Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Puny humans no match for robohand. (Score 1) 225

Human deletes code. Robohand lose.

Robohand deletes human. Robohand always wins. DELETE! DELETE!

Source code isn't the issue here, the binary is already running!

At least you had the courtesy of being deleted and getting it over with, some people get the torture of being "Controlled, altered, and then deleted".

Comment Re:What would happen... (Score 1) 225

Nothing will happen as they both wait for the other to make the first move. Because that's how they cheat: wait for the human hand to make a move, and react to that.

Unless there were some vibration. With vibration, one would attempt to match the predicted outcome with the necessary winning hand, which would cause the other to adjust to the next winning hand, which would cause the other to adjust to the now-winning hand.

Motionless, it is a stable waiting game; but, the mechanics of the cheating mecanisim should become unstable with sufficent noise in a feedback loop.

In which case, the machine with the higher reliability would win, after the other blew a capacitor or melted a servo motor.

Comment Re:EU bailout (Score 1) 126

Uhhuh! Let's ponder this for a moment and then have a good laugh.

The logical consequence is that MS doesn't sell software in Europe anymore. Now, please name one at least halfway sizable company that can get around MS, be it because of OS or Office package. Sad as it may be, we're entirely dependent on that crap.

And MS knows that damn well, and they know the EU will not put the hammer down in this case.

Actually, out of all the applications you could have picked to make this argument sound, you picked the worst set of applications to support your point.

Operating Systems and Office packages are flooded markets with alternatives, and the alternatives are good enough that nobody has notice I haven't been using MS Word or MS Excel for the past eight years.

The real sticking points is the "business applications" which are cobbled together bits of code that generally aren't well maintained. Since they aren't well maintained, you have to put together a team to discover what the application really does, and then port it to a non-Microsoft library stack. Java had some good inroads with their JEE effort; however, they kept trying to improve (make the perfect framework) to the point that now people percieve JEE as an uncoordinated effort with a lot of false starts.

Comment Re:Props to Wooga (Score 1) 147

Making it open source is a pretty awesome move. They could have just sat on it for a while, or let the work go to waste.

One of the dirty secrets of open source giveaways is that often there are really good reasons why it was given away, like the quick fixes and workarounds for core problems have finally piled up so high that most changes for the remaining bugs brings the rest of the code down faster than a house of cards.

It doesn't always have to be this way, but Mozilla was this way (prior to the from scratch rendering engine rewrite that took years), as have a few games (Jagged Alilance comes to mind). Eventually a few projects do work their way out of the quagmire, but many die while in process.

On the other hand, some games are released in very good shape, so there is some hope. (I'm thinking of the Quake releases).

Comment Re:Movies (Score 1) 277

I've always thought an emotional purging was educational.

That's where you are wrong. You don't have to learn anything from an emotional outpour. You just get a sense of relief after it is done.

In fact, it would probably be safe to say you are less likely to learn something when experiencing an emotional outpur, but are more likely to do something about it. From my understanding, the only time that people are more likely to accept differing points of view are when they are personaly vulnerable; however, feeling vulnerable doesn't assure that the new point of view expressed is any better than the old one they had.

Comment Re:Movies (Score 1) 277

I don't give a damn. Anything that keeps money out of the military-industrial complex, no matter how insignificant, gets a wholehearted approval from me.

Do you also approve of income tax evasion? Because, compared to what the military-industrical complex is likely to get from the money that HP is likely to get from you in a year, that's peanuts to what you probably already pay in income taxes.

Comment Re:Don't Need the Help (Score 1) 565

Google is deathly afraid of the Kindle Fire. They were counting on the fact that people using Android wanted to be able to use the trademarked Android name and include the proprietary Google apps, which they charge money for. Anyone can release a hacked-up device without those, and while some people did, only Amazon has done so successfully. So successfully, in fact, that it's the best selling Android-based tablet and they can't even call it Android.

Look for Google to counter with a first or second party tablet in the near future. Expect them to push heavily on the proprietary Google services that you don't get on the Kindle Fire.

If they are afraid, that's great. We have had too many players enter the market place well, and then rest on their laurels. I like Google, but even if it is a favorite horse in the race, it still has to run.

Comment Re:*** Announcement project*** (Score 4, Insightful) 565

They don't have the margins to make big bold bets.

True, but that is in part due to not having the obsene amounts of cash that rolls in when a big bold bet pays off.

