Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Risk Compensation (Score 1) 198

Risk compensation is a theory which suggests that people typically adjust their behavior in response to the perceived level of risk, becoming more careful where they sense greater risk and less careful if they feel more protected. Although usually small in comparison to the fundamental benefits of safety interventions, it may result in a lower net benefit than expected.[n 1]

By way of example, it has been observed that motorists drove faster when wearing seatbelts and closer to the vehicle in front when the vehicles were fitted with anti-lock brakes.

Comment Chain of custody? Forensics? Anyone? (Score 4, Insightful) 742

E-mails are just text files, and can be easily forged. Anyone who's ever gotten a spam message from themselves should realize this.

Collecting forensics evidence from a hard drive so that it's admissible in courts is not the same as just dumping files. Last I knew, you have to preserve the data in the original format, and provide access to the defense.

Unless these E-mails are signed by a private key known to be Clinton's, I don't really see how they're going to be admissible.

Comment Re:the issue? (Score 1) 335

They're consumers of the public road system, and consumers of the local legislative process, which is what Uber and Lyft were trying to hijack.

I might not have opposed Prop 1 if it had just been about background checks. I wouldn't use Uber or Lyft, because of that issue, but if you want to get drunk and then ride home with a felon, who am I to stop you?

I ended up opposing Uber and Lyft due to the the provision allowing them to block traffic.

Comment Can't have your cake and eat it, too. (Score 4, Insightful) 234

You cannot simultaneously keep something secret and share it.

This question really doesn't make sense... How do you have a highly-valuable source code repository and simultaneously require external developers to modify/maintain it? How was the code developed initially? Did you have contractors develop it initially, and then have some kind of falling out? Did you have a mass walkout of your staff?

Comment Re:But.. that's exactly what they SAID it does. (Score 1) 227

Like I said, optimized for T-Mobile, not optimized for the customer.

Assuming best intentions, they're mistakenly assuming that every mobile-data video stream is being watched on a small cell phone screen. Meanwhile, users may be tethering to their phone and watching on/downloading to a laptop.

Assuming greedy/selfish intentions, they're trying to degrade the performance so that folks won't watch high quality video over mobile data.

Slashdot Top Deals

No amount of genius can overcome a preoccupation with detail.