Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:multi-stakeholder (Score 1) 297

It's single-stakeholder in the sense that it's an entirely political body, comprised of governments whose interests probably include tighter control of the Internet. I doubt they'd be any less tyrannical than the US with copyright enforcement, but they'd probably be more tyrannical with unpopular speech such as blasphemy, which is currently quite well protected by the 1st Amendment.

I'd rather see the Internet overseen by a neutral, international, non-profit, non-governmental organization headquartered in Switzerland, similar to the International Red Cross. I think such an organization could live up to those ideals.

Comment Re:Not Different Enough (Score 1) 66

That far outweighs the miniscule extra sales they'd get from the few people who'd actually care.

It's not about the sales to the few people who would flash their phones. However, it's those few people who will innovate and experiment and improve the platform, leading to many more sales down the road to ordinary consumers. We've already got three mobile platforms where the only innovation possible by outside developers is just to develop new apps within the constraints of the platform. A truly "new" phone would allow developers to innovate everywhere

Comment Not Different Enough (Score 3, Interesting) 66

They say they're trying to make something different from iPhone/Android/Windows, but this is disappointingly old and uninnovative thinking:

"The phone will be a smartphone for mass market. It will not be a tech phone intended for Linux hackers. Consumers are not able to hack the kernel or flash new software for the device."

They're right to be going straight for mass market (unlike OpenMoko), but why are they considering these mutually exclusive? What's wrong with letting people flash the device if they want to? The best way to get a new and innovative phone would be to make it truly open.

Comment Re:Giant Step Backwards (Score 1) 315

This is getting out hand.

First, X network transparency is not used just by sysadmins. At my university it's used every day by students who ssh into lab computers and run X software. They're not sysadmins. Many aren't even power users. They just know that if they ssh from their laptops (be it Mac OS X or Windows with an X server installed), they can simply run an app and it works. They don't care if it's slightly more smoothy drawn; they just want to get their work done. This guy's girlfriend (who doesn't even know what X is) X forwards Thunderbird from her desktop to her laptop. One of the libraries in the Australian Museum in Sydney has (or had, I haven't been there in a while) a row of thin clients which X forward web browsers from a server in some back room. These are real world examples of non-sysadmins using X forwarding.

But I don't really care if it's sysadmins or non-sysadmins using this. The fact is, the people behind Wayland are removing functionality from a very core part of a Linux system, largely so they can provide slightly prettier graphics. This is not a tradeoff that should be made for any feature, whether it's used by sysadmins, or scientists, or writers, or artists.

And it's not true that X will always be there. X is being kept around solely to help the transition. What do all these people do once apps start becoming Wayland-only?

Comment Re:Wayland vs X (Score 3, Informative) 315

I don't think running a VNC server bound to 127.0.0.1 with port forwarded through a ssh tunnel (ssh -L5900:localhost:5900) is much more complicated neither insecure.

Is this a joke? Here are some of the missing steps in the VNC "solution":

  • Starting the VNC server, with all the right arguments, on the remote end
  • Making sure applications on the remote end will display on the VNC server (e.g. setting your DISPLAY variable)
  • Starting the VNC client on the local end, with all the right arguments
  • Determining what port number to use - if there's another VNC server running already on 5900 (on either end) you would conflict - this would definitely happen in practice if you have ssh sessions to several systems open at once
  • Securing the VNC server against unauthorized access if there are other users on either the remote or the local end

Comment Giant Step Backwards (Score 5, Insightful) 315

One of the features that always distinguished X from other display systems like Mac and Windows has been network transparency. You can ssh to another Linux system, start an X application, and that X application will appear on the system you ssh'd from. This is immensely useful and evidence of a well-thought-out design, but it's an afterthought to Wayland. They say they might be able to render to a VNC server, but VNC works like crap and is full-desktop forwarding rather than individual window forwarding.

It's extremely ironic that when X was created in the 80s they recognized the importance of distributed systems and network transparency, but now it's 2012, the Internet and the cloud is king, yet network transparency isn't a core feature.

All this because you can't cross-fade when switching VTs in X or have a "rotating cube" animation (see "Is wayland replacing the X server").

Comment Re:Government Contract in Search of a Problem? (Score 5, Insightful) 329

Seriously. Who don't more people ask this? Check out the Wikipedia article Terrorism in Australia and notice not only the shortness of the article, but also the distinct lack of aviation attacks. It will only take one death from cancer caused by these body scanners and they will have caused more aviation deaths in Australia than terrorists.

Comment Very disappointing (Score 4, Informative) 329

This is very disappointing, especially after the EU passed strict body scanner regulations, which both banned X-ray scanners and required passengers be allowed to opt-out of non-X-ray scanners. Germany scrapped all body scanners, not just because of the health concerns, but because they actually don't work . I know someone who accidentally took his pocket knife through security and the body scanner didn't detect it. These things aren't making anyone safer: between the decreased effectiveness and the cancer risk, they're actually making flying more dangerous.
Iphone

Submission + - Huddl takes on GroupMe (huddl.me)

danielherdean writes: "You'd be interested to know of a new competitor on the market with a much different take on group messaging. Huddl just launched the other day and is like Instagram for groups. Huddl fills the gap between SMS and social networks like Facebook & Twitter and works with any mobile phone in the US, simplifying social group sharing.

