Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re: Nice work if you can get it (Score 1) 132

Considerations which too many ignore mostly involve representations across different media

  - does it scale well? What does it look like when 20' tall banner at a conference? What does it look like in a favicon?
  - what does it look like when cropped? What about when repeated? Repeated with an offset? In general: if this is used as a background during a presentation, is it going to look okay?
  - what does it look like in grayscale? Black& white? How will it look when printed out faxed
  - does it translate well into being a 3d object?

These are the only logo considerations i tend to care about

Comment Re: Claiming to achieve something... (Score 1) 35

Alternate theory: every time someone claims. Quantum Supremacy, it will be disproven via increasingly complex simulations of quantum computers. This will be an arms race until it is ultimately proven that P=NP, and that quantum computers are just really good at feeding in the large number of hidden variables required for the conversion.

Quantum reality: real

Superposition: almost certainly a misunderstanding

The math that currently drives quantum the theory: very real and very important and very good at predicting final states, but not "actual" descriptions of reality

Just a prediction, backed up by nothing.

Comment Re:Hello citizen comrade (Score 1) 132

Some people just can't understand that what we know changes over time. At some point there was a first confirmed case of human to human transmissions. Were those statements before or after that time? China made mistakes, were those the WHO's fault? The first case outside China was on the same day those statements were made, do you know if that was from human to human transmission?

Comment Re:Didn't measure/compare against abuse rate for M (Score 1) 483

It's machine learning. So the researches trained the AI with what they think is "abusive" or "problematic". What would be really useful is to see one of the twitter feeds with the tweets they deem as problematic or abusive flagged as such. Or just click a button and take us to a random one of the million abusive or problematic tweets so we could see what they're talking about. What I saw looking through those pages were just two sample images with a lot of content blocked out. Show us the data, machine learning doesn't mean squat unless you know exactly how they were trained.

Comment Re:Why Windows hides file extensions (Score 1) 173

These days, by default, Windows hides "system" directories and anything else that an uninformed user shouldn't touch.

This is the actual reason. Perhaps this was your point, but I don't think you specifically mentioned it: changing the extension "breaks the file", by making its type no-longer known. There is no valid reason for a non-technical user to want to do this, so it is not a good idea to let users change it "by accident". Ever field a tech support call before "hiding extensions" was the norm? 90% of them were "my file is corrupt" because somebody renamed "Unitled3.doc" to "Report", and had absolutely no idea how to handle it / what was going on.

Comment Re:Port to iOS please (Score 1) 173

All it has ever done is make misdirection work by allowing malicious actors to hide the extension.

The extension is *definitely* not the problem there.

Having the exact same action ("double click") perform two entirely distinct functions:

  1. View a file
  2. Execute a program with all of the permissions of the current user

is the issue. In what universe is *that* a good idea?

Comment Re: DRM rename (Score 1) 61

That does nothing to help the problem. It isn't "management", either. It's just broken software.

True DRM, ie: something which actually tries to keep track of what I have the right to use, do, and consume, based on the often fickle nuances of intentional IP law, I would pay money for

Slashdot Top Deals

Nothing succeeds like success. -- Alexandre Dumas

Working...