Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Ric Romero reporting in... (Score 3, Insightful) 330

Just like many other surveys regarding ppl who really aren't tuned into a particular segment of a thing.. they are gonna say whatever.

Lets also contrast the names ppl said for men. Bill Gates (not really a tech leader anymore does philanthropy) Steve Jobs (IS DEAD), Elon Musk... literally currently in the news because rockets, and making a big PR thing about it. Mark Zuckerberg, in the news well its facebook, and everyday is a PR disaster there.

So who'd currently in charge of MS or apple? Whos in charge of google? Is this more related to who makes (or is made into a big PR presence.

Comment Re:Andy, another android emulator (Score 1) 164

This is the permissions for /Applications

  0 drwxrwxr-x+ 69 root admin 2346 Dec 26 09:05 Applications

Please note the group permissions 'admin' and the file system permissions in octets.
d - directory flag and then Owner (root) [RWX] Group (admin) [RWX] and Other [RX].

Members of the admin group and hot write to /Applications. Users who are not in the admin group will get prompted for elevation.

Comment Re:Andy, another android emulator (Score 2) 164

Thus belies another issue with /Applications on macos. Being in the admin group you have permissions to access /Applications beyond that of a normal user. So to say that you dont 'usually need privileges' You do, you already have them. However this is really a problematic behaviro of MacOS, it really should be triggering a superuser exception for that folder.

Comment Re:stubborn? (Score 1) 178

I am also using this plugin. Eion is also very responsive to any issues.

Now for the gtalk side i had very good luck using app passwords when using pidgin.

I don't know if the app passwords still work on the hangouts plugin. I had to do the handwaving to get the key to bind the plugin.

Comment Re:Reasoning (Score 4, Interesting) 108

Well I'd like to take this 'reasoning' even further.

If you are an ISP that decides to get brain damage and not act like a common carrier.... and the ISP decides to "categorize downloads, block sites, and filter out certain types of content" for the purposes of protecting the copyright of a 3rd party (or if you are in the UK because your govt just hates pron), do you suddenly become 'directly infringing' if you aren't 100% accurate?

It would appear that the argument being made is that if you do anything to the data, or even the meta data you are on the hook for its use by a 3rd party.

Comment Re:Buy not build. (Score 1) 348

I only want to add the caveat that you have to have someone with some kinda clue how to evaulate the solutions your programmers are making.

I've had a 'software developer' melt down because :
1) The mere thought that the system java is updated because he need a very specific version, even tho he doesnt write aganist the system JRE
2) The queries are to complex for jdbc/odbc and can only be done via the full Oracle client
3) incapable of understanding that NTFS is the default file system for Windows XP, but is totally sure IT is taking away privlidges from user to write willy nilly to the file system.
4) Apparently have never heard of environment variables, and demand make a world writable folder on all computers for temp files.

These are the more egregious entries.

Slashdot Top Deals

Adding features does not necessarily increase functionality -- it just makes the manuals thicker.

Working...