Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Blackberry, Microsoft, Apple and Google (Score 2) 164

Between commercial malware and government agencies, how do you keep your phone's data relatively private?

There are 4 main smartphone brands:

Apple is in the hardware business. Their goal is to sell you hardware with a basket of software that enhances the experiences and showcases the hardware. Blackberry is in the enterprise software business. Their goal is to sell you hardware that ties you to a management system from which they make their margin. Microsoft is in the productivity software business. Their goal is to sell you an endpoint that showcases the features of their productivity suites including their server / cloud based collaboration tools. Google is in the advertising business. Their goal is to sell you an endpoint that showcases their web services. Those web services are designed to collect information about you to sell to advertisers.

Of those 4 companies which do you think you are going to have the toughest time with privacy? If you care about privacy and don't have a strong reason to pick Android, don't use Android, it is quite obviously going to have to be the worst of the 4. You are going to have to cut against the grain to be secure and be on a platform designed advertisers. The other 3 while they may have problems are all much much better on privacy. Blackberry's balance feature allows you to create a container which divides your data a secure side and an insecure side. They offer things like secure browsing by default. You want security choose an operating system designed to enhance not reduce security. Apple and Microsoft are sort of midpoints. Apple is very good about now allowing applications to upload data you don't know about sharing between apps is off by default. Microsoft emulated the Apple sandboxing, certification and limited interaction approach we'll see if overtime they maintain it. If you want to use these devices and have secure data something like Good's containers (which do work on Android) provide a pretty excellent way to keep specific data associated with specific applications secure.

Here's another heuristic.

Apple, Microsoft and Blackberry uses closed software. Google uses open source.

So, Android is the best choice because you (meaning a team of concerned citizens) can essentially take all the privacy leaking parts out and create a private and secure system. In the others, you are at the mercy of others who likely are to care about your privacy as much as your cat cares about your rants.

Comment The Fitness Store (Score 2) 13

So, apparently this has a fitness store ... not a store to sell you stuff, but a storage of the user sensor data (snarkily probably a store for advertisers).

I think this might be a good idea. Recently motorola discontinued their motoactv watch and in the process also broke their website. So, your entire history went with that and your device became almost useless after that.

Also, the devices have made data overly fractured. The pedometer syncs to a different website than your running app. They don't want to co-operate. Maybe the fitness store will be one central repository for all that data.

I would rather have an open standard and have the encrypted data stored in dropbox but I guess this is the idea of the API.

Comment They really messed up PRS-T3 (Score 1) 172

I have the Sony PRS-T2 and it was really good for its time. However, Sony really fluffed PRS-T3 by not having a front light.

However, I think rather than Sony's hardware, it was the software that was better, esp for pdf in this generation. Kobo hardware was better - the aura and aura hd are one step ahead of kindles in hardware but one step behind everyone else.

Finally Sony was the only one with actual buttons. I was really hoping Sony would bring a new reader with frontlight and page turn buttons.

The real money to be made is in selling books and media rather than hardware. So, makes sense Sony bowed out because they aren't in the business of selling books.

Comment Re:And it'll keep happening, again and again... (Score 1) 184

I'm well-aware that keeping employees busy with enough work and having enough oversight to help keep them on-task is important, but reducing distraction is also important. There's more than one contributing factor to inefficiency. I can suggest remedies for this one.

You think enough work and enough oversight creates efficiency? No wonder you have a distraction problem.

Comment Re:And it'll keep happening, again and again... (Score 2) 184

I can tell you one thing, if such a system were implemented there'd probably be an uptick in efficiency as now it'd be a lot harder to screw around at work. Sure, a lot of people would be really pissed that they can't do non-work tasks at work without using a system seeing such monitoring too, but given that salaries in the defense sector are generally pretty good, that's a tradeoff that one could probably stomach.

Except that efficiency does not work that way.

People screwing around at work is not the cause of inefficiency but a symptom of a hidden larger problem that is causing inefficiency.

Comment Re:Typical (Score 1) 162

Just accross the parking lot is the Bose Research Building, where every design must pass a rigorous Design Assurance Engineering process. They have anechoic chambers, speaker torture (long-term testing) rooms where they do up and down, left and right, circular, and random vibration testing, CAD rooms and all kinds of research tools and methods you can't even imagine (e.g. Salt Fog testing for their Marine products)

If you're so impressed by their research building, you should check out their advertising building. They are better funded and have more influence in making their products sound better.

Comment Re:Typical (Score 2, Interesting) 162

Maybe, but as a guy who writes DSP software for a living, I took a look at that first patent and there's nothing original or creative about it that could possibly justify a patent -- and Bose must have known that when they filed it. I bet the USPTO clerk didn't have a fucking clue about DSP and was just impressed by fancy words. "Minimizing latency" my ass.

Modern patents are completely different than what people think patents are.

They are not necessarily clever inventions or designs anymore. They are just a way of laying stake to a field or method of doing things.

As an example, people think a better mouse trap would be what you'd file a patent for. No, actually, a company would file a patent for method of eliminating rodents. This would cover all forms of mouse traps that could ever be designed.

A few years ago, I thought I could learn how things are done by reading patents in a hardware/software field. All the patents were overly general, without any useful information and filled with language that only lawyers would use. On the other hand, I couldn't really design anything without "violating" patents because all the patents were so general that it could covered most general ideas that could be used. In fact, before I had read the patents I had some designs and those designs violated patents.

Comment Re:Incomplete data (Score 1) 174

As usual, jumping to conclusions with incomplete data.

First, why analyze the percentage of computer and math degree holders who hold an IT job? Why is a mathematics degree automatically equivalent to a CS degree?

Then we get leaps like the pay gap between men and women. Most likely it's the usual thing: comparing men and women of the same age, without accounting for the fact that the women took more time off for child-rearing, worked part-time, etc.. Compensate for these things, and watch the pay gap disappear.

