Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re:...what (Score 3, Informative) 39

Approving mergers generally falls under the purview of the FTC (see merger review).

The only reason the FCC came up is due to the fact that the two companies may have had to transfer FCC licenses as part of the deal. Since it appears no transferal is taking place, the FCC is not involved.

Comment Re:Vetting (Score 2) 502

Parallel construction is about providing a different explanation for how you obtained evidence (which could be true or false) to a judge because you do not want to reveal where it really came from, but "alternative facts" are really just lies given a softer name so that maybe people won't realize they're lies (or accept them anyway because it fits their worldview).

Comment Re:No. (Score 1) 435


It limits your options. The company will take your most recent salary and use it to determine the upper and lower bounds to the offers they think you might take.

If they were going to offer much more than your prior salary, you just screwed yourself out of money. If they were going to offer much less, they''ll show you the door without bothering to find out if you would have accepted anyways (due to other factors like benefits, perks, etc.).

Comment Re:Will it be "Social Justice" content? (Score 2) 86

We've seen long-established characters changed to a different race or gender or sexual preference or some other trait just to make the content more "inclusive", even if it makes no sense within story lines or established canon. Or we've seen new characters created with a trait like their gender, race, or sexual preference as their main defining characteristic, solely so focus can be put on it, and the rest of the character pretty much ignored.

To be fair, there's also still a non-trivial amount of white-washing going on, too. The most recent and accessible example for the Slashdot audience would be casting Scarlett Johansson for the Ghost In The Shell movie.

In fact, I am somewhat curious about this list of movies that fit your criteria, as I can easily rattle off several whitewashing examples from recent movies off the top of my head, but I cannot think of that many where the reverse would be true (though there are some).

Comment Re:There is a legitimate dispute (Score 4, Insightful) 534

The true measure of scientific fact is how well it survives the opposition trying to disprove it. Given that the opposition to climate change has given up on producing data disproving that the Earth is getting warmer on aggregate and instead resorted to attacking it politically, I would say it's doing pretty well as scientific theories go.

Comment Re:Good faith purchaser (Score 1) 63

They could make a good-faith effort to find the owner, or they could auction it and pad yearly revenue. The choice is obvious.

The real problem here, like with civil forfeiture, is that the police entity that seized the property gets to keep the proceeds. It is in its best interest to sell a seized object as quickly as it can legally do so without finding and notifying the rightful owner.

Comment Re:What's the rush? (Score 1) 216

You might not care if your amazon purchase of a t-shirt is anonymous, but it might matter for other things (e.g., a donation to an activist organization like the NRA or Planned Parenthood). Once you have tied identifying information to your wallet ID once, you have to assume that association has been shared with everyone.

Contrast that with cash. I can buy groceries with a few $20 bills in my wallet and a saver card that has my name and address and not worry that the other $20 bills in my pocket will carry that same identification information elsewhere.

Comment Re:Encrypt! (Score 1) 394

The implication is that an actor with ill-intent (like the NSA) obtains the CA's private key and uses it to generate certificates of their own for MITM attacks. Any browser that trusts the CA will automatically trust the new certificates, and the user will be none-the-wiser.

This has already happened several times, resulting in browser vendors pushing out updates that removes compromised CAs from their trusted lists.

Slashdot Top Deals

"If value corrupts then absolute value corrupts absolutely."