Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Content protection isn't going away. (Score 1) 237

The only question remaining is whether protected content will be accessible through a general purpose web browser. If not, subscribers will abandon the browser for the app.

The app that has already been integrated into their smartphone, tablet, HDTV, video game console, set top box, etc.

The streaming music service I use has 30 million tracks to explore. It would be very tempting to settle in there to stay. If you want me to have a look at what can be found elsewhere, don't make it anymore difficult than it needs to be.

Comment Re:Discountined? (Score 1) 61

Privacy concerns helped kill it for one. Because the threat to your privacy isn't the NSA or CCTV cams everywhere or facebook on your phone or the two cameras on it. No no, it's a grainy camera on some tech bro's head evidently.

He's not my tech bro.

The smartphone is visible and there is no mistaking when it is being used as a camera.

The CCTV camera keeping watch over the till is not something I need to worry about. The creep sneaking videos of my girlfriend at the bar is something else again. The geek frets over the anonymous bureaucrat pouring over video footage at the NSA but this strikes close to home.

Comment Re: This is silly (Score 0) 322

So Firefox can write their own sound server to get sound data from each independent content tab, or blow huge holes in the sandboxes for ALSA dmix, or they can just use the sound server that already exists and is used by 98% of Linux desktop users: PulseAudio.

It's strange to think that audio can still be problematic on the Linux desktop over twenty years out from the launch of Win 95.

Comment Pot, Meet Kettle. (Score 0) 542

There are a large number of books that they can use as a base for movies.
The reason is not that they are out of ideas, the reason is that they are lazy and just re-use what did work one more time.

How many fan-made episodes of Star Trek: TOS have been produced in the last 20 years or so?

How many original productions?
How many adaptations of classic sci-fi stories, film or TV that hasn't been touched since the 1950s or even earlier? There is a lot out there, still relevant and entertaining, that could be successfully revived.

The geek doesn't have much cause for complaint if his amateur productions follow the same well-worn path of the big-budget studios.

Comment Marketing 101. (Score 1) 353

In fact, they lost the grip when they first shipped MS-DOS that was a decade behind other operating systems with its single tasking and lack of memory protection and small memory limits

IBM went out shopping for an OS that would run on the more or less affordable commodity x86 PC hardware available in 1980 and provide a natural upgrade path for developers and small business users familiar with CP/M.

Bonus points for being priced at 1/5 the cost of CP/M-86, retail list. The MS-DOS PC was a viable commercial product before the cloning of the IBM PC BIOS.

Comment Local time. (Score 1) 228

Daylight savings time has been opposed by a grassroots group of Montana farmers and ranchers, who have to sync their work schedule to the sun rather than the time on the clock.

Take the argument to its logical conclusion and these farmers should be reverting to the pre-railroad days of setting their clocks based on local solar time. Be sure to re-set your watch every 25 miles or so as you move east or west.

Comment One Size Doesn't Fit All. (Score 1) 383

Example: 3D CAD software that runs on Windows 14, Playstation 7, an Android Smartphone, Nintendo's latest handheld gaming device and an Ubuntu PC in exactly the same way with no compatibility problems whatsoever occurring.

The Playstation sells to console gamers and home theater enthusiasts with a big screen HDTV. Your CAD/CAM program has to be something that market needs and wants and can use effectively.

Comment Re:Security requires personal attention. (Score 1) 216

It all falls apart when they say "Can I buy a disk and install my own software?" and you say "No, but here's an easier way to install software from a vast repository of packages", they're done.

What's in a "package?" Is it ready-to-run? Where do I find clear and detailed product descriptions, reviews and screen shots?

Steam is successful because Valve knows how to sell software on line.

Comment Child Pornography Defined. (Score 1) 118

Define child porn for us.

Fair enough.

Child pornography is a form of child sexual exploitation.

Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old). Images of child pornography are also referred to as child sexual abuse images.

It is important to distinguish child pornography from the more conventional understanding of the term pornography.
Child pornography is a form of child sexual exploitation, and each image graphically memorializes the sexual abuse of that child. Each child involved in the production of an image is a victim of sexual abuse.

While some child sexual abuse images depict children in great distress and the sexual abuse is self-evident, other images may depict children that appear complacent.
In most child pornography cases, the abuse is not a one-time event, but rather ongoing victimization that progresses over months or years. It is common for producers of child pornography to groom victims, or cultivate a relationship with a child and gradually sexualize the contact over time.

Furthermore, victims of child pornography suffer not just from the sexual abuse inflicted upon them to produce child pornography, but also from knowing that their images can be traded and viewed by others worldwide.
Once an image is on the Internet, it is irretrievable and can continue to circulate forever.
The permanent record of a childÂs sexual abuse can alter his or her live forever. Many victims of child pornography suffer from feelings of helplessness, fear, humiliation, and lack of control given that their images are available for others to view in perpetuity.

Unfortunately, emerging trends reveal an increase in the number of images depicting sadistic and violent child sexual abuse, and an increase in the number of images depicting very young children, including toddlers and infants.

Child Pornography

It can be a useful exercise for the geek to have a look at the registry of sex offenders for his state or county. No better way I think to dispel the fantasies he promotes about child pornography.

Comment Division of labor. (Score 1) 557

If the leader of the Munich Green Party is's too bad they don't use all that money for hiring an army of programmers ...

It could just be that the city government feels that its competence lies in providing traditional municipal services like police and fire protection and not in the development of an office suite.

Comment Excuses, excuses. (Score 1) 313

Yeah, it's a little hard to "sell" something for free and compete with the $$ marketing campaigns of major closed-source companies

That doesn't explain why Linux distributions haven't been able to forge successful partnerships with OEMs and retailers which do have brand name recognition and big-budget advertsing campaigns.

Slashdot Top Deals

If God had a beard, he'd be a UNIX programmer.