Apple has shown that there are so few people willing to make the bets, that they can safely win about 70% of the time. The payoff seems high enough to cover the few misses (AppleTV), which is why Apple is now has a market capitalization of twice Microsoft, fourteen times HP, and twentyeight times Dell.

HP and Dell made the obscene amounts of cash on big bold bets, that's how they came to be. The friuts of their prior successes, like all fruits, don't keep forever.

HP comes to market too slowly, and kills great products before the public can get excited about them. Dell has streamlined manufacturing and custom orderability enough that it is hard to imagine buying a computer without a Dell like experience.

The real question is, what has HP and Dell done lately?

Comment Re:UEFI SecureBoot is a catastrophy (Score 1) 393

My 24" Core 2 Duo iMac has EFI Boot. It didn't stop me from installing Linux Mint on it last month (full format & repartition of the hard drive, not as a "guest"). Can someone help me understand what's the difference?

Your EFI Boot doesn't have the "secure boot" option enabled. Perhaps it doesn't even have it implemented.

With secure boot enabled, the motherboard will check that the bootloader is signed, to assure that it is the bootloader that Apple shipped. To do this, it takes pre-stored keys in a ROM chip and compares them with the bootloader. Consider it a kind of checksum, designed to tell one of the origin of the software, not the integrity.

Booting a secure bootloader is silly unless you intend that bootloader to then check the signature of the operating system, and refuse to boot any non-signed operating system. So a secure bootloader is primarily wanted to assure that you boot an operating system who's origin is that of the operating system distributor (Apple in your case).

Right now, you happen to boot Linux on your machine; because, it has not been configured to boot only the verifiably non-modified operating systems. Linux distributors (Fedora) have obtained permission to use Microsoft's key to sign all of their bootloaders for $99 (one time payment). The decision to use a Microsoft key was due to the logistic problems they encountered when attempting to get their key into all of the motherboards manufactured (too many vendors, surely some of them would ship without a Fedora key). With the signed "Linux Bootloader", a EFI system with security enabled, will not reject the bootloader as non-authorized just after EFI does the hardware checks that are familiar to BIOS users.

The only reason this creates any kind of panic, is that in order to prevent pre-operating system rootkits (and there are a few in the wild now), most motherboards are expected to ship with the secure boot option of EFI on. The reason that Fedora opted to have their bootloader signed was to prevent their users from having to boot Windows to turn it off so that they could have a successful Fedora installed.

It has nothing to do with what Apple or Microsoft wants you to boot. That's just Linux FUD. It has to do with booting what was intended, and if you bought a iMAC, at least prior to the first boot, you wouldn't expect (or enjoy) it coming up with something that Apple didn't ship.

Comment Re:How much of the 'operating system' needs to sig (Score 1) 393

Secure boot is stupid because there is a much easier solution: Dont let the bootloader be modified from within the running OS. Require a reboot to a special mode (maintenance mode) or a boot-to-CD (for programs like truecrypt).

If the bootloader could not be modified from within the running OS, pray tell, how would one reconfigure it to boot anything else? Special mode is a "special" running OS, why wouldn't every OS that wants to modify the boot loader deem itself special?

Comment Re:The rootkit would just infect the kernel (Score 5, Interesting) 393

the bootloader can be configured to load a Linux kernel that chain-loads a compromised Windows kernel

That strikes me as an odd proposition.... The Windows kernel has a lot of requirements out of its bootloader. ...

While that may be true, GRUB has been booting Microsoft Windows for years now. It may have a lot of requirements, but obviously those requirements have been met.

What you might have forgotten is that boot loaders can simply call other boot loaders. It's call chaining, and it is exactly how GRUB boots Micorsoft Windows. You boot to GRUB, which might configure a thing or two (like hide Linux partitions), and then it boots NTLDR (or whatever the latest Microsoft loader is) and the Microsoft boot loader then satisfies all those requirements for the Microsoft Windows operating system.

It's absolutely possible, of course, but the sheer amount of hackery that is required to make it work is just mind boggling... at least to me. Can you link anything that explains your concept?

I won't link, but consider a mail forwarding service. They receive a letter, the might move it internally through a few mail boxes, and then eventually ship it out to you at your new address. What they don't know is that the new address could also be a mail forwarding service. Chaining two mail forwarding services together will still get the mail to the final destination address.

