Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:I like "traitorware" (Score 4, Informative) 263

I *like* cameras that incorporates metadata. This protects me from lawsuits and proves that the picture is mine and can be used however I want and as often I want.

Sure, someone who wants to claim ownership of a picture would never be able to insert desired metadata in the file.

People misuse printers to print out pedophilia ... counterfeiting ... threatening letters ...

You forgot terrorists. They also use printers.

Yes, there are legitimate uses for all these traitorware features in software/hardware. The point is that these features should be opt in and disabled by default, so that people who truly want them can enable them.

Comment Re:A Simple Solution (Score 1) 548

As you note a la carte pricing will end up being more expensive. ISPs will charge $50/month for the first GB and $1/GB after that. Everyone pays at least as much as before, but anything more than minimal use is financially painful. At that point "broadband" becomes useless and everyone might as well switch to a $10 unlimited dial-up plan.

Yes, I forgot to mention that this scheme will only work when ISPs are unable to set such unreasonable pricing (either through free (perfect) market, or through heavy regulation / government control). Of course, this raises a question whether Internet access is a luxury or a basic need that needs to be provided to all citizens.

Comment Re:A Simple Solution (Score 1) 548

You are correct. In fact, charging per sent/received byte of data could fix a number of economical and technical problems in the network.

First, there is this problem of flat rates. For some reason, people seem to like them (is it because they are predictable?), but I don't see any logic behind this. Everyone hates prepaying parking some extra minutes to be safe, leaving earlier, and regretting wasted money. I don't see why this should be different with Internet plans. People who use the Internet to check emails and surf text web would not have to pay for the minimum plan (at least $40/mo). Of course, that would mean less profit for ISPs, which is why per-byte pricing is not popular.

Second, this will solve technical problem of flow fairness. The whole reason why "download accelerators" and (partially) p2p programs exist is because TCP fairness is inherently broken, as you can increase your speed on a congested link simply by opening more connections. Charging per byte would tie all flows to an economic entity, ensuring perfect fairness (you pay more -> you get bigger share of a congested link).

Third, pricing can be dynamic ("congestion pricing"). We can borrow ideas from power companies that charge (typically industrial/commercial) users less per KWh in off-peak hours when the network is underutilized, and similarly charge more during peak hours. While this works the best between end user and their ISP, it could be extended to relationships between ISPs.

Fourth, end users could have more control over prioritizing their traffic with respect to their own and other users' traffic. Suppose the network is congested, and I am willing to pay more to get my VoIP traffic delivered on time, but I don't care as much for p2p traffic (it can be delayed/rescheduled so I can save money).

In fact, this is something I'm working on as a mini-research project, so it would be interesting if it worked in reality.

Submission + - Comcast Charges Level 3 for Netflix Traffic (google.com) 1

NicknamesAreStupid writes: On the eve of purchasing 51% of NBC, Comcast has decided to turn "net neutrality" on its ear by placing a surcharge on Level 3's Netflix traffic, which has become a major load. Of course, Netflix competes with Comcast. Will this help Comcast clear the SEC and FCC hurdles to purchase NBC? Judging from the way the SEC handled the Wall Street mess — YES!

Comment Centralization (Score 3, Insightful) 143

I remember when people were concerned about their privacy and complained about Gmail mining their emails. Facebook will take it to a whole new level, complete with value-added features such as censorship. People have to understand that decentralization is the only way to go; putting all your eggs in one basket (facebook) will never lead to anything good.

Comment Re:Just wait for the GOTY. (Score 1) 261

Obligatory XKCD. But seriously, I also follow this strategy. It really amazes me how resource-hungry modern games have become. Fallout:NV lags on low settings on my NV 8800 GTS 512 that was considered top card only a couple of years ago, and no, I'm not spending another $1.3k on a new system any time soon. Back when CRT monitors were popular at least you could play on a lower resolution; now, non-native resolutions just look ugly.

Comment Re:Good For Google (Score 1) 415

It's not about 'evil intent', it's about a program that behaves badly...it doesn't appear in the list of installed apps, it doesn't use the normal install/uninstall procedures, etc.

There is nothing wrong with an application that doesn't conform to standard practices as long as system administrator is fully aware of what the application does, and knowingly chooses to install it. I may have my own reasons why I want to run a rootkit on my machine (honeypots, etc), and Google is not the one who should deprive me of this opportunity. Now, it would be unethical for me to install this app to spy on somebody, but this should be left to my conscience without Google being a moral police.

I thought the general consensus here on /. was that since I own the hardware, I should be able to use it as I please, so why is my opinion so unpopular?

Comment Re:Shotwell instead of f-spot, almost Yay (Score 1) 473

WTH?? Why are you avoiding mechanism which is in place for those things, namely XDG user dirs? Shotwell, as every good behaving application, uses directory which user defined for storing pictures.

I'm not the OP, but I used the same workaround. The answer is simple - I didn't know about XDG, the command needed to update directory, its parameters, where the config file is located, or whether the app in question is "good behaving". Doing rm & ln is simple, gets the job done, and doesn't require additional googling. The same thing really happened when I installed sun java and didn't know about the alternatives mechanism - manually overriding symlinks, or even prepending java's bin directory to your $PATH is easier than trying to figure out how to do it properly. Of course now that I know about these tools I will use them, but you shouldn't really blame the OP for using something he knows to quickly fix the problem instead of spending additional time learning about new tools.

KDE

KDE 4.5 Released 302

An anonymous reader writes "KDE 4.5.0 has been released to the world. See the release announcement for details. Highlights include a Webkit browser rendering option for Konqueror, a new caching mechanism for a faster experience and a re-worked notification system. Another new feature is Perl bindings, in addition to Python, Ruby and JavaScript support. The Phonon multimedia library now integrates with PulseAudio. See this interview with KDE developer and spokesperson Sebastian Kugler on how KDE can continue to be innovative in the KDE4 age. Packages should be available for most Linux distributions in the coming days. More than 16000 bug fixes were committed since 4.4."

Submission + - Slashdot is Dying, New York Times Confims It (nytimes.com) 12

An anonymous reader writes: The New York Times is running a story about how Slashdot has dropped in popularity compared to other news sites in social web space. Quote: "Why is Slashdot almost irrelevant to the social media community? It used to be the biggest driver of traffic to tech web sites, but now it hardly delivers any traffic at all to them. We explore some of the reasons, including input from our own community."

Comment Re:Not real life (Score 1) 279

Honestly, I think people should not be able to earn an A+ unless they do extra credit. Too many universities and colleges have professors that give too lenient of grades and it makes people begin to expect it.

Very true. I happened to study in a country where you could earn the highest grade (10) only if you did some significant extra credit, or if you showed that you knew more than the class required in some other way. It highly motivated students to go "above and beyond", and gave a student something to be really proud about when they earned a 10. I also studied in the US, and it's too easy here to get an A - simply do everything that is required with no "thinking outside the box" involved.

Comment Re:Horrible idea, for both parties (Score 1) 612

Where exactly do you get the notion that people are still learning to write real algorithms in university ? Sure they get shown the result of algorithms. They might even get to implement a binary tree search algorithm (though without the memory allocation part that makes all the difference in real programming). But that's pretty much it.

In decent colleges, they teach you basic algorithm design concepts (e.g. dynamic programming), give some examples, and ask you to come up with a specific algorithm to solve a particular problem. This is hardly as simple as implementing a binary search algorithm (this stuff is typically done in introductory courses). Memory allocation is typically completely irrelevant in Algorithms course.

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...