typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

## Comment Re:"persuadable voters" (Score 1)85

I read the phrase "think that over" as meaning you disagree with the quoted text. However, your link does not contradicting that statement, unless you also believe Clinton employed less rhetoric during the campaign. Wikipedia defines rhetoric as "the art of discourse, wherein a writer or speaker strives to inform, persuade or motivate particular audiences in specific situations". Even if we use the less formal definition ("excessively flowery or emotional, often meaningless, speech") can you truly say Clinton employed fewer such devices?

I find such assertions ridiculous; the politician's primary job is to be persuasive, and the most effective tools to do so are the subtle, often trite, phrases which hook into their audience's existing biases. Someone arguing that a slogan, whether "Stronger Together" or MAGA, is not an attempt to persuade tells me more about their bias than it does the politician using it.

## Comment Re:BS detector went off and is overheating (Score 1)309

My question would be, just how high can you get before you miss a whole number?

Infinity (or whatever arbitrary limit of single-arity operations might be applied). I know it's considered gauche around here to read the source article, much less a video, but it gives the formula and process which allows any integer to be reached.

With "sqrt()" being the square root function:
The log base sqrt(4)/4 of [log base 4 of sqrt(4)] = 1.
The log base sqrt(4)/4 of [log base 4 of sqrt(sqrt(4))] = 2.
The log base sqrt(4)/4 of [log base 4 of sqrt(sqrt(sqrt(4)))] = 3.

The number of times the square root function has been applied in the inner logarithm, is the integer which results from the formula. Therefore, you can create any positive whole number with four fours (and an indefinite number of operations).

## Comment Re:Who wants DVDs? (Score 1)157

> Bluerays are still quality superior to streaming,

What are you talking about? The guy at Best Buy who wanted to sell me a 4k TV, since that's all they had anymore, said "internet streaming" was a good source of 4k video. (I get the feeling they didn't have many "ultra" blue-rays yet...)

I almost laughed at the thought of who could be that selfish with their bandwidth... Then got a little scared inside.

> I was more referring to exporting to the European market and the post-Brexit British market,

Ya, um. Considering both sides of the Atlantic have been ping-ponging the extensions back and forth every 20 or so years to keep Steam Boat Willie in chains. I really don't think that's as big a problem as it sounds assuming we're careful to abide by the letter of the treaties *except* where they are copyright foo-barred.

As to the fifth amendment. We just need to legally establish that copyrighted content is not private property, being a publicly granted government monopoly with limited purposes in the first place. Of course, this is very different than trade secret property or any other private / secret data individuals have right and ownership to. Or, 1) repeal all retroactive term extensions, they were illegal in the first place. 2) Only apply the new "60-year" law (should be 20) only to works created from this day forward. 3) There'll be some middle-works with insanely long term-lengths, oh-well.

## Comment Re:First Step (Score 1)366

That's 1 / 2 the North American problem. The other half is stop using fossil fuel burning vehicles. (bikes, post-grid-update electrics, stay at home, maybe hydrogen)

Of course, my boss claims solar based on mirrors (not the chemically polluting photovoltaics) can displace nuclear in places where hydro isn't feasible. But I say build out the nukes first then worry about something better. We know fossil fuels are going to end us, I'd rather lose a couple cities every 200 years than the entire human race.

## Comment Seriously, security dongles. That's the old new? (Score 1)162

We run general purpose computers. Can't we trust our own operating systems enough to think they might store a couple bits of secretish data? If not, what good is any encryption since the attackers get every session key anyway? (not to mention the keylogger with the raw password and the memory debugger that sees every block encrypted and decrypted)

The only thing a dongle provides is certainty that another computer can't impersonate a fully compromised device without the dongle. Of course, dongle-failure could very well lock you out of your own services. (and with a back-door in place, session hijacking is very possible)

Many sites, like gmail for example, require "registering" each new device via phone IM or pre-shared key. This happens after password success. Secret keys are then created and stored as securely as the device is maintained. Only if the device is deeply compromised will they be stolen.

