Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:adria richards (Score 3, Insightful) 126

Yeah, the interview doesn't exactly paint her in any better of a light than people already hold her in. In her own words she basically states she's racist and sexist with a possible religious bias:

“Not too bad,” she said. She thought more and shook her head decisively. “He’s a white male. I’m a black Jewish female. He was saying things that could be inferred as offensive to me, sitting in front of him.

(emphasis mine). The way that's phrased, to me, states that she was not offended, but chose to manufacture offense via the photo & tweets, and that resulted in real world damage to peoples lives. Not just to the two men, but their families, as well.

While I do think that a lot of the stuff that was done and said to her after this incident are despicable, it doesn't make her any less of a hurtful, spiteful, vindictive, hypocritical, hateful excuse of a human being. Additionally, her comment about Downs Syndrome is just...disturbing.

Comment Re:Since when is AMT controversial? (Score 1) 179

Not to be pedantic or argumentative, but how are you sure your open hardware design isn't manipulated or back-door'd after you hand it over to a 3rd party for manufacturing? There is no single person in the world that build a useful general purpose (in today's standards) computer from hardware to software, guaranteeing that no one else has had an opportunity along the way to manipulate it in some fashion. At some point, you have to start trusting people/organizations/companies. The fewer involved, the greater level of trust you can reasonably assume. We've already seen how the "many eyes" postulation may be flawed (see: openssl). I chalk that up more to human nature: everyone assumes everyone else is looking, so until you personally have a problem, you don't look, you just assume & trust. I know I do this; I only read others' code when I'm bored or have to. Once I'm sufficiently bored by reading others' code that I'm not paid to read, I get back to my regular job.

Comment Re:Nobody read the law, huh? (Score 1) 323

Fair enough, I did read it several times, but managed to miss, each time, the "and require" part under Section 15. I'd suggest that it wouldn't withstand a challenge under the 4th or 5th Amendments, but seeing as how the SCOTUS has previously ruled the 1st Amendment doesn't (always) apply during public school, I'm not sure how well that would fare.

Comment Re:Nobody read the law, huh? (Score 1) 323

I don't follow your interpretation of the law you linked to.

Section 10. Prohibited inquiry. (a) It is unlawful for a post-secondary school to request or require a student or his or her parent or guardian to provide a password or other related account information in order to gain access to the student's account or profile on a social networking website or to demand access in any manner to a student's account or profile on a social networking website.

That seem's pretty straight forward: it is unlawful to request or require dissemination of a password.

What I suspect you object to is this:

(2) monitor usage of the post-secondary school's electronic equipment and the post-secondary school's electronic mail without requesting or requiring a student to provide a password or other related account information in order to gain access to the student's account or profile on a social networking website.

What I read this to mean (and I'm not a lawyer, of course), is without approval or consent, they may monitor school-provided equipment and provided email. i.e., if you utilize your school's email service, they may read that at will, without your consent. Note the possessive in "post-secondary school's electronic mail". This seems pretty plain to me they are not allowed to monitor, say your gmail access (unless they have a man-in-the-middle setup and you access it utilizing the school's network, read: electronic equipment).

Comment Re:Nobody read the law, huh? (Score 1) 323

As an Illinois resident, I read through it several times, just on the chance I missed something. Like you, I see no where that anyone, either the victim or the accused are being compelled to provide even so much as a screen name, let alone full on credentials for any sort of account. Another misleading click-bait headline just to rile everyone up.

Comment Re:Slashdot stance on #gamergate (Score 3, Funny) 693

I think "Crash Override" is an extremely poor choice of names. I mean, who in the community doesn't know 1995's "Hackers"? Johnny Lee Miller's character had a handle "Crash Override". He spent the entire movie trying to get into Angelina Jolie's character's pants (and succeeded), and he (the actor) married Jolie in real life, if only for a few years. If you want to talk "messages", what does choosing such a moniker for this movement represent? At its best, willful ignorance (which I doubt) or an alternate purpose, which then begs the question of for what? I'm not going to go so far to say Quinn is either stupid or ignorant, so that again beg's the question: why "Crash Override"?

Comment Re:Problems in C++ (Score 4, Informative) 386

Dude, don't use square brackets with STL arrays and vectors, just to make your code more readable. The [] operator skips bounds checking, which is the main reason for using these classes in the first place. At() is the proper methodology to use in pretty much every case, unless you are so confident in your bounds that its worth the trivial speed increase in access time.

This is usually just plain wrong. I have extremely seldom ever seen "at" used in production code. Why? Because it's usually duplicating a bounds check you've already done. If you're going to naively randomly access a location into a vector without checking if it's within bounds, sure, but that's kind of a nasty smell (also, are you handling the exception that may/will occur?). Most vector accesses occur something like looping from 0 until (but not including size), or using begin/end (either the free functions or the members). At best, the optimizer might be able to deduce you're never modifying the size of the vector during a loop and elide the repeated bounds check. At worst, you're evaluating "if ((_M_end - _M_start) <= i) throw std::out_of_range();" on every iteration.

Regarding point #4, forward declarations aren't to save compilation time or declare linkage. Yes, they can be used to do both, but the prime function is to, well, declare a name and just enough information to be somewhat useful before it is used (i.e. reduce very simple otherwise circular-references). I can forward-declare 'struct A', but I cannot instantiate/allocate it until it is defined (need to know the size, layout, etc.). You can declare a pointer to 'struct A', because well, you know the size of the pointer. Same reason you can't define "struct A { struct A a; };", but you can define "struct A {struct A* p_a; };".

Regarding "#ifdefs", yeah, there shouldn't really be a need for them in this day and age, but they won't go away due to legacy code. If you removed them, you'd break every single codebase in the world. Not going to happen. Additionally, due to the historical lack of variadic macros, there are numerous libraries that rely upon multiple inclusion of the same header to fake variadic macros. If you assumed a "#pragma once", you'd break various Boost libraries as well as even some STL implementations. Headers guarded with ifdef's can only safely be precompiled and reused if any and all preprocessor defines referenced are identical across all usages and inclusion order of every & all predecessor headers is exactly the same for all usages, otherwise you very well may violate the one-definition-rule.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...