Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:And here I'm hoping... (Score 1) 681

Windows 8 has already made itself incompatible with most non-x64 processors anyway. It requires SSE2, PAE, and NX bit, which are features that CPUs, say a Pentium 4 Extreme Edition 3.46GHz or a Pentium 4 HT 571 3.8GHz, do not offer. Doesn't matter that you have 8GB of RAM and an SSD in them. Believe me, these CPUs are fine for just about any office task.

Windows 8 runs on crap tablet hardware but won't run on CPUs that can run MFLOPS around them due to a few CPU features.

Comment TV and monitor manufacturers also (Score 1) 289

This has been happening for many years in computer monitors and televisions also. There will be an initial version sold for a few months that gets the reviews, and then the specs are changed - completely different LCD panels made by different manufacturers are substituted silently, often with different technology. Anecdotally early versions of an Acer monitor having a MPVA panel, and then the exact same model then shipping with TN panels that pale in performance compared to the original. With monitors, you are buying an AO Optronics panel in a box labeled Samsung, so when the same model gets you something inferior to both specifications and original reviews, it borders on fraud.

Comment Re:Legacy file systems should be illegal (Score 1) 396

The problem is, neither ZFS or Btrfs would have stopped an arbitrary bit inside an arbitrary file from becoming corrupt....

I think you should have a look at this 10 year old blog post: https://blogs.oracle.com/elowe...
ZFS can use single and double-parity (like RAID5 with two parity drives, but no failure if power is pulled during writing). In addition, it has bit scrubbing where all data is verified regularly.

Submission + - The Government Can No Longer Track Your Cell Phone Without a Warrant 1

Jason Koebler writes: The government cannot use cell phone location data as evidence in a criminal proceeding without first obtaining a warrant, an appeals court ruled today, in one of the most important privacy decisions in recent memory.
"In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the United States Court of Appeals for the Eleventh Circuit ruled. "The obtaining of that data without a warrant is a Fourth Amendment violation."

Comment Re:like those are hard to see on teh intarwebs (Score 1) 110

And these scumbags even register and hold for ransom domain names put into their domain search tool. That's right - search to see if a domain is available using the Godaddy site, and it will be registered by Godady themselves or "partners", and sold off to the highest bidder, or suddenly have a $500 asking price. http://www.billhartzer.com/pag...

Comment No good comments? Not a comment worthy article. (Score 1) 120

The linked article, which I did read, seems to have no thesis. It meanders from "C compilers can be subverted" to "see if people leave their purses out to judge if a neighborhood is safe". It is as if a high schooler had to write a paper on trust, and cut a paragraph out of each of the top 20 web search results.

Comment Re:Thankful for the FOSS drivers on older hardware (Score 1) 134

The open source driver needs to be good; the latest version of the ATI proprietary driver has dropped support for relatively new cards - anything before HD 5000 series. This means that cards that include very good h.264 decoding engines such as the AMD Radeon HD 3850 256MB reviewed can no longer use the latest driver. In Ubuntu 14.04 this also means that trying the older last-supporting driver version no longer works, one would need to downgrade the x server version used in the distro.

This is one of the few cases where hardware on Linux becomes "obsolete" far sooner than it should because of lacking manufacturer's driver support (as opposed to many hardware devices like gameports, scanners, and printers that lost their Windows support in Vista but continue working on Linux). This will make me more wary not of Linux, but of the manufacturers that pull such shenanigans.

Comment Re:Price a bit steep for lowest end platform (Score 1) 109

You can get an almost identically-specified Windows 8.1 Nokia Lumia 520 for $59.99, no contract. The only thing it's missing is a camera flash and a front-facing camera for video chats (Skype still works, it just points the wrong way.)

The latest developer rev of Windows Phone has word flow keyboard, which turns touch-screen typing from painfully intolerable to pretty cool.

Even Blackberry, giving it's Playbooks away to developers, couldn't get the adoption jump-started, so I don't know how an overpriced Firefox phone will succeed, although I would hope it would. Every other smartphone except for Blackberry wants to own your personal data and your life in their cloud and profit from everything sold in their store.

