Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
It's tough to get more than a general sense of how much money gets contributed to which foundations by which companies – however, the numbers aren't large by the standards of the big contributors. The average annual revenue for the open-source organizations considered in the analysis was $4.36 million, and that number was skewed by the $27 million taken in by the Wikimedia Foundation (whose interests range far beyond OSS development) and the $17 million posted by Linux Foundation.
The first new batch comes from Clevo because their gaming laptops don't look like gaming laptops, and they offer 3-6 disk slots which we badly need. The result is acceptable, however, not quite as good as I had expected. Mine has i7-4700mq CPU which is more or less equivalent to an older i7 on the desktop, but its temperature is raised to 70-80C while turbo boost is on, even with the best thermal paste. My friend's i7-4801mq is worse — it could never stay at the advertised 3.6GHz for more than a few seconds before it burns up over 90 and starts to throttle. Its benchmark result is nearly identical to the 4700mq because of heat problems. And it's only 3.6GHz! The best i7 CPU on a desktop could easily run closer to 5GHz with 6 cores / 12 threads running!
So what should we choose next time? We're not looking for something cool or slim or light. We need real laptops which can at least run prime calculation at advertised turbo boost speed, full cores/threads for an entire day. A nice bonus would be manual fan control plus easy access to the fan for cleaning.
Noted researchers Dan Farmer, creator of the SATAN vulnerability scanner, and HD Moore, creator of Metasploit, have been collaborating on research into the vulnerabilities present in IPMI and BMCs and the picture keeps getting uglier. Last July, Farmer and Moore published some research on the issue based upon work Farmer was doing under a DARPA Cyber Fast Track Grant that uncovered a host of vulnerabilities, and Internet-wide scans for the IPMI protocol conducted by Moore. Farmer released a paper called 'Sold Down the River,' in which he chastises big hardware vendors for ignoring security vulnerabilities and poor configurations that are trivial to find and exploit."