;
use Regexp::Assemble;

my $gnu = 0;
if ((defined $ARGV[0]) && $ARGV[0] eq '-gnu') {
        $gnu = 1;

my $ra = Regexp::Assemble->new;
while () {

my $string = $ra->as_string();

if ($gnu) {
        $string =~ s/\\d/[0-9]/g;
        $string =~ s/\(\?:/\(/g;
        $string =~ s/([()?|]{})/\\$1/g;
print $string;

So, you have a file with your tens of thousands of lines of patterns to match. Ok, ./regex-opt < patterns.txt > This may work with egrep, but it's perl regex syntax, so maybe not completely -- procmail | egrep -f

With 65000 lines, GNU grep takes about half an hour for the tasks I give it. After assembling all 65000 lines into one expression, even when that expression is _megabytes_ in size, it loads quickly and has the speed of a decision tree.

So, as you accumulate new patterns, output them to a file. Also, _always_ keep your list of separate match patterns -- I'm not sure how well this package can handle reparsing a regex back into itself. Do matches like so:
egrep -f <(cat newpatterns.txt)

and once a week,
cat allpatterns.txt newpatterns.txt | regex-opt >; sort -u allpatterns.txt newpatterns.txt > temp.txt && mv temp.txt allpatterns.txt && rm newpatterns.txt

Comment $8 million robots (Score 1) 33

The last meaningful America's Cup races were held in the late '80s. Somebody squinted hard enough at the 12-meter rules and entered a multi-hull. Now it's just a matter of who spends the most money on a carbon fiber boat with a wing sail. This is a sailing race of fundamentally unseaworthy vessels. It would be literally be safer to cross an ocean in a dinghy than in one of these monstrosities.

Come September, do yourself a favor. Watch Deep Water on Netflix. Read any book on Ernest Shackleton. Read any Lin and Larry Pardey book. You'll finish all three before the America's Cup race is over, and you'll know more about sailing than watching every second of the America's Cup races.

Comment Re:OS X Upgrade Fear (Score 1) 362

I have a late 2008 15" MBP on Mountain Lion. It's fine.

Upgrade to the maximum RAM you are capable of. (A good practice at all times.) Mavericks will be a different beast, and it's well worth waiting to see on a 5+ year old machine, but you're probably fine.

Comment So what? (Score 4, Informative) 242

So what? Concern where concern is due. Do you really think that Google is going to be fetching your phone backups, hoping for a wireless password, then driving to your house and connecting to your wifi so that they can... sniff your traffic? Impersonate you on the internet?

How does this in any way matter? even if the password _were_ encrypted, it's reverseable encryption -- it _has_ to be. So they could just decrypt it, anyway. This is the same as on Windows: you can get a wireless key viewer that gives you the password of every network that Windows has memorized. Further, your computer is probably a great deal more accessible to anyone, especially those who are interested in your wireless network, than Google's phone backups.

As for those who are going to say, "Let the user encrypt it with a password!" ... most don't do that. Most people won't put one in, many will forget it if they do, you can't link it to a phone identifier because part of the purpose is in case the phone is lost, and part of the functionality is syncing to Google services -- so it has to be decrypted anyway. Wake me up again when Google syncs all the pictures you've taken with your camera to Picasa and posts them on your auto-created Google+. That'll be a fun day.

Slashdot Top Deals

"Life is a garment we continuously alter, but which never seems to fit." -- David McCord