Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:so if you have iptv from bell it will kill your (Score 1) 65

This is the same argument videotron is using ... it's our OWN streaming service, from our OWN servers, over our OWN network. It really doesn't work well when the ISP is also the content provider (i.e. vertical integration).

Except it's not. From TFA (emphasis mine):

Videotron launched a feature in August of that year, enabling customers to stream music from services such as Spotify and Google Play Music without it counting against a monthly data cap

So, they're external services (Spotify and Google Play Music). If it was a internally hosted service, it wouldn't be an issue.

Comment Re:fraud ISP = obama internet (Score 3, Informative) 65

As much as your vitriol is deserved, this is all about CANADIAN Internet, not USA. Though it does have to be said, Canadian broadband is even worse than the US, but at least the CRTC is actually upholding their charter and doing what they're supposed to, rather than the FCCs... approach. As for CNN.com taking 10-14 seconds to render, that could be related to slow DNS resolvers (try switching to Googles or OpenDNSs servers), Javascript issues (browser plugins blocking events), or just a slow/overloaded computer. Try using the network console (inside Developer tools in any modern browser) to see where the delays are. On my system, it seems the homepage takes over a second to download, and the main page CSS file is over 1.3MB (Which is just stupid), along with a crapton of js files that seem to take a long time to process.

Comment Re:No. (Score 1) 65

Having a preferential rate for one particular internet service over another (or, for that matter, having an exception for certain paid-for services) is the exact opposite of net neutrality. And from a network engineering standpoint, it means ensuring you have adequate bandwidth to upstream hosts. The idea of the internet is meant to be that it's fault tolerant and multi-homed, so if a route is congested or at capacity, packets can be routed through another path to get to the same host, albeit at a slightly longer hop path.

Comment My history (Score 1) 857

Started with a C=16/+4, in a bundle from Toys 'R Us (with a 1541 floppy drive, and an MPS801 printer to go with the built-in word processing "suite")
"Upgraded" to a C=64, with a mouse and GEOS.
Then moved to an Amiga 1200, which was steadily upgraded over time, including a 250MB 2.5" hard-drive, and a 1200-baud modem for BBS', followed by a 14.4k modem when the internet started to take off.
Unfortunately, Commodore (the company) died, so I side-graded to a Pentium 1, and joined the PC treadmill from there.

Comment Re:Ways around this (Score 1) 514

Well, most (if not all) Android phones by default (since Marshmallow, I believe) default to using any USB connection plugged in for charging only, and requiring you to unlock the phone to change that option each time. And before that (since at least Jellybean, I believe) don't expose filesystem data until the device is unlocked. So that gets you some modicum of safety. And with the device encryption turned on, it won't even get into the OS without an unlock code. So provided they're not going to physically dismantle the phone, or other such destructive measures, your data is pretty safe. Apple... well... not so much.

Of course, whether the courier "loses" the package en route is another matter entirely.

Comment Re:Wind and Solar are Environmental Disasters (Score 4, Informative) 502

It's not "Countless". Wind turbines kill between 214,000 and 368,000 birds annually - a small fraction compared with the estimated 6.8 million fatalities from collisions with cell and radio towers and the 1.4 billion to 3.7 billion deaths from cats. So if it's really migratory birds you're so worried about, you'd better ditch your cellphone. And/or kill your cat.

Comment Re: What's the big problem? (Score 1) 675

I know my parents' bank in the UK doesn't allow you (technically, I believe you still can, but it's discouraged) to use the numbers on the card to make online purchases. They provide an application that runs on your desktop, connected to the internet, that generates a unique credit card/CCV/expiry number for each session (I believe it technically has access to a not insignificant pool of numbers at the bank, so there is the possibility of re-use but only after a very large number of session requests has taken place), so even if the details are stolen (which is unlikely) or the merchant is malicious, the transactions can be isolated and reversed very easily.

Slashdot Top Deals

The best book on programming for the layman is "Alice in Wonderland"; but that's because it's the best book on anything for the layman.

Working...