Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Good (Score 1) 246

Heck, they don't even put special characters like [ ] on the keyboard.

It seems pretty obvious you have no idea what you're talking about. This could have been proven wrong in about 20 seconds, had you bothered.

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.amazon.com%2FApple-K...

He is most likely talking about a keyboard with this layout:

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.amazon.com%2FApple-M...

Comment Re:Picking at crumbs? (Score 2) 30

The improvement works recursively. For example, you can multiply a 25x25 matrix by treating it as a 5x5 matrix of 5x5 matrices. So, instead of 96*96 (9216) integer multiplications, you have 95*95 (9025).

The savings compound, so what was a ~1% improvement for 5x5 becomes ~5% for 3125x3125, and so on.

Comment Re:We've achieved linear growth (Score 1) 136

The graph is fooling your eyes; the growth is still exponential. If you hover your mouse over the last few data points in the "Total Coronavirus Cases in the United States" graph, the numbers are (most recent first): 68211, 54856, 43781, 33592, 24192. Subtracting the previous day from each number, the deltas are: 13355, 11075, 10189, 9400.

As you can see from the numbers, new cases are still accelerating. The percent growth over each previous day for the above samples (again, most recent first): 24.3%, 25.3%, 30.3%, 38.9%. Still nowhere near linear.

Comment Re:Doesn't add up... (Score 2) 275

Scroll to the bottom of the article and click "Read the full report here". It's unfortunate that the link to the report is so hard to find - every single one of your questions is answered in the PDF.

This includes their criteria (with examples) for what constitutes misinformation. It also includes their full methodology, rationale and limitations (Annex 1 on page 50), which should address your concerns about which 100 videos they included (and why) out of the 5000, and where those 5000 came from.

Here's a link to the report: https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fdrive.google.com%2Ffile%2F...

Comment Re:Not exactly the phone number (Score 1) 51

It's leaking information that narrows down the phone number to a set of possible phone numbers

That is not how cryptographic hashes work.

Except that it is precisely how cryptographic hashes work. If you don't believe it, I invite you to play a game. Choose a random phone number in the 213 area code, give me the first 6 hex digits of the sha256 hash, and I will reply with a list of around 1-3 possible phone numbers (with a very rare worst case of 8 possibilities.)

Here is an example Linux command line that you can use to get the hash:

$ echo -n +12138675309 | sha256sum | cut -c 1-6
4b7da2

This is an example of a known plaintext attack. Knowing or guessing the area code of a phone number narrows it down to 10,000,000 plaintexts. Compare this to the number of different values for the first three bytes of a hash (16,777,216), and it should become apparent why the attack is possible.

Comment Re:But! (Score 1) 729

I know you were modded Funny, but the Japanese actually use the English loanwords "plus driver" and "minus driver". And in many cases, "plus" may even be more accurate, considering there are several other plus-shaped designs (JIS and PoziDriv for example) that are incompatible with Phillips drivers.

Comment Re:Photog (Score 1) 242

I had to use urban dictionary to understand wtf a "photog" was:
http://www.urbandictionary.com/define.php?term=photog

Slang for Photographer apparently. Although I've never heard or seen anyone use the term and apparently those writing the summary title thought they were being "hip".

You might have used the regular dictionary instead, and learned that the word "photog" has been in use for over a century. Congrats, you're one of today's Lucky 10,000!

Comment Re:Wow.... (Score 3, Interesting) 135

Nope. Clicked straight on through to the first article, and then added my comment.

Allow me to explain how things work here at Slashdot.

First, you read the headline. Advanced users might also make mental note of the Slashdot editor who posted the story (this helps to frame your reactions to the story.)

Now, there are two differing schools of thought as to what to do from here. One camp jumps straight from here into commenting on the story, having already taken in sufficient information at this point to begin forming and expressing opinions. The other camp will read some or all of the summary before commenting. They claim the latter method helps them in identifying and avoiding commenting on duplicate stories.

However, at no point should you ever actually read the articles (this was where you made your critical mistake.)

It's just not done.

Comment Re:Blizzard says WRONG! (Score 2) 518

I've been playing for about a month under Wine without my account being banned. That said, one has to wonder just how "extensively" their tests were done on Linux. Try running it on any 64-bit kernel, and you can't even get past authenticating unless you're using either a patched version of Wine, or the "setarch i386 -3" workaround. The Warden routine gets stuck in an infinite loop without the patch. More details on this Wine ticket: http://bugs.winehq.org/show_bug.cgi?id=30849

Despite their community manager's assertion, there most certainly are gaps in their testing.

Slashdot Top Deals

Never trust an operating system.

Working...