Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment The moral of this story? (Score 1) 430

FTS,
"The moral of this story seems to be that it is a bad idea to buy a game just before a major holiday."

Um, no the moral of this story is that DRM is beyond USELESS and only punishes the honest customers. I am sure that as usual the "pirates" are playing the game just fine.

Another moral to take away is don't give your money to people that want to treat you like a thief EVEN THOUGH YOU HAVE ALREADY GIVEN THEM MONEY.

Comment Re:Huge learning curve. (Score 1) 742

There is such a huge learning curve, there is simply no way for your average young developer to get into it. Some say that it's good that only older, more experienced people are getting into it. I would argue that when today's youth are older and more experienced, they still won't be working on it.

That's because the average reflects the lowering of standards. Average CS student 15-20 years ago was expected to do Pascal/Ada, C, a full-course on assembly (and not just a few weeks), Lisp/Prolog, create multi-threaded/multi-tasked applications from scratch (and if lucky to be at a good university, create a bootloader or mini-os or an embedded app from scratch as well) by the time of graduation. Some even were lucky to learn how to create primitive calculators with hardware in their computer org classes.

Average CS student now is expected to know how to create a dynamic web site in Java or whatever without ever having to learn how all of this shit works from the moment they press the "power on" button on their computers. Mind you, I do Java for a living, so it's not like I'm a C-enamored freshman bashing Java development for the heck of it.

So to say that the learning curve is too great for the average developer is just a reflection of the averages TODAY (and an indictment of our CS education nowadays.)

Comment The real work needed isn't in the kernel. (Score 2, Informative) 742

I'm a veteran Linux user but have moved to OSX some time ago, since it gives me the UNIX I need, and the GUI I so sorely crave.

BUT recently, I was trying to get someone's computer up and running, and Linux was the only thing that would install due to some bug or other, so I temporarily put an Ubuntu install on their computer. Decided it would be a nice experiment for a non power user, to see how well they could cope.

He hated it. He couldn't get flash going, so it wouldn't work with certain sites. He was having trouble doing basic navigation of the OS, and had no idea which programs really did what beyond the basic.

There were a host of other issues I can't really remember now, but it was a very frustrating experience for him, and he was very happy when he got his Windows 7 back.

I sat him down with my macbook and he seemed to figure out OSX handily.

The Kernel works well. The OS handles many things very well internally, but the overall user experience, while MUCH MUCH improved over how things used to be, just is not as easy to use as a Mac or Windows computer.

The real work needs to be done by UI designers with coders to support them. Even connecting to a wireless network can be a chore. God forbid a driver doesn't work or something along those lines and you need to open a terminal.

While you'd think the 'many eyeballs' thing would take care of something like that, it seems all these eyeballs and the heads behind them just want their OS to work, and for a non power user right now, I wouldn't call it ready.
Science

Why the First Cowboy To Draw Always Gets Shot 398

cremeglace writes "Have you ever noticed that the first cowboy to draw his gun in a Hollywood Western is invariably the one to get shot? Nobel-winning physicist Niels Bohr did, once arranging mock duels to test the validity of this cinematic curiosity. Researchers have now confirmed that people indeed move faster if they are reacting, rather than acting first."
Science

Why Time Flies By As You Get Older 252

Ant notes a piece up on WBUR Boston addressing theories to explain the universal human experience that time seems to pass faster as you get older. Here's the 9-minute audio (MP3). Several explanations are tried out: that brains lay down more information for novel experiences; that the "clock" for nerve impulses in aging brains runs slower; and that each interval of time represents a diminishing fraction of life as we age.

Submission + - Engadget blog turns comments off (engadget.com)

An anonymous reader writes: The Engadget blog has turned off the ability to comment on articles, claiming that "over the past few days the tone in comments has really gotten out of hand" and that "luckily, our commenting community makes up only a small percentage of our readership". In the last few days general disappointment on the quality of the articles and especially the continuous pointless references to the iPad surfaced in the "little commenting community", prompting a response introducing a filtering feature, which they say was being done "due to the overwhelming demand of 16 commenters". The discussion on the post has reached 900 comments, most of which not exactly enthusiastic about the solution and especially the way the commenters were being treated.
Earth

Researchers Pooh-Pooh Algae-Based Biofuel 238

Julie188 writes "Researchers from the University of Virginia have found that current algae biofuel production methods consume more energy, have higher greenhouse gas emissions and use more water than other biofuel sources, such as switchgrass, canola and corn. The researchers suggest these problems can be overcome by situating algae production ponds behind wastewater treatment facilities to capture phosphorous and nitrogen — essential algae nutrients that otherwise need to come from petroleum."

