Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:DRM is not useless (Score 1) 142

You seem to misunderstand what DRM, a.k.a. "copy protection", is advertised to do. It's about preventing copies of the content that is "protected" by DRM from becoming widely available to non-paying users.

The negative effects of implementing DRM systems, which is that users' devices remain out of their control (for most users), are alive and well. That doesn't mean that DRM is accomplishing its stated purpose.

Comment Re:He is right (even though I totally dislike him) (Score 1) 257

If I come up with a concept that it is utterly new, and difficult, but it can run on a PC... Why shouldn't I be able to patent it?

Because over the past decades, we've learned that allowing people like you to patent all of these thigs actually results in a "patent thicket" that punishes innovation. Today, if you try to build your utterly new and difficult invention in the US, you have a high risk of losing a patent infringement lawsuit (or spending a ton of money defending yourself against one), because doing so would infringe on dozens of other people's patents.

Comment Re:I Want to Believe. (not) (Score 2) 312

Only if you look at it from the perspective of digital 1's and 0's. If you look at it from the perspective of analog signals, you'll see square waves or sine waves on a frequency.

Actually, if you're using something like direct-sequence spread spectrum modulation over a wide bandwidth, it's really going to just look like noise that's *quieter* than the noise floor at the receiver. Unless you know what you're looking for, you're not going to be able to distinguish the signal from the background noise.

Of course, if aliens are at least as concerned about battery life as we are, they aren't going to be transmitting signals with so much excess power and with so much redundancy that the signals will reach us AND that we'll be able to decode them.

Comment Re:How about... (Score 1) 355

How about... ...enabling users to upgrade the devices themselves?

No kidding. The fragmentation problem with Android comes from the fact that every hardware manufacturer effectively spins its own Linux distro for each device that they manufacture. There should be one or two Android distributions in the world, just like we have with desktop Linux distros.

It's probably related to this comment by Linus (in the same thread where he threatened to stop merging ARM patches altogether):

The long-term situation should be that you should be able to have ONE binary kernel "just work". That's where we are on x86. Really.

[...]

Now, some of it is quite understandable - ie real drivers for real hardware. But a _lot_ of it seems to be just descriptor tables, and I'm getting the very strong feeling that ARM people aren't even _trying_ to make it sane, and trying to standardize things, or trying to aim for the whole notion of "one kernel image, with much more hw description done elsewhere".

Comment Re:One caveat. (Score 2) 341

If YOU were the copyright holder why would YOU need to abide by these terms?

You wouldn't, as long as you don't mind having to do all the development work yourself, rather than working with a community of developers. As soon as you merge other people's patches, you're bound by the terms of the license.

Comment Re:One caveat. (Score 5, Informative) 341

In GPLv2 (perhaps not GPLv3) you can have the program open source, but keep the build scripts to yourself.

I'm glad you took the time to read the GPL before commenting:

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.

Comment Misuse of the term "encrypted". (Score 2) 239

This sentence is downright terrible:

Embedded in the virus is an encrypted IP address belonging to a server in China which is believed to be a C+C server.

Not only does it misuse the term "virus", as you mentioned, but it also misuses the term "encrypted". The correct term here is "obfuscated". The obfuscation code might happen to contain something that looks very similar to AES, but it isn't encryption (and it certainly isn't AES) if the "key" can just be recovered from the executable.

Slashdot Top Deals

If you think the system is working, ask someone who's waiting for a prompt.

Working...