Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment you need to do some homework first (Score 1) 151

It is no way certain that there is any GPL violation here. Don't bother until you find one. I mean don't yo feel bad everything you hear about some site getting take down notices for reasons that prove unfounded? I wouldn't want to be like that. So really you need to find evidence in the binary that source code submitted by someone outside of MG and CS was used to build the closed version. If you find that, then you need to contact that person and learn whether or not they have the rights to that (could have been work for hire with a contract or they could have done a transfer of ownership as part of the patch submission process for example) and even if they care at all about it. Why might they not even care? Well MG could just say, "oops, thanks, here we have removed the offending source from our build, here is the new closed version that complies." And really unless you want to be a jerk, that should be good enough. You yourself wrote that you don't want to be that jerk because you do not wish to give ammo to decision makers to avoid going open source or GPL even in the future. So is all the work you and others will need to do worth that potential outcome? That's up to you. Just find an archive of the GPLed version and go from there for the future is what I personally recommend.

Comment Re:32 bit servers in 2011? (Score 1) 125

Though you can then have more than 4GB of RAM in a system and each process has a 32bit VA space. This works for process that do not need to mmap gigantic things, only the OS moves the 'views' around for the processes and you can run more io bound processes without paging.

Comment Re:Pascal v/s C (Score 1) 487

* was used because in the line printers and terminals of the day ^ was not universal. Often it was an up arrow for example instead like on all the hardware that used 6847s for the character generator and then sometimes it just was not there at all. * on the other hand was often there and if not there was a character that was a round or diamond bullet. All the trigraphs stuff in C stems from decisions to limit the cases where they would need to be used because of limited character sets.

Comment Re:FPGA artifacts (Score 1) 226

That author misunderstands FPGAs. I have one here with two 16-bit 8kilasample registers. We're working on adapting it for a larger FPGA since this bitty one is getting hard to buy now. They're not like cpus, no caches and what not.In fact the OPERA team used a heat gun and saw only 2ns over an extreme range of temperatures that would not happen during the experiment.

Comment Re:Protection is already available (Score 1) 309

noscript won't really do it because it's a MITM attack. If you whitelist a site then an attacker can inject an evil jar file (currently js used for this) that steals session cookies. Something that would work would be if the cookie monster extension would be modified such that no cookies would be passed along any connection from an applet, or maybe even better any plugin. Or you could limit it so only certain sites cookies to certain other sites as well? Maybe it already does this?

Slashdot Top Deals

One of the chief duties of the mathematician in acting as an advisor... is to discourage... from expecting too much from mathematics. -- N. Wiener

Working...