Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Wrong audience (Score 5, Funny) 407

Slashdot is a great engineering community; what other insights do you have on the bridge situation?

No, Slashdot is mostly made up of computer janitors; the greatest insight you'll get out of most of the posters here is, "hurrr durr, the bridge must've been running Windoze! LOL!", with maybe a little "omg the twin towers were collapsed by EXPLOSIVES!!!!"-style conspiracy theory and "THE GOVERNMENT IS BAD!!!" braindead libertarianism thrown in for color.

Comment Re:Dumb. (Score 1) 513

who mails cheques these days, cheques died out ten years ago

Clearly, you've not been to the United States in the past ten years. We still make almost all of our non-retail payments with checks here in the financial Third World. My company, for example, still issues checks for expense reimbursement.

Comment Re:It will be a very difficult project (Score 1) 154

All of those can be accomplished in Fortran 90/95. There is even direct language support for the third requirement (private members of derived types), and I do it all the time; it works just like other public/private declarations, just placed inside the type definition. Inheritance and polymorphism (I'm guessing this is what dynamic binding means from a quick look at Wikipedia) are a bit trickier, but the techniques have been worked out and documented by these fellows (Viktor Decyk's page is also quite helpful). If you prefer to avoid typing out a certain necessary amount of boilerplate to do this, you could use Drew McCormack's forpedo preprocessor (described in detail on MacResearch). So, it's not necessary to wait for 2003, and in fact, many people haven't but have managed to write and maintain very large codes in Fortran 90/95. Good luck!
Security

Submission + - Why do people jump to conclusions?

the_B0fh writes: "http://www.kuro5hin.org/story/2007/8/2/15233/84896 claims that Theo accepted lots of $$ from AMD to say bad things about Intel. Theo denies that AMD has given him money. History tells us that Theo has never been reticent about speaking out, even if it hurts his funding (re: Darpa's $2mil grant). So, what is the kuro5hin author basing his opinions on? And why is there a Microsoft link in that page? In the comments section, someone mentioned Matt Dillon's analysis which seems to be in agreement with Theo's analysis. In fact, the only statements I've seen from Linus is only about one of the erratas, and not the others (especially nice things such as second core not obeying the NX bit and so on). Do people just not read and analyze what others say, and blindly accept opinions? Ah, nevermind."
Space

Submission + - Private Funds For Time Travel (nwsource.com)

WED Fan writes: "A University of Washington researcher who couldn't find funds the old fashioned way, from the Government, has raised funds from private parties to continue with his back in time studies.

He is studying the Einstein-Podolsky-Rosen Paradox. Basically, using spooky action, he wants to be able to use entangled pairs to send messages, not only through space, but also in time.

As the evidence for this has accumulated, several fairly contorted and unsatisfying efforts have been aimed at solving the puzzle. Cramer has proposed an explanation that doesn't violate the speed of light but does kind of mess with the traditional concept of time.


Question: How do you know where to find and "listen" to the right entangled particle to receive a message from the future? Or, in that vast amount of noise, if you don't know someone is sending a message, how do you know its there?"

Security

Submission + - Mac OS Becoming Juicier Target for Virus Writers (foxnews.com)

imamac writes: An article posted at Fox News is broadcasting Mac Security as becoming more like Windows." It notes that exploit code was written very quickly for a set of updates released on May 24. "It is very Microsoft. It's something we've grown to expect in Microsoft: The descriptions of patches lead people to write exploits for something that's been patched." Yet the opening statement says that "compared with Windows, the Macintosh platform is still largely untouched by vulnerability exploits." So which is it?
Censorship

Submission + - Reporter Arrested on Orders of Giuliani Press Sec. (jonesreport.com)

An anonymous reader writes: Freelance reporter Matt Lepacek, reporting for Infowars.com, was arrested for asking a question to one of Giuliani's staff members in a press conference. The press secretary identified the New York based reporter as having previously asked Giuliani about his prior knowledge of WTC building collapses and ordered his arrest on the grounds of criminal trespass, despite protest of CNN staff. He had a proper press pass.
Portables (Apple)

Submission + - iPhone runs "real" OS X

Sugar Water Salesman writes: Reading through the coverage of Steve Jobs' appearance last week at All Things Digital, I stumbled across something that I haven't seen discussed before. According to Jobs, the iPhone runs a full version of OS X. . From AllThingsD.com:

"Whoa. Jobs says iPhone runs "real OS X, real Safari, real desktop email." Walt follows up: If that's true, could other OS X applications run on the iPhone? Jobs says no. "They're not designed to."

Slashdot Top Deals

Some programming languages manage to absorb change, but withstand progress. -- Epigrams in Programming, ACM SIGPLAN Sept. 1982

Working...