Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Let's get this right. (Score 1) 260

Apple's move was not a move to give iAd an advantage. It was a move to try to keep analytics from being spyware.

The reality distortion field is strong with this one. You think Google has a monopoly on spyware?

If this were about spyware then no one would be allowed to collect analytics. This isn't the case, however, so it isn't about spyware. It's about limiting Apple's competitors.

Comment Re:What to do (Score 1) 572

If you want any certainty, every free project is in need of auditing by the end user.

Nowhere did I argue that open source software is just as likely to have backdoors. It is, however, possible and ultimately your security still comes down to some 3rd party (my original point). Your argument seems to boil down to "software not audited by a trusted party is dangerous," but what you're saying is "proprietary software is dangerous." The two are not equivalent: there exist free projects which haven't been audited properly and proprietary projects that have. Calling lack of backdoors an inherent advantage of OSS creates a false sense of security and simply isn't true. At best being well-audited is an advantage of large and popular OSS projects, but even then it doesn't universally apply (e.g. OpenOffice) and there's no easy way to tell where it does.

(There is also the issue of accidentally introducing vulnerabilities, which your "many eyes" and "shame" factors don't necessarily preclude as evidenced by the Debian OpenSSL bug. Your original "proprietary software is dangerous" argument ignored this possibility.)

Comment Re:What to do (Score 1) 572

The DRM is not even the only issue. If you run anything that is binary and closed-sourced on your GNU/Linux machine, with your user privileges, you are basically asking for a punch in the gut. Keep doing it, folks; with so many willing targets, all of us who actually give two shits about security will be that much safer.

This is absurd. Unless you have personally audited the source* for every open source binary on your system and compiled it from that source yourself to verify that your binary came from it, adding a proprietary binary into the mix isn't going to change anything. * Or trust someone that has, which is still implausible.

Comment Re:very wrong (Score 2, Informative) 248

Blizzard has _nothing_ to do with incompentence of users which allow keyloggers and stuff on their computers. The fact that Blizz allows the recovery of your items/gold on _their_ costs, is a fact that you will never find anywhere else.

That's a bit extreme. Plenty of MMOs handle theft the same way. Customers tend to not resubscribe when their stuff is stolen and never returned.

Comment Re:Please, no. (Score 1) 554

We offer a complete or partial fee waiver for authors who do not have funds to cover publication fees. Editors and reviewers have no access to payment information, and hence inability to pay will not influence the decision to publish a paper.

Of course, they could avoid the problem entirely by charging for paper submission rather than publication.

Comment Re:Judging from... (Score 1) 243

This sounds like data mining, since essays are used to train their system. If so, their classifier can guess what a human would give a paper based on pre-defined textual features, but this classifier wouldn't necessarily be good at finding specific areas that need to be changed.

Comment Re:data connection? (Score 3, Informative) 194

Someone on the project page asked the guy who did this if the data connection worked. His reply was rather cryptic: "YES BUT DON'T DO THAT". If the person who managed it is recommending against it, the very same hoopy frood with the smarts who managed to go to all the trouble to hack Ubuntu onto the Kindle, then I gotta go with "it either doesn't work well enough to bother, or there's a really good reason why you shouldn't use it if it does".

Amazon only guarantees that the Kindle can be used to access a few websites (Wikipedia, Amazon, maybe one or two more), but they currently allow you to access all of the internet for free over Sprint's cellular network. Amazon pays for it.

If people were to start tethering their Kindles and using them as a means of getting free internet anywhere, it would become too expensive for Amazon to continue. This is probably why the author said not to use the data connection; he doesn't want Amazon to discontinue the free internet service.

Comment Re:Humans are different (Score 1) 539

What is the distinction between a living being and a program that perfectly simulates one, then? Can you say with any certainty that the living beings you know are not programs?

Your suggestion that a program can't feel pain is puzzling to me. Why would that be so?

Comment Re:Actually, I see an even bigger problem (Score 1) 316

http://en.wikipedia.org/wiki/Instance_dungeon

In MMORPGs, an instance location is a special area, typically a dungeon, that generates a new copy, or instance, of the dungeon map for each group that enters the area.

Admittedly, the article does list EVE as a game with instances, but that isn't consistent with the above definition.

Comment Re:Actually, I see an even bigger problem (Score 1) 316

Essentially missions are instanced (deadspace) within a zone (solar system) if you think about it. Wow does this for raids, Eve does this for all missions and raid equivalents (wormholes) basically, all while delivering a pretty darn good play experience to people across different countries without having to fuss with EU/US/Asia servers etc.

Technically nothing in EVE is an instance. Deadspace is literally dead space: an area in space that isn't near to anything else. Players in deadspace can be probed down, whereas there would be no way for other players to get to them if it were a true instance. Wormhole systems are basically just solar systems that are accessed through a wormhole rather than a jump gate.

Slashdot Top Deals

What hath Bob wrought?

Working...