Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Even if you force me, I won't Bing anything. (Score 2) 361

An extra 6 seconds or so is time well spent given that it would take me longer than that to fish through the feces that are Bing's search results. I'm gaining time. It's efficiency rather than irrationalism. Getting a false lead can suck down a solid minute. I am at a loss as to how anybody could think those 6 seconds are poorly spent.

Comment Re:Holds pinky to mouth (Score 2) 88

So long as you wouldn't be bailing me out if I were millions of dollars in debt from my collapsing single-truck-empire, then yes that shouldn't be there. But, the damages could certainly be the value of the truck plus the money you might have made if you had the truck, plus interest, minus the value of the now returned truck.

Comment Re:Spin much (Score 2) 88

Microsoft got sued on the trademark. They called their VM Java, and they were actually pretty crappy at it.


They had a point, people were hating Java at that time because Microsoft was saying they had a proper implementation and it was buggy crap, making people think that Java was buggy crap. That's a pretty solid lawsuit. They are using our trademark and making us look bad.

Comment No Google will Win. (Score 1) 88

No. From a legal standpoint Java was released at one point on a free license. So Google has every right to the language. They rewrote the libraries as such (there are notable differences and improvements in Android's). Java was released under an open license at one point. So they totally can use the language as it appeared at that point. Also Java is just gets converted over to Dalvik bytecode and then compiled on ART in modern Android or runs on the Dalvik VM in the earlier versions.

They are *only* using the language itself (and there's some rumor about adopting Swift as a first order language as it was equally opened under an open license).

Make no mistake, Oracle should lose. They don't have to change a thing.

Comment Roadside phone cracking is unneeded, car's totaled (Score 1, Interesting) 188

You have the time to go to the judge and get a warrant per the law. If you want to hook some hacking device up to my phone to figure out if I was texting somehow without accessing my private data, I'm going to need the source code to verify that my rights weren't violated. Also, violations of the DMCA apply to me hacking my own phone, not the cops using a device to hack my phone.

Comment You might want to hire fake trick-or-treaters. (Score 1) 151

There's a pretty bunch of social engineering involved with trick or treaters and one is they go where they go. So the places they go and the people who go there basically is the result of a chaotic process. If you want to prime the pump you need to not only have the houses done up, but on the day get people based on there being people. It's like seeding your case with money while busking or having extra produce while selling produce for the illusion of choice. It's not simply get decorations get destinations, it's actually kind of hard, people tend to go out of their neighborhood to get to the apt places and as such they often go to the same place year after year, so if you got nobody this year, you can't turn it around in a single year. Getting everybody on board isn't enough, you also need to be seen as a place to trick or treat, which means you need people there to get people there.

You might want to give up.

Comment Pfft. This all misses the point. (Score 3, Interesting) 62

If you actually care about security maybe you shouldn't let information from the internet control your computer. I mean sure they can edit your webpages via a router to insert whatever, but the inserting whatever part is could just also be malware on the internet proper.

The point of TNO is that you might as well assume your router is altering webpages and inserting malicious content (either that or there's some already on the internet). One should view the internet as a black box of security threats and then just go from there. Yeah, routers can do that stuff. Security is what you do with that understanding. You don't get a router you can trust. You don't trust the router or the rest of the internet.

Comment These stories suck they need to fit the format.... (Score 1) 38

Machine Learning System can detect X with such high accuracy and with so few false positives as to be actually useful.

Frankly detecting X is basically defined as getting better than random chance. If you decide that anybody who posts "I am so sad" is suicidal, you'll bound to get a few hits, so there. I developed an algorithm that can detect suicide and depression. The problem here is that it's useless unless it's really really accurate.

Slashdot Top Deals

Prototype designs always work. -- Don Vonada