Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:GPL limits rights that employee has to transfer (Score 1) 504

The GPL does not prevent dual licensing of code that someone owns the copyright for.l

In other words, for code produced by the employee, that can be provided free of GPL, but outside code that's GPL can't be....

if the employer can figure out a way to distribute the resulting code without any outside GPL code, then there's no reason to GPL it. .... but if the code depends on GPL library code, then I'd say that the only way to distribute the code would be in source format (or possibly unlinked binaries that don't include any of the libraries).

IANAL

Comment Re:Obvious. (Score 1) 555

From my reading of the article, most of the machines "purchased with hospital funding" were workplace computers.... On the other hand, it sounds like the home boxes that IT wants users to bring in to install encryption software on really are private home boxes purchased with personal funds.

If my reading is correct, then my response would be "Go ahead. Cut me off or buy and set up a work box for my home." To boot, I'm running Linux at home, so they'd (hopefuly) not have the same problems (if they even manage the install).

Comment Re:Don't merge. Keep them separate. (Score 1) 349

I think that you misunderstand what he wants... His only reason for virtualizing Windows under Linux is to insulate from the Windows Driver hell that can sometimes arise when you have to swap out machines after a hardware failure.

The point is that, if Windows always sees the same hardware (no matter what the 'real' hardware is), then you have no driver problems. Linux has almost no driver issues when switching hardware, so virtualizing Windows into a consistent hardware VM under Linux is one way to avoid Windows Driver hell.

It's not necessarily the best solution, but it solves the immediate problem.

Comment Hardware Hell a Windows Phenomena? (Score 1) 349

It's interesting that I see Microsoft shills pop up on Slashdot and elsewhere, from time to time 'complaining' about how Linux problems with hardware changes are a majour roadblock to owning the desktop ... yet, when in real life, it's almost always Windows which I see having problems with hardware changes, while I've experienced Linux shrugging off a complete motherboard upgrade (P2 -> P3) a decade ago, and getting better ever since.

In fact, I use a hard drive that I pulled from a dying laptop as my 'traveling Linux box'. Any machine (desktop or laptop) which can boot from a USB drive is a happy host for Linux with no, or little, change to the system (sometimes resetting the X display for odd video cards). The biggest 'problem' is that, under Ubuntu, every ethernet/wifi card gets a unique number.... Right now I'm up around eth10 for the newest box.

(there are relatively simple ways to fix the ethN numbering oddity, but I'm just too lazy to write the scripts).

Comment Next time.... (Score 1) 182

If a vendor blows you off with a problem this time, then you know that that's a stupid path to take next time. An anonymous report ((preferrably to other users, rather than to the public at large -- which is more likely to include black-hats)) is a bit less of a political problem if they don't know that you already know about it.

Comment Re:Not the same thing at all... (Score 1) 182

yeah. At least they're interested.... Half your work is done there... now all you have to do is prove to them that the breakage is because of what they're doing, not because of what you're doing.

If they're willing to work with you to fully understand the bug, then chances are that they'll throw better money after good and actually fix it once they understand what went wrong.

Comment No reason to make it easier (Score 3, Insightful) 182

If they do know how to exploit your system, then it's too late, agreed. If on the other hand they don't (or they hadn't thought of it), the last thing you want to do is post a big message on your front window "The key is under the welcome mat". Some folk who might not have, otherwise, thought to ransack your house might just drop by to 'take a look'.

As somebody else pointed out ... the least you owe to your employer is to (attempt to) lock down your own system before you tell the world where the hole is.

Comment Re:But why? (Score 1) 110

..... It is like the entire fashion industry is in denial about what medium they working in.

Dude, have you ever seen the bodies that they demand as 'models'? .... More to the point, have you ever met someone who looks like that naturally? We still have the problem of the occasional high-profile model dying from starvation trying to stay 'in vogue'.

Comment Re:There's nothing nerd-worthy here (Score -1, Troll) 19

How will you know if you like gay anal sex with a donkey until you try it?

Some things, you just know ...

Would that be you going at the donkey, or the donkey going after you?
Not that it would make a difference to my answer, but it's not clear from your question.

((For me, it's basically the difference between 'eww, ick!,' and 'Holy freaking OUCH!!'. ))

Google

Submission + - Chinese City Tops Malicious Email List (timesonline.co.uk)

Stephen Samuel writes: "The Chinese city of Shaoxing has earned the dubious honour of being the source of more malicious email (21.3%) than any country, other than, of course, China(28.2%) itself — although Romania came a close second at 21.1%. With the study finding that key targets of the email were 'experts in Asian defence policy and human rights activists,' it may be hard for the Chinese government to plausibly deny involvement. The study was done by Semantic while helping Google investigate suspected hacking attacks."

Slashdot Top Deals

"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt

Working...