Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:How does it compare? (Score 1) 400

That sound you heard was the point whoosing right past.

The point isn't possibility of emitting text.

The point is:

"This is the Unix philosophy: Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface."

Comment Re:How does it compare? (Score 1) 400

"Parsing"? What other tools have you been using?

And the fact that everything is an object is not very helpful unless there is consistent polymorphism and iterability.

As to easily extend the shell, you might have heard something like this:

"This is the Unix philosophy: Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface."

This philosophy was first written down in 1978. Good of Microsoft to finally start catching up to it. Too bad they think it's better done with proprietary object interfaces than with plain text, but maybe the next iteration will get there.

Comment Re:You might be right, but "what is your name?" (Score 1) 209

The law makes no such distinction. If you are a suspect of a crime, and the testimony is in pursuit of the case, you are allowed to refuse to answer any question at all, with a few well defined exceptions.

And yes, one of those well defined exceptions is you may not refuse to give your name.

You distinguish between questions by them being either one of the well defined questions you must answer, or any other question, in which case you do not have to answer.

That is the law. And it doesn't care if the testimony admits a crime or not. It cares if it is attached to a criminal case or not.

Comment Re:Not new - safe combos.Have to prove that you kn (Score 1) 209

It is not illegal to park your car at home at 7 AM in the morning either, but if the court asks you if you did that you have the right not to answer.

Your reasoning is a red herring. The point isn't admission of crime. The point is giving testimony. And answering questions about what you did at a certain time, or what password you set on your computer, is testimony.

Comment Re:Not surprised (Score 1) 118

The stable ABI is what created most of the mess in Windows. Listing this as a shortcoming of Linux shows you have no idea what you're talking about. A huge mass of badly maintained binary only drivers is not a good thing, it's an incredible liability.

Drivers need to be maintained. The only way to ensure that is to have their maintenance be part of the kernel maintenance. A stable ABI would directly counteract this.

And Microsoft keeps doing transgressions. They haven't washed out their stripes. They've just been slapped on the wrist enough to not be blatant about it.

Comment Re:FBI hack should not be made public (Score 1) 346

The case is not only extreme, it is valueless. When law enforcement knows that much about the situation, they already know what to do. The contents on the iPhone will not help them at all.

That illustrates no conflict at all. The answer is clear; privacy wins in this case. There exist no guarantees at all that the bomb exists, that the iPhone contains anything which will help defuse it, or that the information on the iPhone even is correct.

And if the bomb exists, and law enforcement have been so mind bogglingly incompetent that getting inside the iPhone is the only way to locate it, then the answer is to get less mind bogglingly incompetent law enforcement. Not to destroy the privacy of every iPhone owner in the world.

Comment Re:Shows the limits of freedom (Score 1) 1095

Who's freedom is more important? The transgendered woman who looks like a bearded, burly man who wants to use the men's room, or the women, who wants that bearded burly person in their women's room?

Oh wait, that's not what the women want! They want the obviously man looking person to go to the men's room. But the law prohibits that.

Is that really the majority rule?

Comment Re:Blackmail to allow perverted activities? (Score 2) 1095

Your arguing AGAINST this new NC law.

Under the law, someone who was born a woman but now looks like a burly, bearded man HAS TO use the bathroom together with your wife.

The law FORBIDS that person from using the men's room, and DEMANDS that person walks in with your wife.

If she says "please leave, this is the woman's bathroom", she is in breach of the law.

Comment Re:No winners here. (Score 1) 379

The concept of "single binary" is misleading. Computer science doesn't even include formal definitions for that concept, so it is not at all something basic. And frankly, I don't even understand what you mean by that in the context of distribution. I suspect that neither do you.

What this is about is distribution of various executable files. At the core is the question if one executable (zfs.ko) is derived from or to be considered a part of another executable (the kernel) *during distribution*. What happens at runtime is immaterial.

Slashdot Top Deals

How can you work when the system's so crowded?