If we create a landscape where 90% of computers AREN'T compromised thoroughly this really isn't that horrible. Throw in a bit of geo-location and email warnings about every interesting event (password change, new device registration, stale device login, Computer moved to Ukraine) and really things aren't all that bleak especially for services used every day or even once a week.

Then of course, there's cracking down on IP's and ISP's generating compromising packets, but that's a whole other subject.

## Comment Re:Accidental superweapons (Score 1)44

Have their ISP shut down the IP connecting them to the internet. Once the infected broken device is removed, their NATed sub-network can have internet again.

## Comment Re:Dougla's Adams said it best (Score 1)689

Plurality voting with single member districts leads to two party systems. It would require seriously amending the Constitution to change that.

Actually it wouldn't take amending the Constitution [which says nothing about requiring plurality or First-Past-the-Post voting], only changing Federal election laws, in order to completely break the plurality system.

First, there are two states (Maine and Nebraska) where the Electoral College vote can be split; increasing which states with this system would then magnify the value of 3rd-party efforts [as each such state greatly increases the odds of a minor candidate earning the one or two electoral vote(s) which might deadlock the EC, forcing the election to be determined by the House instead]. As seen by the fact this system already exists, this change could be implemented without requiring changes to the Constitution or federal election laws, only state laws.

Secondly, change could be instituted within the House of Representatives by revising the laws on how members are elected: Federal law requires the current separate district methodology but we could move towards a state-level proportional representation system. This would grant easier third-party access to Congress and, while not directly contributing to Presidential aspirations, would elevate the visibility of those platforms and policies. Again, this change would not require a Constitutional amendment, but only altering existing Federal election laws.

Because FPTP/plurality voting sustains the current two-party system even in the face of such hatred the electorate shows for Clinton and Trump, saying these changes do not require amending the Constitution does seem to discount the resistance these changes would face... but I believe the unprecedented hatred for those two candidates and the extreme partisanship on display by their supporters together indicate the importance of making them.

## Comey Denies Clinton Email 'Reddit' Cover-Up (politico.com) 459

An anonymous reader quotes a report from Politico: The FBI concluded that a computer technician working on Clinton's email was not engaged in an illicit cover-up when he asked on the Reddit website for a tool that could delete a "VIP" email address throughout a large file, FBI Director James Comey said Wednesday. Republican lawmakers have suggested that the July 2014 Reddit post from a user believed to be Platte River Networks specialist Paul Combetta showed an effort to hide Clinton's emails from investigators. However, at a House Judiciary Committee hearing Wednesday, Comey said FBI agents concluded that all the computer aide was trying to do was replace Clinton's email address so it wouldn't be revealed to the public. "Our team concluded that what he was trying to do was when they produced emails not have the actual address but have some name or placeholder instead of the actual dot-com address in the 'From:' line," Comey said. Comey said he wasn't sure whether the FBI knew about the Reddit posting when prosecutors granted Combetta immunity to get statements from him about what transpired. However, he added that such a deletion wouldn't automatically be considered an effort to destroy evidence. "Not necessarily ... It would depend what his intention was and why he wanted to do it," the FBI director said.

## Comment Re:Never report security vulnerabilites (Score 1)85

You can't use a system without "testing" it in some way.

Purposely taking control of a computer system above your sanction is breaking the law.

These are OK:
Oops my keyboard slipped and I accidentally typed: John Smith'
Oops my name is: O'Riley

Not OK:
Robert'); DROP TABLE Students; --

## Comment Re:wait, i am sure i am missing something here.. (Score 3, Informative)282

A link isn't "instructions". It's just the address of where to find something.

What you're saying is like prosecuting me for prostitution if I tell you there's a brothel at 411 B street.

## Comment Re:Foretold (Score 5, Insightful)145

In 2086, copyright will be lifetime + 140 years (or 160 years for works for hire). Steamboat Willie can never enter the public domain after all...

# Slashdot Top Deals

"There... I've run rings 'round you logically" -- Monty Python's Flying Circus

Working...