Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Senator files bill prohibiting phone calls on planes (bizjournals.com)

SonicSpike writes: U.S. Sen. Lamar Alexander today filed legislation to prohibit cell phone conversations on commercial flights.

The Federal Communications Commission is scheduled to hold a hearing today on a potential rule change, having recently eased restrictions on the use of other wireless devices during flights.

"When you stop and think about what we hear now in airport lobbies — babbling about last night's love life, next week's schedule, arguments with spouses — it's not hard to see why the FCC shouldn't allow cell phone conversations on airplanes," Alexander said in a news release. "The solution is simple: text messages, yes; conversations, no."

Submission + - The Tyranny of the Clouds (gluster.org)

porkrind writes: Cloud computing is a way for the technology "empire" to strike back at smaller end users and developers, taking away the rights and freedoms we won via the establishment of Open Source ecosystems. That they're using the very open source tools we helped create just makes it that much more painful. Now that we know that open source was never about innovation, what leverage do we have to bring about the open cloud? And what is the best way to project the four freedoms onto the cloud?

Submission + - Massive surge in Litecoin mining leads to graphics card shortage (extremetech.com) 1

Kenseilon writes: Extremetech reports(http://www.extremetech.com/computing/172381-massive-surge-in-litecoin-mining-leads-to-radeon-shortage) that the recent price hike of Litecoins has triggered yet another arms race for the *coinminers out there, leading to a shortage of AMD graphics cards. While Bitcoin mining is quickly becoming unfeasible for GPU rigs with general purpose graphics cards, there are several alternative currencies with opportunities. The primary candidate is now Litecoin, which has the aim of 'being silver if Bitcoin is gold'

Swedish Tech site Sweclockers also reports(http://www.sweclockers.com/nyhet/18015-kryptovalutor-hojer-efterfragan-pa-amd-baserade-grafikkort) that GPU manufacturer Club3D have told them that miners are becoming a new important group of potential customers. However, concerns are being raised that this is a temporary boom that may hurt AMD in the long run since gamers, their core consumer group, may not be able to acquire the cards and instead opt for Nvidia.

Comment Re:Human-like? (Score 2) 238

If you are questioning the Bible then you already assume that it is the work of men.
Even if it is not the literal Word of God it can still have value as a source of the knowledge and beliefs of the men who wrote it long ago. And they will naturally have different viewpoints since it is not the work of one singular author, but written by many at different times.

Comment Re:Already considering uninstalling firefox (Score 1) 362

And what is the problem. If your banks are braindamaged and use an applet, you have to generally authorize them to use that piece of shit Java *once*.

My bank have BankID in sweden, but for me it's installed like a plugin in the browser (it took forever for them to make it even compatible with firefox >4). That plugin calls a standalone application, probably still java but the browser dont get to know that.

Anyway, generally warning people before loading any java applet: "This plugin is insecure" is great.

You may not like the GUI, but java is not secure, you can't say that, it just is not that.

Is the standalone application compatible with Linux and Mac?
When I load an application from my bank I assume it is secure. If the bank itself is compromised then java is the least of my problems.
Requiring permission the first time I run it is ok, but once I have authorized my bank that should be enough.

Comment Re:Definitions (Score 3, Interesting) 395

If this should in any way be termed fair, an additional requirement should be that any attempt to classify a document to conceal a crime should be considered High Treason and be punished as such, Also any attempt to classify a document that does not require confidentiality should be considered Treason and punished as such.

Comment Re:Standard Procedure? (Score 1) 191

BB10 devices use ActiveSync to do mail pushes. Now it just goes over the standard 4g/3g networks like iPhones/Androids do. The only connection that I've seen be required to RIM servers is if you use their BES10 software and that's just for policies and suchlike.

OR if you connect to a POP3 email server. ActiveSync can do mail push by itself, POP3 cannot. If you have av device that gets push email from a POP3 server, some proxy will have had to have logged in for you,checked your email and then pushed it. No matter if you are using Android, iPhone or BlackBerry.

POP3 cannot push email.

Comment Re:Wow ... (Score 1) 191

They then use a very efficient communications mechanism (SMS) to tell your phone that new email has arrived and the phone wakes up and establishes a connection to RIM (all BB traffic is routed through RIM, including BES) and transfers the new data.

What you are describing is called poke-and-grab. BB Push is even more efficient.
The message is sent directly to the device without any preceding SMS to wake up. The message itself is the wake-up.

Comment Re:I thought it was designed that way. (Score 1) 191

I've read all the comments on this thread (at time of posting) and this is the FIRST commenter that actually understands what the problem actually is.

For BB10 devices:

[BB10] <---> [Your-Exchange-Server-via-ActiveSync]

For nonBB10 devices with BES or BIS:

[BBxx] <---> [RIMs Email Proxies] <---> [Your Email Provider]

So, yes, if BB10s are sending email creds to RIM, then that's huge fuckup.

My guess is, someone forgot to comment out that lump of code when they switched to ActiveSync support.

-Jar

BB10 supports POP3 as well as ActiveSync.
POP3 works the same way it always have.
For push to work with POP3 the RIM server has to log in to the POP3 server and collect the mail for you before pushing it to the device.

Comment An innocent wrongly convicted (Score 1) 768

An innocent man is on trial for a murder he did not commit.
He is forced to testify and is asked both "did you commit the murder?" and "where did you hide the body?"
Being innocent he cannot answer where the body is and when convicted for the murder he is also given an additional sentence for not disclosing the whereabouts of the body.
With the fifth he would not be expected to answer nor punished for not telling.

Comment Re:They're taking the right approach (Score 1) 171

As posted above, Android 4.2 has exactly that. You can log in into your phone as two different users and have work and play perfectly separated.

So you can set up one user account for remote wipe while the other remains untouched?
BB Balance isn''t user accounts but closer to running two instances of Android in a VM.

Comment Re:Patience (Score 1) 171

You never had to restart it to get a device working again? No pushing of service books and in general it being a pain in the ass?

In my company the BES has uptimes measured in months. Pushing service books almost never, except where the user has really messed up hvis phone.
Could it be that BES for Domino is more stable than BES for Exchange?

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...