Comment Re:Descent + SpaceOrb 360 (Score 1) 251

I have a Logitech Cyberman II controller still (can be seen here). It has a true six-axis knob and eight buttons - you never have to touch the keyboard. Twist the knob right to look right, twist down to look down; push forward to move forward, pull knob up to move up - revolutionary. I don't think most understand how awesome these controllers are, or how disappointing it is that game port support was completely removed by Windows 7 (and previously took a hack to add back into Vista) and that these controllers disappeared from Logitech joystick software updates before that.

Descent had several direct-to-metal ports, pre-directx or OpenGL, for video cards such as the Rendition Verite and S3 Virge. I tossed all my CDs of games unplayable without the old hardware a while ago. None of these cards won though, as the 3dfx Voodoo stomped them all for Quake.

Submission + - Blizzard sues Starcraft II cheat authors in US Court (torrentfreak.com)

qubezz writes: The torrent news site TorrentFreak was first to report that Monday this week Blizzard filed a lawsuit in US District court in California against the programmers behind the popular Starcraft II cheat “ValiantChaos MapHack.”

The complaint seeks relief from "direct copyright infringement", "contributory copyright infringement", "vicarious copyright infringement", "trafficking in circumvention devices", etc. The suit seeks the identity of individuals, as it fishes for names of John Does 1-10, in addition to seeking an injunction against the software (which remains on sale) and punitive damages. Blizzard claims losses from diminished user experiences, and also that "when users of the Hacks download, install, and use the Hacks, they directly infringe Blizzard’s copyright in StarCraft II, including by creating unauthorized derivative works".

Submission + - Oracle Deflects Blame for Troubled Oregon Health Care Site (itworld.com)

itwbennett writes: Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational. In a letter obtained by the Oregonian newspaper this week, Oracle co-president Safra Catz said that Oregon officials have provided the public with a 'false narrative' concerning who is to blame for Cover Oregon's woes. In the letter, Catz pointed out that Oregon's decision to act as their own systems integrator on the project, using Oracle consultants on a time-and-materials basis, was 'criticized frequently by many'. And as far as Oracle is concerned, 'Cover Oregon lacked the skills, knowledge or ability to be successful as the systems integrator on an undertaking of this scope and complexity,' she added.

Submission + - Tor Blacklisting Exit Nodes Vulnerable to Heartbleed (threatpost.com)

msm1267 writes: The Tor Project has published a list of 380 exit relays vulnerable to the Heartbleed OpenSSL vulnerability that it will reject. This comes on the heels of news that researcher Collin Mulliner of Northeastern University in Boston found more than 1,000 vulnerable to Heartbleed where he was able to retrieve plaintext user traffic.

Mulliner said he used a random list of 5,000 Tor nodes from the Dan.me.uk website for his research; of the 1,045 vulnerable nodes he discovered, he recovered plaintext traffic that included Tor plaintext announcements, but a significant number of nodes leaked user traffic in the clear.

Comment Re:No. (Score 1) 650

The main reason so much needs to be rewritten and the reason that new drivers were required on Windows Vista (making it's initial release a fustercluck) is that big media got to Microsoft.

Vista, 7, and 8 have end-to-end DRM encryption support, required for logo compliance with Blu-ray, where the data comes out of the disc encrypted, and goes to the monitor encrypted. The DRM audio comes from Microsoft encrypted, and only comes out of your Zune's headphone jack unencrypted. This fundamentally broke the audio framework, digital audio workstations, video card drivers, imaging devices, etc, because none of these drivers or applications were previously written to prevent users from using data on their own computers.

Comment Re:Alternatives (Score 1) 242

Most don't change your IP address capriciously, but some do. Some ISPs, such as Centurylink DSL (Qwest) aggressively change IP with every DHCP renew or PPPoE session, specifically to frustrate users into paying more for a static IP address to run any kind of service that expects that a response should return to the same IP address a few minutes later.

This particular scumbag company has also tried to ace out other DSL Internet providers by limiting them to 7mbps while selling their own ISP service at 20mbps+.

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...