Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:One Problem... (Score 1) 320

In Opera's implementation, the author does not specify the size of the output medium or where page breaks go. The browser will automatically lay out the content it finds room for given the constraints of the device. If there isn't room for all the content, new pages will be created. These can be accessed with PgDn/PgUp, gestures, or by controls added through JavaScript.

Comment Re:jQuery Mobile (Score 1) 320

True, is possible to split content into pages by way of JS. And JS libraries mean that not everyone have to write that code. But I challenge you to write a script that emulates the kind of layouts we are seeing here: http://people.opera.com/howcome/2011/gcpm/ss Each row is a series of pages from the same article.
Perl

Journal Journal: I love perl

I love being able to write something like this:

Comment You don't know how your walls can be breached (Score 4, Insightful) 352

The nature of computer system penetration (hacking) is that it takes a great deal of time and patience. The attacker will put a lot of effort into learning everything they can about the system and then more time in probing possible vulnerabilities.

Linux and Unix systems in general have a better underlying security model than Windows (e.g., the way root/administrator vs. user is handled). Unix architectures also had years of students attacking them (back before this was a serious crime). However, if those of us who are Linux fans are honest we know that the reason we don't have to worry as much about Linux attacks is that hackers target Windows because it is more pervasive.

The Greenhills operating system has never been exposed to a large group of people who are willing to spend a lot of time penetrating it. The idea that you can just label a system as secure seems questionable. You always get attacked via means that you didn't expect. What they're really saying is that the system implements a security model that they believe to be secure. But B1 bombers are not placed on the Internet protecting large amounts of money, so they are unlikely to attract hackers.

Microsoft

Submission + - IE8 breaks web standards promise

An anonymous reader writes: An article in The Register tells the story of how Microsoft's interoperability promise for IE8 was broken in less than six months. In March, Microsoft announced that their upcoming Internet Explorer 8 would: use its most standards compliant mode, IE8 Standards, as the default. Note the last word: default. Microsoft argued that, in light of their newly published interoperability principles, it was the right thing to do. This declaration heralded an about-face and was widely praised by the web standards community; people were stunned and delighted by Microsoft's promise. This week, the promise was broken.
Programming

Journal Journal: I hate programmers sometimes.

Actual code from my company's codebase:

$playlist{$key}[4] = $line[4];
$playlist{$key}[5] = $line[5];
$playlist{$key}[6] = $line[6];
$playlist{$key}[7] = $line[7];
$playlist{$key}[8] = $line[8];
$playlist{$key}[9] = $line[9];
$playlist{$key}[10] = $line[10];
$playlist{$key}[11] = $line[11];
Programming

Journal Journal: Using XML

At a couple of my old positions, various people of varying levels of education always kept coming up with the hare-brained idea of making XML the defacto format for anything, from internal data files to configuration files. Granted, there is an advantage to this--there are XML parsers either built-in or readily available to just about every programming language in common use nowadays. Not that said people ever thought about using those parsers--they were just on the whole XML bandwagon from

Classic Star Wars Trilogy Finally on DVD 673

chinton writes "From starwars.com: 'In response to overwhelming demand, Lucasfilm Ltd. and Twentieth Century Fox Home Entertainment will release attractively priced individual two-disc releases of Star Wars, The Empire Strikes Back and Return of the Jedi. Each release includes the 2004 digitally remastered version of the movie, as well as the original theatrical edition of the film. That means you'll be able to enjoy Star Wars as it first appeared in 1977, Empire in 1980, and Jedi in 1983.'"

Sci-Fi Weapons to Join US Arsenal? 601

marct22 writes to tell us CNet is reporting that the next weapons coming out of the US arsenal could be stepping right off the pages of science fiction to be there. From the article: "By the end of this year, the Air Force plans to conduct a first, fully loaded test flight of its Airborne Laser, a jumbo jet packed with gear designed to shoot down enemy missiles half a world away, at the speed of light. The ABL also packs a megawatt-class punch--it's not exactly your garden-variety laser pointer."
User Journal

Journal Journal: Sveasoft illegally uses OpenWRT 2

Ok I admit it, I have been lazy recently. Not much had happened in the WRT scene in a while.
OpenWRT now has a great Web-Interface, DD-WRT got better on a daily basis while Sveasofts lost all its developers except James and the quality of their firmware releases declined even more.

Comment Re:TiVo (Score 1) 844

I'm not saying downloading Rome is right, just that HBO might more effectively spend their money finding a way to make the show available at a price and via a medium that the current pirates would buy.

HBO shows available at a price and medium that many current pirates would buy.

But you make a good point. I do ultimately see many content providers using alternate avenues of getting to content (see "Everybody Hates Chris" on Google video, for example). There's a lot of pitfalls, however--in addition to the overhead of setting up the machines to serve files, payment systems, and websites, you also have to make sure that people don't share the downloaded file that they've purchased, etc.
User Journal

Journal Journal: Synching time with Windows XP

Apparently everything written about Windows 2000 doesn't apply to Windows XP when it comes to synchronizing time with NTP. "net time /set" does not work, even after the appropriate "net time /setsntp:server" command. Windows XP requires the following:

C:\>w32tm /resync

Slashdot Top Deals

"Most of us, when all is said and done, like what we like and make up reasons for it afterwards." -- Soren F. Petersen

Working...