The above example pertains to boot loaders, except that you have the first boot loader set the environment to "boot something" which happens to not be an operating system (actually boot loaders can not differentiate between an OS and a boot loader, because at that level, there are just programs). Without the motherboard configured to only boot signed boot loaders, any number of intermediate boot loaders could be inserted which could then hijack the booting process, perhaps even to the point where they boot a pre-infected (by some means) operating system.

Hopefully this clears things up a bit. I know that boot loaders are only somewhat understood, even by those who use Linux quite a bit. I don't even pretend to be an expert, but it is clear to me that if you want to assure that a certain operating system is booted as it was delivered by the distributor, you need to control the entire boot process from power on to the kernel launch.

Linux's security model protects itself well post-kernel launch, but even Linux could be subverted by sloppy controls over the booting process.

Comment Re:How much of the 'operating system' needs to sig (Score 1) 393

The problem is that any bootloader capable of loading more than one (signed) kernel would defeat the purpose of secureboot.

Yes, it would defeat the purpose, because if the boot loader isn't signed, then you could replace the boot loader with one that didn't even worry about signed kernels.

I mean the official purpose, protection against rootkits, not the actual purpose.

The official purpose is to lock down a computer such that you can be assured that it boots off of the intended software. It is not only protection against rootkits, but that is one item it could help with.

The issue now is that there is no way to differentiate between approved software and unapproved software. Signing is an elegant, tried, and stable solution for identifying origin of software. However, signing requries that your keys are distributed with hardware that guarantees it will only work with binaries that can be unlocked with your keys.

Fedora attempted to distribute their keys to all the major motherboard manufacturers; however, even with positive feedback from the hardware manufacturers, it became clear to Fedora that they would not have their keys in every UEFI secure boot system. So they had to make a choice. Either one would need Microsoft Windows as a prerequisite to install Fedora (by launching to Windows and disabling the secure boot system), or they could use a $99 a lifetime key signing portal to sign their bootloader with a key that is guaranteed to be present (due to Microsoft's market presence) so UEFI could boot Fedora install media without launching Windows.

I think Fedora found the right solution, despite the fact that there is a horrible history with Microsoft. After all, the alternative is to require running Microsoft Windows to disable UEFI. Getting an installation boot loader signed once is far less intrusive than requiring a launch of Windows, I mean, you would have to buy a copy of Windows to install Fedora.

Of course, one might argue that PCs ship with the secure boot option of UEFI disabled by default. This still might happen; however, nearly everyone wants the shipped operating system to be the one that boots, so it is not clear how disabling secure boot would assure people that they are booting what they bought.

... not the actual purpose.

Allusion to a sinister purpose without even describing it is blatant fearmongering. There might be a ulterior motive, there might not be an ulterior motive. If you really suspect ulterior motives, have the balls to detail them.

If Microsoft didn't want any other operating system to boot, then they wouldn't even have offered the bootloader signing portal. If they didn't want Linux to boot, then they would have altered the terms of service to be incompatible with the legal protection structure surrounding Linux. They didn't do either, and their price seems so low that I wonder if the service is being offered "at cost".

Comment Re:You're kidding!?! (Score 2, Insightful) 234

They send untested multimillion dollar drones over to Yemen where they hand them to an untrained unit and expect them to just figure out how they work in the field?

Well, considering the targets dont shoot back they might just as well do the training in the field.

The idea that our military attacks peaceful targets that don't even bother to defend themselves is beyond ridiculous. You should be ashamed for insuinuating such. You are demeaning the job of the military, and belittling the risk they are taking on your behalf.

Whether you desire the military to be active in a particular location or not, give them the respect due to a person who is willing to follow out the wishes of our government, despite their personal feelings, in the hope that we do make the world a better place.

Comment Re:I found a good explanation (Score 5, Insightful) 629

Don't worry, this topic deserves about three more submissions before even Slashdot deems it not worthy of a repeat.

The electronics must be small, they mustn't be very heavy, and the must do something that is computationally expensive (signal isolation in a noisy background), combined with amplification, all in a custom fitting (to your ear) enclosure.

On the other hand, you have people stating that a mass marketed device which is identical for a run of over 11 million last quarter, with ability to use bigger (lower cost) components, bought in bulk (by the millions) is cheap, so this custom device should be too.

Basically they are expensive for all the reasons the article poster is ignoring, which reduces the article to "I want one cheaper, waahhhhaaahhh!!!"

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...