Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Firefox

Submission + - Drawing Sprites: Canvas 2D vs. WebGL (blogspot.com)

An anonymous reader writes: Mozilla developer Jeff Muizelaar has ported Microsoft's FishIE Tank benchmark to WebGL in order to compare the performance of Canvas 2D and WebGL. He writes, 'Lately I've seen a lot of graphics benchmarks that basically just test image blitting/sprite performance. These include Flying Images, FishIE, Speed Reading and JSGameBench. They all try to draw a bunch of images in a short amount of time. They mostly use two techniques: positioned images or canvas' drawImage. Neither of these methods is particularly well suited to this task. Positioned images have typically been used for document layout and the Canvas 2D API was designed as a JavaScript binding to CoreGraphics which owes most of its design to Postscript. Neither were designed for high performance interactive graphics. However, OpenGL, and its web counterpart WebGL, was designed for exactly this.'

Comment Re:And it's fucking irritating (Score 1) 321

YI have a choice to not watch.

You do... for now. I fear the day when people track our purchases closely enough to notice when we aren't buying DVDs or cable. It's a small logical jump to come to the conclusion that because we are not buying we must (obviously) be torrenting, instead. The jackboots will then be dispatched forthwith. Think it can't happen?

It won't happen as long as they're selling books.

Oh, damn.

Comment Re:Portability, not security (Score 1) 197

I'm not. Anyone familiar with medical records and computer security issues considers the security portions of HIPAA a joke.

The primary reason is that medical records are pretty much universally kept on MS Windows systems.

I guess I was lucky. Most of the medical software I've worked on has run on CentOS or RHEL systems.

There are several reasons why this makes data security a joke. The main one has been discussed here at /. several times: Windows has an automatic update feature, which you can turn off for "application" level software. However, it can't be turned off for "system" level software. MS has admitted that this has been true since XP. Their excuse is that kernel security issues are taken seriously, and updates are mandatory.

However, if you think about this for a few seconds, it obviously means that any time your Windows system is connected to the Internet, MS can silently install any new software they like. If your machine isn't reporting the contents of selected files to a .microsoft.com site now, it could be by the time you read this, and unless you're a real Windows security guru, you'd never suspect.

So if you're running Windows, you must assume that anyone who has "socially engineered" a connection at MS has access to all of your data.

And, less you think this is all spurious, you might look around in the records of the internet back in the 1990s when MS was first supplying systems with internet access. There are multiple reports of people getting curious about why their modem's lights were flickering when the machine was idle. Attaching a line monitor showed that the traffic was a list of the contents of the disk, being sent to a .microsoft.com address. The server on the other end could obviously also ask for the contents of files. This was ignored by the media and most managers, but it was noticed by the geeks among us with even minimal understanding of network security. Similar behavior has been reported for most releases of Windows.

This all has obvious application to HIPAA rules. My wife has worked with medical data for several decades now, at several employers. Every one of them worked exclusively on Windows systems. She has a Windows partition on her Mac "for work", and uses it a lot. She also has a work-supplied take-home Windows laptop. It's true that they use VPN to connect to the office computer systems. But this does nothing for the above issues. Since her Windows partition and laptop are connected to our home network, VPN just supplies an internet connection to her office machines, so their "silent upgrade" feature can work any time she's connected. This shoots down any claims that her office is protected from malicious sites (such as microsoft's ;-) by VPN. We've verified that both her Windows systems can easily access .microsoft.com web sites while connected via VPN, showing that there is a data path for MS's silent update software to work.

This is hardly a secret. We've discussed it here on /., and it's been discussed in lots of other forums. Microsoft has a clear and obvious silent path to any medical data stored on their systems, any time they have an internet connection, which is almost all medical systems in the US. Anyone who can bribe the right people at MS also has such access.

So the fact that HIPAA rules don't forbid the use of MS Windows makes those rules a joke. I'd bet that many medical records people understand all this. It should be no surprise that they treat HIPAA data security as a joke.

Oh, that's actually pretty simple. Block Microsoft's sites via firewall rules (not on a per-machine basis, that would be silly, but at the point of entry). You can still have machines outside of the network download all the security updates that a machine might need, put them on a DVD, and make that available to the workstations (via IT reps or whatever), but this way you control the flow of data.

It's interesting to consider non-MS systems in this light. Fully open-source systems are probably immune to such problems, since they'd be exposed fairly quickly. Apple systems are about half open-source, but most of the kernel and the UI have hidden source. Apple systems haven't been documented to have any behavior like those described above, so there's a good chance that such backdoors don't exist on Macs. But we can't prove this, because we aren't permitted access to the low-level source. Macs apparently don't do silent updates, but we can't prove that, either. Is there a way to either expose such backdoors or prove they don't exist on Macs?

Sure. Route the Mac's traffic through a device that's capable of inspecting the network traffic. If you don't have a decent router handy, any old box with a live linux distro would do.

