Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment How else would Windows Hello work? (Score 2) 97

And does M$ think they can mandate what ports manufacturers put on their PC.s
I remember them saying that LapTops had to have a camera.

This article claims that the camera requirement exists to support Windows Hello authentication. How would Microsoft's Windows Hello or Apple's Face ID work without a camera? Or what other means of quickly authenticating the user to the operating system and to the external passkey/password store would you recommend instead?

Comment It'd make low-end laptops more expensive (Score 1) 97

There are no downsides to this.

The only downside I can think of is that low-end Windows laptops could become a lot more expensive to support display and 40 Gbps on all ports. This could drive laptop makers toward an operating system with even more restricted functionality: ChromeOS.

Comment String length API unchanged? Facepalm. (Score 1) 99

unless there is a discovery in calculation of length of a string.

Incidentally, there was such a discovery. 'It's not wrong that "[facepalming man with brown skin emoji]".length = 7' by Henri Sivonen came out in September 2019. It explains the difference among code units, code points, and extended grapheme clusters, the difference among UTF-8, UTF-16, and UTF-32, the difference among JavaScript, Python 3, and Rust length semantics, and the difference among storage, display width, and arbitrary quotas that are roughly fair across languages.

Comment Re: ...and then licensing it back to AI companies. (Score 1) 75

To overcome the recent famine challenges, I have decided to

1. Acquire a plot suitable for growing potatoes

2. Reach out to neighbors to pool resources

3. Establish a secure bunker for storing emergency reserves of grain

4. Mapping out the foraging, hunting and fishing opportunities in the nearby hills

5. Cutting off and eating my remaining leg.

Comment Government complicit in private censorship (Score 1) 95

Even if you define "censor" to refer only to public sector acts, the government can censor on behalf of a private person by enforcing exclusive rights asserted by said private person. In the case of iMessage and other closed platforms, the exclusive rights in question are often those granted under anti-circumvention statutes implementing the 1996 WIPO Copyright Treaty, such as 17 USC 1201 and foreign counterparts.

Comment XML and JSON schemas are for semantics (Score 2) 95

Both XML and JSON have a syntax, which describes what makes a document using those languages well-formed. However, not all well-formed markup is valid in a particular application. For example, you don't want "-567" or "butt" as the value of the "width" attribute in an "img" element in HTML. For this reason, applications of XML and applications of JSON have semantics, which further refine what is considered "valid" for that application. An XML or JSON schema can be used to quickly reject documents that are well-formed but not valid.

Comment "Application" dates to mid-1980s (Score 1) 187

Programs for macOS and its predecessor Mac OS have been called applications since the mid-1980s. Three usage examples for the short form "app" in Wiktionary come from computing books and magazines from 1999, which predates the iPod, let alone the iPhone. The term "killer app" in particular dates to PC Week in 1988.

Slashdot Top Deals

There is no opinion so absurd that some philosopher will not express it. -- Marcus Tullius Cicero, "Ad familiares"

Working...