Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Voting on amendment to defund the NSA (Score 1) 276

Looking at Nugent's proposal:

At the end of the bill (before the short title), add the
SEC. ll. None of funds made available by this Act
may be used by the National Security Agency to--

            (1) conduct an acquisition pursuant to section
  702 of the Foreign Intelligence Surveillance Act of
  1978 for the purpose of targeting a United States
  person; or

            (2) acquire, monitor, or store the contents (as
  such term is defined in section 2510(8) of title 18,
  United States Code) of any electronic communication
  of a United States person from a provider of
  electronic communication services to the public pursuant
  to section 501 of the Foreign Intelligence Surveillance Act of 1978.

Would someone mind explaining where the hole is?
Oh. Nevermind, it's "(8) âoecontentsâ, when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication;"
In other words, the subject line in an email is part of the contents-but not the fact that you emailed or called So-and-So.

Comment Re:Umm... WHAT is this? (Score 3, Informative) 33

I mean... I get that its some type of "CPU card"... or something, and built on the PCMCIA form factor... but ...WHAT is this for? is it a prototyping board, is it meant to micro server clusterable, is it meant for home media pc?

It's the main guts of a computer, stuck in something the size of a PCMCIA card, and you can stick that in whatever hardware project you want.
Prototyping board is one (probably the most obvious) potential use.
But that's partly because it's useable for so many uses.

Comment Re:Linus management technique works (Score 1) 1501

Completely toxic?
No. Every time that I've seen something about Torvalds swearing at someone, it was someone who
(1) Broke something
(2) Had the breakage pointed out (not always by Linus)
(3) Still insisted that their broken change was the right thing.

If there isn't someone answering those who actively defend garbage, how do you expect to avoid the end result being garbage?

Comment Re:Oh grow up (Score 1) 569

Having just completed my research class a few months ago, I happen to still remember what a median is. You found the right definition, but somehow you still managed to botch it up-it means exactly what you're saying it doesn't.

The "higher half" and "lower half" are the higher and lower halves of the data. In other words, take the middle value in a sorted list.
Half of the values are above, half are below. There's your median.
In your list, that's 4.5 (the average of the 4 that takes 8th, and the 5 that's in 9th of 16 values).

Comment Re:Man the FL state attornies just want to fuck up (Score 1) 569

Despite agreeing with you, I have to respond to one point:
Zimmerman's defense cannot stand on what he did not know or have reason to believe.
His own behavior may be informative as to whether his own claims are believable.

But I'll agree that it seemed more like a kangaroo court that the media and politicians tried to ram through.

Comment Re:Yawn, another fork (Score 1) 219

Picture this:
You throw a Python script that uses BDB on your server, which happens to use a source-based distro.
You update BDB, and this requires a small patch.

Now, you are obligated to distribute source to BDB and Python.
No, I'm not kidding: that's how I read the AGPL.

A secondary benefit of defending all users' freedom is that improvements made in alternate versions of the program, if they receive widespread use, become available for other developers to incorporate. Many developers of free software are heartened and encouraged by the resulting cooperation. However, in the case of software used on network servers, this result may fail to come about. The GNU General Public License permits making a modified version and letting the public access it on a server without ever releasing its source code to the public.

The GNU Affero General Public License is designed specifically to ensure that, in such cases, the modified source code becomes available to the community. It requires the operator of a network server to provide the source code of the modified version running there to the users of that server. Therefore, public use of a modified version, on a publicly accessible server, gives the public access to the source code of the modified version.

Comment Re:already done by someone else better (Score 1) 40

From the fine article:

The micromachines don't cost much to make, Bishop says. The scientists order the polysilicon plates from a commercial foundry at low cost and then use a focused ion beam to pierce the nanosized holes in the plates. The micromachines are so cheap, Bishop says, that the team can experiment with one, throw it out, and "go get another clean one--for a dollar or two."

Also news is that it can draw shapes with holes.

Slashdot Top Deals

Just go with the flow control, roll with the crunches, and, when you get a prompt, type like hell.