Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:...actually that's kinda cool. (Score 1) 89

Still want a VoIP desk phone with a Qi charger, bluetooth cellphone and headset connectivity. Something where I could charge my phone, use the better handset/speakerphone of my VoIP phone and a bluetooth headset. A perfect world would also allow multiple phone ringing for inbound calls, some contact sync, and possibly calendar/task sync as well.

Comment Re:Does this work for any phone? (Score 4, Informative) 89

It is Qi so most will work it's pretty much the winner. It's only 1080P (ish since it uses AMD's sync protocol). It's a PLS panel so none of the IPS goodness.

Pretty much is a fairly meh monitor with a qi charging puck shoved into the base they are literally a few bucks added to the BOM.

Plenty of people have modded bases, keyboard, desks etc etc etc to add qi charging this is just a cheap gimmick to try and make a meh monitor look cool.

Comment How about those backdoors (Score 1) 80

Exploits that were watermarked to the client that your sold them to.

These are not tools that should ever be in police hands. Requiring that outside firms do this sort of thing and thus need to keep the paper trail of warrants that allowed each and every event. Require that they be audited and a special prosecutor look into any apparent/potential breaches of law and prosecute them to the full extent (no plea deals). Require that all security vulnerabilities be disclosed to the public in 30-90 days. Tighten up these warrants in the first place and full public disclosure of the same after a reasonable investigatory period say 90 days.

The NSA etc should have these tools and a very big firewall between them and law enforcement.

The Internet

Secret Service Agents Stake Out the Ugliest Corners of the Internet 169

HughPickens.com writes: Josephine Wolff reports at The Atlantic that Secret Service Internet Threat Desk is a group of agents tasked with identifying and assessing online threats to the president and his family. The first part of this mission — finding threats — is in many ways made easier by the Internet: all you have to do is search! Pulling up every tweet which uses the words "Obama" and "assassinate" takes mere seconds, and the Secret Service has tried to make it easier for people to draw threats to its attention by setting up its own Twitter handle, @secretservice, for users to report threatening messages to. The difficulty is trying to figure out which ones should be taken seriously.

The Secret Service categorizes all threats, online and offline alike, into one of three categories. Class 3 threats are considered the most serious, and require agents to interview the individual who issued the threat and any acquaintances to determine whether that person really has the capability to carry out the threat. Class 2 threats are considered to be serious but issued by people incapable of actually follow up on their intentions, either because they are in jail or located at a great distance from the president. And Class 1 threats are those that may seem serious at first, but are determined not to be. The overall number of threats directed at the first family that require investigation has stayed relatively steady at about 10 per day — except for the period when Obama was first elected, when the Secret Service had to follow up on roughly 50 threats per day. "That includes threats on Twitter," says Ronald Kessler, author of In the President's Secret Service. "It makes no difference to [the Secret Service] how a threat is communicated. They can't take that chance of assuming that because it's on Twitter it's less serious."

Comment Re:tip of the iceburg (Score 1) 157

Oh we know how, it requires time and thought.

Now the ECM should be able to send things to the BCM and Infotainment gear. The reverse should be very limited, pretty much remote start and that should be thoroughly checked for sanity. Old school would be serial in one direction yea there are some hardware hacks but not that problematic.

Comment Re:What's the point? (Score 1) 216

1. I suggest looking at Xpra. It's married to X, but is far better than X or NX at seamless remote applications. It's also an example of exactly the sort of remote experience that *could* be done within a Wayland context. The problem obviously being I had to point out something married to X as an example, rather than knowing off hand something that pulls off the same in Wayland, but the concepts are pretty sound.

Comment Re:What's the point? (Score 1) 216

I suggest looking at xpra. X and even NX I didn't have a lot of fun with, but Xpra has treated me well. The kicker is that the Xpra strategy concept translates to an architecture like Wayland (it captures applications via compositor interface and contextual data through window manager calls).

I have to side with those that say X's inherent network protocols are less interesting. The unfortunate fact is that everyone then cites things like SPICE and typical RDP configurations and VNC, rather than something that achieves the same seamless behavior that the fans of X want.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...