Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Umm no (Score 1) 158

The combined T-Sprint will have to maintain both CDMA and GSM networks for some time. I hope that the tower hardware costs have dropped and dual CDMA/GSM hardware is available. I bet there will also be significant frequency waste.

Both carriers are dragging along a wagonload of MVNOs, so customers of several other companies will see migration impacts.

Verizon is dumping CDMA for their own customers, but keeping it for the MVNOs. This will become more problematic, as Android is dropping support for CDMA, so everything on the Sprint side is going to get a bad case of bitrot.

Comment Consider Swype (Score 1) 711

Because a Cyanogenmod user was able to monitor this application, it was discovered that Swype was requesting location data several thousand times per day.

The vendor responded with a reasonable explanation.

In any case, if you run an Apple device, you will never know if your vendor begins doing such things, either for innocuous reasons, or otherwise.

p.s. You can now buy phones loaded with Cyanogenmod as the native OS.

Comment Except... (Score 1) 76

...that such a planet would likely be tidally locked, with one side always facing the star. There would be extreme differences of temperature between the night and day sides, and life might only be sustainable in the never-moving twilight region, depending upon atmosphere convection.

Comment Android phones are also more secure. (Score 5, Insightful) 711

And this conclusion has been peer reviewed. With Cyanogenmod, you even get a line-item veto (privacy guard).

Malicious software has appeared in the iTunes store. Android, in contrast, displays everything that an application will need to access so that users can decide themselves whether to go ahead with an installation.

To compare these two security models, Han and co-workers identified 1,300 popular applications that work identically on both iOS and Android. These applications, such as Facebook, often access code libraries on smartphones called security-sensitive application programing interfaces (SS-APIs), which provide private user data or grant control over devices such as the camera.

The researchers found that 73% of iOS applications, especially advertising and analytical code, consistently accessed more SS-APIs than their counterparts on Android. Additionally, the SS-APIs invoked by iOS tended to be those providing access to sensitive resources such as user contacts.

The results imply that by allowing users to control permissions, Android may be better at preventing stealthy applications from getting hold of private information. Notably, Android also intentionally avoids using SS-APIs if non-security-sensitive APIs can be used to achieve the same functions.

Comment The solution. (Score 2) 1198

The state should not have the power to sentence an individual to death, but death should be available to those who would choose it.

Our government should not kill. A maximum sentence of life in prison is all the force that it should be able to employ against any individual.

If a person sentenced to life does not wish to continue the sentence, then they should have the option to request an end to it. After suitable mental evaluation, and assuming they are resolute, they should have what they seek.

This brings morality and transparency into the process. This is the right thing to do.

Comment Proliant Nightmare (Score 2) 100

I deployed a DL380p Gen8 last year, and it gave me heart failure.

Under Red Hat, I needed to change the IP address, so I modified the file /etc/sysconfig/network-scripts/ifcfg-eth0 then did a "service network restart"

Alas, the box did not come up on the new IP. Got to the console which was blank and unresponsive. Power cycled, and the RAID array was GONE (and let's just say this was EXTREMELY inconvenient timing).

Support was able to walk us through some BIOS disk recovery that (thankfully) worked. But I'll never change the IP address on a Proliant without a full reboot.

Comment I can't say that I understand systemd... (Score 1) 360

...but it seems to be a key player in Project Atomic.

This seems to be Red Hat's analog of Solaris "Zones" which let you give root to someone you don't trust in an isolated sandbox on your system. It appears to go further than zones in that you can exchange these sandbox images, with all of their installed software, with other systems. This lets you virtualize without running multiple kernels, yeilding a tremendous savings of memory. The additional assertion is that 3rd party software sales will be of these complete sandbox images, not an RPM/tarfile.

I will have a bit of studying to do for Red Hat 7. These are compelling new features, seemingly well worth the initial bugs.

p.s. just don't pass debug to grub.

Slashdot Top Deals

If you have a procedure with 10 parameters, you probably missed some.

Working...