Comment Re:ISP (Score 1) 551

how do I test software for IPv6 compatibility without any IPv6 connections? That would be like coding for Y2K compliance and never setting the clock on your test machine to anything after 1975

Well, Linux has been able to act as a router for a very long time; the same can be said about its ability to handle IPv6. So, to answer your question, you just have a section in your test suite that checks the software's ability to work with IPv6, just like you should have a section that tests handling IPv4 connections. With virtual interfaces, one doesn't even need to have multiple machines or network cards.

Comment Re:Performance (Score 1) 450

Why does EVERY FOSS guy think it is about Windows and Office? Hint: It is NEVER about Windows and Office, it is about all those funky ass "mission critical" apps that do not run on Linux full stop. From the charting and accounting software, to the payroll apps, damned near everything in most business will NOT run on Linux, and a good 80% of them I'd say have NO equivalent on Linux.

[...]

So in conclusion while I'm sure it'd be nice for Linux adoption if all people did at work was use a browser or make documents, but that is rarely the case. It is all those OTHER apps that are used every single day that bite you in the ass, NOT Windows and Office.

QFT. You can make your X desktop look and feel like Windows, and you can install Open Office, Firefox, Chrome, etc, but good luck with the little vb6 app (of unknown origin, whose last known maintainer only speaks broken Swahili) that the entire company depends upon to run their day to day operations. But don't feel bad, because that same app has kept them from upgrading their Windows 2000 boxen to XP (let alone Windows 7) long before they ever heard of a "Lunix". (:

Businesses

Pay What You Want — a Sustainable Business Model? 133

revealingheart writes "As 2010 comes to a close, it could be remembered as the year pay-what-you-want pricing reached the mainstream. Along with the two Humble Indie Bundles, YAWMA offer a game and music bundle, and Rock, Paper and Shotgun reports on the curiously named Bundle of Wrong, made to help fund a developer who contracted pneumonia. More examples include when Reddit briefly let their users donate an amount of their choosing for upgraded accounts when they were having financial difficulties; the Indie Music Cancer Drive launched Songs for the Cure for cancer research; and Mavaru launched an online store where users can buy albums for any amount. Can pay-what-you-want become a sustainable mainstream business model? Or is it destined to be a continued experiment for smaller groups?"
The Internet

Chile First To Approve Net Neutrality Law 293

Sir Mal Fet writes "Chile has become the first country in the world to approve, by 100 votes in favor and one abstention, a law guaranteeing net neutrality (Google translation; Spanish original). The law states [submitter's translation]: 'No [ISP] can block, interfere with, discriminate, hinder, nor restrict the right of any Internet user of using, send, receive or offer any content, application, or legitimate service through the Internet, as well as any activity or legitimate use conducted through the Internet.' The law also has articles that force ISPs to provide parental control tools, clarify contracts, guarantee users' privacy and safety when surfing, and forbids them to restrict any liberty whatsoever. This is a major advance in the legislation of the country regarding the Web, when until last year almost anything that was performed online was considered illegal."
Crime

More Gas Station Credit-Card Skimmers 251

coondoggie notes a Network World piece on credit-card skimmers found installed in gas pumps, this time in Florida. Like the similar wave of attacks in Utah earlier this year, the latest crop uses Bluetooth to transmit the illicitly collected data. Does this mean an accomplice has to hang around within 3m of the pump? "The Secret Service has indicated there's a crime wave throughout the Southeast involving the gas-station pump card skimmers, and it may be traced back to a single gang that may be working out of Miami... St. Johns County in Florida has also been hit by the gas-pump card skimmers. [A local sheriff's department spokesman] says criminals wanting to hide the credit-card skimmers in gas pumps have to have a key to the pump, but in some cases a single key will serve to get into many gas pumps." Here's an insight from the banking industry on the skimming fraud.

Comment Re:move to india (Score 1) 484

I noticed 2 things in this thread:
1. Several people got candid answers from Dell, and several got the run around.
2. The ones that got the run around were the ones that spoke to India.

This may have something to do with the fact that, in the US, many of the tech support reps are simply "doing their time". Unless they're really, really new, they don't give three shits about their job, and if a) they're at least moderately intelligent and b) happen to be speaking with someone who's at least moderately intelligent and the client is c) if not polite, then at least realistic, the rep will be quite forthcoming and helpful. This is sometimes to the detriment of the company that they work for - I consider this to be proof that karma (ENTERPRISE EDITION(TM)®!) does affect companies.

Or it might simply have something to do with my own, admittedly anecdotal, experiences.

Graphics

GIMP Resynth vs. Photoshop Content Aware 269

aylons writes "Just after Adobe released videos showing off the content-aware feature of Photoshop CS5, the GIMP community answered by showing the resynthesizer plugin, which has been available for some time and can do a similar job. However, are they really comparable? (In original Portuguese, but really, the images are pretty much self-explaining.) Compare them side by side removing the same objects from different kinds of images. Results do vary, but the most interesting part may be seeing the different results and trying to understand the logic of each algorithm."

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...