Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:How badly coded are Windows applications? (Score 1) 349

No.... this really comes down to not knowing, and not using, the API provided to you by the OS for handling version detection.

Almost all of the results in the search are Java applications. Java doesn't provide access to the specified API. The only way you can do it is with System.getProperty("os.name") and System.getProperty("os.version") which both return strings.

This is exactly why all modern Javascript libraries do feature detection instead of relying on User-Agent strings.

The code that turns up in most of the search results is trying to determine the correct executable and arguments to execute a command line (i.e. it picks the right one of "sh -c", "command.com /c", or "cmd.exe /c"). How would you propose doing this without determining what operating system you're running on?

Comment Re:Duh! (Score 4, Insightful) 75

It isn't terribly surprising that adding a cartoonish rendering effect to both real and virtual objects would make them more difficult to discern as such. I certainly wouldn't call it more immersive - quite the opposite, in fact. It is extremely obvious that what you are looking at has been altered and that you are not looking at "reality".

Right, but "immersive" doesn't mean "difficult to distinguish from reality" but rather "easy to treat as if it were real". I mean, I used to find playing Elite on my Sinclair Spectrum "immersive", but there's not a chance I'd ever fail to know it wasn't real. Being immersive means allowing people to retain what's often called "willing suspension of disbelief" -- as long as the system I'm looking at behaves consistently, I can treat it as if it were real, so I can (at least sort-of) believe in its existence as a real thing. And maintaining that sense of existence is what people mean when they say immersion.

The filters they applied in the video make the scenes look less realistic overall, but they make them more consistent, and that lets me believe in them as real in a way I can't easily believe in the unfiltered scene.

Comment Re:why not apple? (Score 1) 225

Or, at the very least, sue Google for something that actually makes sense, such as allowing Google Drive accounts to be accessed by hackers as part of this attack. Dropbox, Google, Apple, Microsoft, and others were all compromised during these attacks.

Unfortunately for somebody contemplating such an action, AIUI these attacks were based either on guessing weak passwords, or using passwords that were leaked in hacks on other sites and were used on multiple sites. As all of these companies have a requirement to keep your password secure as part of their TOS, they can't be held responsible as the clients are in breach of contract.

Comment Re:Possible? (Score 1) 225

It doesn't matter because "nude" is not porn. Porn is sometimes defined inexactly by that "you know it when you see it" trope, but usually it entails being created for prurient interest - and nude selfies don't count as porn.

Really? Do you have any kind of reference to back that assertion up, or are you just making this shit up as you go along? Why is a "selfie" classified any differently to, say, a photo taken to be included in an adult magazine, e.g. Playboy, which I think most people would classify as "soft porn"?

I'll completely agree that nude and porn are not equivalent, but there's a significant overlap, and at least some photos of the type we're talking about is included in that.

Comment Re:Makes Sense (Score 1) 225

The flip side is the rights of say Blogger users. If I post photo X as a blogger user, it should be up to me to decide if I want to take it down or not, not Google (except maybe in extreme cases, of which this doesn't seem to fall into).

The Blogger user (poster) should be the legal entity responsible for a given blog's content, not Google. Sue the Blogger user if you don't like their content, not Google.

Unfortunately, the DMCA only extends immunity from such actions to Google if they take the content down on receipt of a properly formatted request. That is, legally speaking, an ISP is only considered a common carrier as long as nobody has asked for it not to be. The Internet needs stronger protections of hosting providers, but unfortunately the IP industry has too much lobbying power to let that happen.

Comment Re:#1 Source of Environmental Mercury = Gold Minin (Score 1) 173

#2, Silver Mining. It turns out mountains don't come labelled as "gold" and "silver-only". As world affluence increases, demand for gold and silver increases.

Don't worry. It turns out that the cost of mercury is rising much faster than the cost of gold. Another decade or so of this, and it will be more economical for the gold miners just to sell their mercury stocks straight back to us.

Comment Re:Broken light bulbs. (Score 1) 173

All the symptoms mentioned by the parent poster are recognized for acute inhalation exposure to Mercury, but I'm running into paywalls trying to find out just how rapid their onset can be.

At a concentration level similar to the ones you're likely to see in the few moments after breaking a lightbulb, symptoms of acute mercury inhalation exposure require "a few hours" of exposure to develop. The patients in this review each absorbed a dose similar to the complete mercury contents of a typical CFL; it seems unlikely that an accident of the type described would result in more than a few percent of this amount of absorption, as the instinctive response to the bulb breaking - closing your eyes and exhaling - will prevent most of the contaminants entering your system. Also, unless the lamp was turned on at the time it broke, it is unlikely that more than a small percentage of the mercury was in vapour form.

Comment Re: Broken light bulbs. (Score 1) 173

Fortunately, I still have a "backup" mercury thermometer that's close to 40 years old - but I've wondered where to buy a backup for the backup should it meet an untimely demise.

You should consider replacing it with a readily-available spirit thermometer, e.g. this one. Spirit thermometers have a smaller temperature range that they can measure than mercury thermometers, but are often more accurate over that range, and if you just want one for medical purposes, you're not interested in any temperatures outside a very narrow range anyway. Plus, when that untimely demise eventually happens, it won't create a health hazard that requires careful cleanup.

Comment Re:"Death to Gamers and Long Live Videogames" (Score 1) 1134

You mean like all the great references from the article? Hey let's ask the people that are trying to downplay this situation what their take on the whole thing is?

But here you go: reference. He didn't review it. He just gave it title spot and listed it as a stand out.

I found this by actually following one of the references from the article.

What I found out by following those references: she started sleeping with him in May. This article was published in January. To quote Gjoni's account:

To be clear, if there was any conflict of interest between Zoe and Nathan regarding coverage of Depression Quest prior to April, I have no reason to believe that it was sexual in nature.


It is therefore irrelevant.

Comment Re:"Death to Gamers and Long Live Videogames" (Score 1) 1134

That was written by one of the people she slept with. The one that the article said claimed never wrote a favourable review of her game.

Personally I would count "There are thousands of these games and this one stands out the most" to be a pretty favourable review.

Yes, but according to the account written by her ex, it was written 4 months before she started sleeping with the reviewer. It's hard to see how, given this information, it is even slightly relevant.

Comment Re:"Death to Gamers and Long Live Videogames" (Score 1) 1134

1. GGGGP was talking about Quinn, which is not what this image is about.
2. The analysis here is in any case somewhat dubious, as the supposed problems noted can be explained quite simply. Really, an average of 26 seconds per tweet to write correctly spelled and punctuated messages is not even slightly difficult, so I don't suspect advance scripting was necessary. The speed of reaction to get the screen shot can be explained by the capturer noticing the first few tweets, then opening the sender's timeline to take the screenshot, during which time additional tweets will have been sent. If the early tweets were noticed on a mobile device and the capturer then moved to a PC to perform the screen cap this also explains the lack of search terms and the fact that they are not logged in.

Slashdot Top Deals

Between infinite and short there is a big difference. -- G.H. Gonnet