Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Autodesk will lose (Score 1) 488

"Autodesk countered that because it licenses the software, rather than selling it outright, a licensee does not have the right to resell its products"

Vernor is passing that same license to a new owner, he's not duplicating it.

But now software licenses are tied to a single real life person and can't be transferred, you paid for it and now it's yours forever.

Comment Re:How is this different from / better than Twiste (Score 3, Insightful) 113

Bret Taylor says:

When we started, we did use Twisted. In practice, I found Twisted tedious. The deferred abstraction works, but I didn't love it in practice. Likewise, the HTTP/web support in Twisted is very chaotic (see http://twistedmatrix.com/trac/wiki/WebDevelopment ... - even they acknowledge this). In general, it seems like Twisted is full of demo-quality stuff, but most of the protocols have tons of bugs.
Given all those factors, it didn't seem to provide a lot of value. Our core I/O loop is actually pretty small and simple, and I think resulted in fewer bugs than would have come up if we had used Twisted.

Comment Re:Here, I'll summarize. (Score 1) 834

Anyone who knows time travel knows they are just going to modify one timeline thread. They kill the boy, history forks, but back on the "original future", nothing has changed, because changes make time fork to a new timeline, it doesn't magically make things appear and disappear. It doesn't make people in pictures fade in or fade out.

You can go back in time as many times as you want, but you wont change your future, you can create a new future. But your old miserable you will remain miserable in his own timeline and will never notice any changes.

Anyway this is Sci-Fi so anything is possible. :)

Data Storage

Single Drive Wipe Protects Data 625

ALF-nl writes "A forensics expert claims that wiping your hard drives with just one pass already makes it next to impossible to recover the data with an electron microscope." But that's not accounting for the super secret machines that the government has, man.
Security

Submission + - Xbox 360 Hypervisor Privilege Escalation

An anonymous reader writes: We have discovered a vulnerability in the Xbox 360 hypervisor that allows privilege escalation into hypervisor mode. Together with a method to inject data into non-privileged memory areas, this vulnerability allows an attacker with physical access to an Xbox 360 to run arbitrary code such as alternative operating systems with full privileges and full hardware access.

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...