Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment thin reasoning (Score 1) 577

I think this conclusion is a bit hard to reach. the comment about "demoting" the mac is no indication whatsoever about the future of OSX. the comment was made entirely in the context of cloud computing and where the "truth" is stored. not saying that apple won't perhaps phase out OSX, just that this keynote was no evidence of it.

I personally don't think they will remove it. I can see them bringing the two OS's closer together in look and feel, but I think they will remain distinct for sometime to come at least.

Comment Re:Why Gen Z Needs To Change for Work (Score 5, Insightful) 443

yeah, I've heard this thing several times over the last year. all these "innovators" talking about how the next generation of "digital natives" will need to work on their ipads while posting everything on facebook and twitter, but I just don't get it. Why? I don't think the average work environment is so short of people as to be that desperate.

In fact, my place is in the middle of cutting costs by 40%, so why would they then bend over backwards massively changing internal policy and introducing risk to attract inexperienced, self entitled oiks who by their own admission, want to spend most of the day on facebook rather than actually doing any work?

Thing is, the company is the one paying the bills, and taking the risks. Where is the business advantage to most businesses to do this? I admit that some more specialised industries that regularly take high skilled graduates may want to do this, but for most industries, i don't see what they'll get out of it?

dave

Comment Plex or XBMC? (Score 1) 266

I'd really like to see Plex hacked onto this device myself. Not all that keen on the boxee interface,but the Plex and XBMC interfaces are much nicer, esp with the skins available. Of course, with plex's recent announcement of a partnership with LG, maybe we'll see a dedicated box from LG too? david

Comment Re:how about the other way around? (Score 1) 104

I'd like to be able to run a secure VM with a level of assurance that it can't be interfered with from the host upon which it's running. this task may well be impossible, but there's certainly call for it. the classic example being running a corporate VM for access to work, on a member of staff's own computer. the company would not trust that computer, but would want to be able to trust the image. They would want to know that any malware on the host could not affect the VM.

I'm askin if any of the modern technology we're supposed to be seeing on modern computers, like trusted computing, various hardware level hypervisors etcetc can facilitate this. I fully accept that the answer may well be no. :)

dave

Comment Re:No ECC... (Score 1) 305

I'd like to see someone make an expresscard (3/4) with as much ram as possible available over the PCI-e port as a disk. this could be used in laptops as swap space and temp space. I don't know if it would need any battery power, I know the machine could format it on boot, but what about when the thing sleeps? would there be enough power to keep it going?

anyways, if one could get 4 or 8G of ram it could be very useful. doesn't have to be extra fast for ram as it would be very fast for disk.

as long as it doesn't stick out of the slot so my MBP looks nice and sleek :)

Comment Re:Performance issues... (Score 1) 305

ahh the amiga, a mighty computer! I still have an A1200 (with 50mhz '030 and '882) in a cupboard. no idea what to do with it, seems a shame to throw it away, but it's not worth anything!

and yes, the amiga was a computer massively before it's time. why didn't it win?

Comment Re:Microsoft Rights Management Server? (Score 2, Insightful) 237

The solution to this *people* problem is simply : policies + training.

I don't completely disagree with you, but I'd extend it to say "Policies + training + audit".

the microsoft solution, amongst others, provides a way to do this audit. it's not perfect, there are ways around the protection, but those ways rely on the person actively trying to get around the system. they know they are doing something wrong. these document DRM systems provide a framework so that the users can easily see what what they are supposed to be able to do and it prevents them from doing what they're not supposed to be able to do.

it also logs all document requests which can be viewed later. in the OP's case, he stated that requests to open a document from overseas might be suspicious. he can audit the logs from a DRM server to see where requests to get keys come from.

dave

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...