Why do many people with STEM degrees not work in STEM jobs? They apparently count management and education as non-STEM, even if these people are managing STEM projects or teaching STEM courses. That already accounts for the two biggest groups.

The rest of the conclusions are just as shaky. This appears to be a crappy study, deserving of no attention whatsoever...

Well, it was really surprising that people who get STEM degrees don't go on to become musicians, actors and entertainers.

I thought the Brian May, Tom Scholz and Msai Oka was pretty common. Thanks to this study I now am more informed.

The whole STEM stars was a lie!

Comment Re:Doesn't this require access to your network (Score 2) 131

Quote the article: "When the Chromecast receives the “deauth” command, it returns to its configuration mode, leaving it open for a device — in this case, the Rickmote — to configure it. At that point, the Rickmote tells the Chromecast to connect to its own WiFi network, at which point, Google’s streaming stick is effectively hacked."

Imagine Dr. Evil making air quotes: "Security."

In order to give the deauth command, you have to be in the same network as the Chromecast.

So, you can't rick roll a chromecast unless you find a way to get into the network that has the chromecast.

I can see this being a problem in offices and other places where a large number of people connect to the same wifi hotspot but this is not a problem at home.

An easier way to rick roll would be to just pull out your youtube app and then start rick roll on the chromecast. This will stop whatever it is playing before and play the rick roll video.

Comment Doesn't this require access to your network (Score 0) 131

Doesn't this first require that you can get into the chromecast's wireless network first?

If you can get on someone's wireless network, there is a lot of things you can do.

Can't this be easily solved by making the process of jumping to a different wireless router in the configuration mode more secure.

After the hacker leaves the range, then the chromecast will not connect to the original network. I don't know if the chormecast installation tool can reconnect to it and reconfigure the network it connects to.

Comment Re:"Develop" or "Instigate the development of"? (Score 2) 129

Nothing I have read about Snowden indicates that he is actually some sort of uber-hacker or capable of the type of software engineering that this proposal would entail. Is his plan just to use his name to fundraise (In bit coin, I guess. I doubt many people are stupid/brave enough to attach their name to a donation towards anything to do with this guy) and attract talent, or is he honestly going to try and release code himself, which will probably be of poor-to-average quality and expect the world to adopt it?

All that counts is that Snowden has the balls and integrity that is so lacking in the "uber-hacker" department. You can't threaten Snowden, you can't bribe him. An uber-hacker, you can buy him out or scare him.

Anyways, you don't uber-hackers to develop security software. The encryption algorithms are university research level stuff and as long as you understand the basics of it, you're fine. The rest is just writing code around it that a decent programmer should be able to handle well.

Comment Is this real or fantasy? (Score 3, Interesting) 161

I read the article and I can't tell if this is a real problem that is really affecting thousands of users and companies, or a fantasy that the author wrote up in 30 minutes after having a discussion with an old IBM engineer.

Sure, IBM has all these resource prioritization in mainframes because mainframes cost a lot of money. Nowadays, hardware is so cheap you don't have to do all that stuff.

If some young programmer undertook the challenge and created the framework, would anyone use it and test it? Will there be an actual need for something like this?

My point is that an insider information to what is really going on in the cutting edge usage of linux or just some smoke being blown around to an obligated write up.

Comment Re:No real surprise (Score 1) 710

While I don't disagree with that, this report is the wrong one to trumpet about. The asked 250 people a question that is quite ambiguous, and then monitored them for a year. I read the article earlier today on some other site, and it sounded like rubbish for those reasons and others.

They are asking a question that is heavily dependent on the number of children in the household.

Those surveyed were asked if they agreed or disagreed with the statement: “The effects of climate change are too far in the future to really worry me.”

I think the correlation here is electricity usage and children in the household.

Comment Re:An absurd "crisis"! LOL (Score 2) 128

Every minute playing chess would be better spent learning about algorithms, computer programming, or biology.

The last thing any parent or teacher should do is encourage playing chess at any serious level. It's like encouraging people to compute logarithms or trigonometric functions longhand on paper; there's some initial benefit in learning some abstract ideas, but then it's just mechanics. And the same is true for chess, and computers have established this in a dramatic way, by showing that simple but fast and deep searches with very simple heuristics can beat any human who has ever lived. A $0.50 pocket calculator can bet any human at the sine function game!

The argument made in that article that chess is somehow good for the goals of "STEM" makes me laugh out loud, but simultaneously weep that the idea was proposed with apparent sincerity...

Every minute spent training for a marathon is useless because we have cars. A $50 junker can beat the fastest marathon runner.

Why is learning about algorithms useful? For every algorithm you learn, there are at least a dozen implementation of the said algorithm.

Comment Re:NSA destroying American jobs (Score 1) 143

NSA spies on everyone to "protect" us from tyrants that would spy on everyone. Makes sense. As a bonus the NSA has also done a fantastic job trimming down American tech industry jobs. Given the rampant unrepentant Orwellian spying surely every foreign government and corporation is eager to buy American technology products now.

I was reading some books published in the 2008 and 2009. NSA was viewed as the stalwart of the security aspect of the internet, valiantly contributing to security software and keeping things organized and secure in that front.

I think NSA should have done the opposite of what they did. Instead of spying, they should have created anti-spying tools and issued alerts on spying and privacy aspects of modern technology.

Even if they created spying technology, it should have been created to prevent such spying by putting those tools out in public and letting security researchers figure out methods to solve these security and privacy problems. US software would then be seen as solid and trustworthy, and the whole world would have no problem using US software knowing that it is constantly monitored for security and privacy.

Slashdot Top Deals

Waste not, get your budget cut next year.

Working...