Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Oh please. (Score 1) 296

Why would a pedophile want to do that when they can search the database where it is?

I'm pretty sure that this works the same as the corollary to Goodwin's law. When you bring up pedophiles or child molesters in an online discussion, you're an idiot, you've killed the thread, and your side loses the argument.

Comment Re:Can YOU imagine 3.8 billion years, though? (Score 1) 604

You're right. Humans can't grasp large numbers by simple intuition. Thing is, reality involves large numbers. That's why we've developed mathematical tools to deal with them over the thousands of years of human civilization. People who refuse to learn to use mathematics to understand the world deserve no more sympathy than people who refuse to learn to use hammers and complain that they have trouble pounding nails with their fists.

Networking

Time Warner Shutting Off Austin Accounts For Heavy Usage 591

mariushm writes "After deciding to shelve metered broadband plans, it looks like Time Warner is cutting off, with no warning, the accounts of customers whom they deem to have used too much bandwidth. 'Austin Stop The Cap reader Ryan Howard reports that his Road Runner service was cut off yesterday without warning. According to Ryan, it took four calls to technical support, two visits to the cable store to try two new cable modems (all to no avail), before someone at Time Warner finally told him to call the company's "Security and Abuse" center. "I called the number and had to leave a voice mail, and about an hour later a Time Warner technician called me back and lectured me for using 44 gigabytes in one week," Howard wrote. Howard was then "educated" about his usage. "According to her, that is more than most people use in a year," Howard said.'"

Comment Re:How hard can it be to get this right? (Score 2, Insightful) 114

It sure seems like an easy problem, doesn't it.

As a programming problem, it seems like an easy problem because it is. Thing is - it's not a programming problem. It's a security problem. As a security problem, the programmer is the most significant potential attacker. Does it still seem easy?

Comment Re:What was the margin of victory? (Score 1) 114

If the margin of victory was greater then 2 percent, then it should be non-issue as far as who is in office. But it should be fixed for the next election.

Unless you're actually serious about the importance of voting, in which case the response here is very simple: Throw out the invalid votes (all of them) and re-run the election.

Comment Re:Banking doesn't usually require anonymity (Score 1) 114

"Verifiable" means you don't have to trust the implementation.

But that raises the next question: Verifiable by who?

Saying that there are some experts who can verify the proper execution of an election simply isn't good enough, at least not if you want to call that election "democratic". With paper ballots marked with pens and placed in a ballot box, any voter of normal intelligence can observe an election, understand the security properties needed at each step, and see for themselves if those security properties are maintained. Any alternate system must maintain this property.

Comment Re:10 Years, not Infinity+ years (Score 1) 597

The practice of expecting that a person's possessions go to their family and/or friends when they die is older than human civilization. It's what will happen by default unless society interferes and confiscates things. In contrast, with copyright it's every single other person in society who's being imposed on and having their ability to use their possessions constrained.

Slashdot Top Deals

"Gotcha, you snot-necked weenies!" -- Post Bros. Comics

Working...