In addition to providing similar messaging features as GroupMe, Huddl stands apart for two key reasons:

Open groups
- users can make their groups public to friends or private (like GroupMe)
- public groups make the app much more social and fun
- users can keep up with what their friends are doing by exploring their groups (called huddles).

Event groups
- users can create an event group by simply generating a QR code within the app
- event owner then posts the QR code and attendees can easily scan into group
- this is great for sharing photos and messages with friends at a concert, wedding or festival

Download the app at www.huddl.me."

Games

Submission + - San Francisco Opening Computer & Video Game Mu (telltalegames.com)

An anonymous reader writes: A team of game scholars, game journalists, and plain old geeks have gotten together to put together San Francisco's first and most comprehensive non-profit museum dedicated to the design, creation, history, and play of computer and video games.
The museum is currently raising funds and shopping around for a San Francisco space, but they've already managed to get some obscure relics — including the only copy in existence of 1984's never-released Atari Cabbage Patch Kids game. As a scholarly resource, the museum is also dedicated to making its entire collection playable by visitors

Security

Submission + - Convicted Terrorist Relied on Single Letter Cipher

Hugh Pickens writes writes: "The Register reports that the majority of the communications between convicted terrorist Rajib Karim and Bangladeshi Islamic activists were encrypted with a system which used Excel transposition tables which they invented themselves that used a single-letter substitution cipher invented by the ancient Greeks that had been used and described by Julius Caesar in 55BC. Despite urging by the Yemen-based al Qaida leader Anwar Al Anlaki, Karim rejected the use of a sophisticated code program called "Mujhaddin Secrets" which implements all the AES candidate cyphers, "because 'kaffirs', or non-believers, know about it so it must be less secure." "Tough communication interception laws [RIPA] were passed in the UK 10 years ago on the basis that they were needed to fight terrorism," says Duncan Campbell, who acted as an expert witness for the defense during the trial. "The level of cryptography they used was not even up to the standards of cryptology and cryptography in the Middle Ages, although they made it look pretty using Excel.""

Comment Re:Don't be evil? (Score 1) 671

1. A deeply intellectual corporate cultural, with 70% of its workforce having PhDs (I don't know if this is still true.) This includes the "20%" concept, whereby all Google staff is given free-reign to research what interests them 1 day out of 5. Google, to me, recalls the days of business-as-research-endeavor, the era of Xerox Parc and Bell Labs and the intellectual energy they represented.

You mean the Bell Labs which allowed their staff to do whatever interested them five days out of five? Sorry, there's no comparison. Google is business-to-make-money, not business-as-research.

Comment Re:Someone has high demands. (Score 3, Informative) 244

A few mailboxes (20 out of 200) had the wrong mail migrated into them. We don't even know the source of this problem yet, but the university could very well have TOLD Google to put sally.smith's e-mail into sally.jones' new mail box.

This isn't a google apps security problem. Please RTFA and get off your high horse.

No, why don't you RTFA and get off your high horse. According to an article linked from TFA, Google acknowledged the problem was on their end, and an earlier comment from a Brown sysadmin indicates that Google upgraded their migration tool right before this happened. It may have "only" been 20 out of 200 accounts, but the problem is squarely Google's fault; stop blaming the Brown sysadmins.

Comment Re:Someone has high demands. (Score 1) 244

My impression is that this incident is a fuckup at the customer end of things

No, according to this article, "The problem was on Google's end. They acknowledged a bug," and according to this comment, Google had upgraded their IMAP migration tool right before this happened.

Sounds like a case of insufficient testing on Google's part before rolling out the new version of their tool.

The Internet

Family's Christmas Photos Hawk Groceries In Prague 263

Hugh Pickens writes "The Telegraph reports that Jeff and Danielle Smith sent a photo of themselves with their two young children to family and friends as a Christmas card, and posted the image on her blog and a few social networking websites. Then, last month, a friend of the family was vacationing in the Czech Republic when he spotted a full size poster of the Missouri family's smiling faces in the window of a local supermarket in Prague, advertising a grocery delivery service. The friend snapped a few pictures and sent them to the Smiths, who were flabbergasted. Mario Bertuccio, who owns the Grazie store in Prague, admitted that he had found the photo online but thought it was computer-generated and promised to remove it, and 'We'll be happy to write an e-mail with our apology,' he says. Meanwhile Mrs. Smith has received 180,000 visitors and over 500 comments on her blog since she posted the story. She says she is glad the photo wasn't used in an unseemly manner. 'Interesting. Bizarre. Flattering, I suppose,' writes Mrs. Smith. 'But quite creepy.'"

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...