Comment Re:This isn't a bad thing. (Score 1) 274

Until such time as ISP's are able to uniquely identify WHO did it and not just "well this guy owns the house where the service is terminated", the other folks in the area can get their own internet access.

Until such time as ISP's are able to uniquely identify WHO did it and not just "well this guy owns the house where the service is terminated", prosecutors and plaintiffs should not be able to meet their burden of proof on such offences.

There. FYP.

Obligatory IANAL

Now, hmmm. Consider 2 situations:

Situation A
- Bad guy cracks your WPA / WEP key and uses your network to download copyrighted material.
- You are sued (civil case), and the burden of proof required is preponderence of the evidence / balance of probabilities.
- You live in a densely populated area where there are a large number of computer-unsophisticated users who regularly use somebody else's network because they left it open
- It is introduced into evidence that you secured your network to try to ensure that only you could use your network
- The only question of fact at trial is the identity of the infringer - your defense is that somebody else may have used your network to commit the act in question

Situation B
- Bad guy uses your open wireless network to download copyrighted material.
- You are sued (civil case), and the burden of proof required is preponderence of the evidence / balance of probabilities.
- You live in a densely populated area where there are a large number of computer-unsophisticated users who regularly use your network because you left it open
- The only question of fact at trial is the identity of the infringer - your defense is that somebody else may have used your network to commit the act in question

Do you feel that it is more likely that your defense (somebody else did it) is correct under Situation A or Situation B?
In a civil case, where allegations do not have to be proven beyond reasonable doubt, how do you feel this impacts a balance of probabilities test?

"Securing" your network could put you in a worse situation. DUCY?

Comment Ext JS good to learn and use (Score 1) 133

Our entire front end is ExtJS. This means MUCH EASIER porting a whole web app based (SIGH) on Grails to something less craptastic like Rails, Django, or anything else that is good at emitting JSON. It's not as easy to get started with... because you're starting with high-level widgets like controls, panels, and similar.

Comment Re:Not surprised (Score 1) 527

The people running dns servers are probably 0.000001% of internet users....

ummm... Okay... Only that's not what the story was talking about. The story was talking about a user using a different resolver from comcast, rather than their resolver. This has nothing to do with running a dns server. There are a number of reasons to want to use another resolver, including:

  • Security - Switching resolvers to OpenDNS was one of the suggested protection methods for Kaminsky's DNS flaw.
  • Avoid NXDOMAIN hijacking / forgery - All the net is not the web, and NXDOMAIN hijacking breaks everything except the web (and sometimes even breaks the web too).
  • Avoid outages - Outages that are caused by the provider's inability to achieve a simple task - keeping their caching name-servers up, while connectivity is still there, shouldn't cause an outage of your net access
  • Alternative DNS roots

the rest are probably just infected machines... is it simply to try to get a handle on worms and malware... If the cost from malware

Sorry... what does using a different resolver have to do with malware? Yeah. I thought so.

The question is *why* do they care about filtering DNS traffic?

The reasons I've heard advanced most frequently to encourage the use of the ISP's caching nameserver are:

  • Bandwidth - Though this will not impose a significant increase in bandwidth on the ISP, it can impose a somewhat larger load on the roots and TLDs. Though with the larger caching nameservers like OpenDNS this should not appreciably increase load
  • Ad revenue - See above on NXDOMAIN hijacking / forgery. This is an inappropriate business practice that breaks everything except web and often breaks the web too

This detracts from their profitability only one one of their lines of business - the one where you are the product.

Comment Re:Irresponsible headline, summary (Score 4, Insightful) 911

A well trained pilot would know when to trust the computers and when not to. They would also know how to maneuver and react in situations. It's like the pilot that landed his plane in the river after losing an engine to birds. I don't think a computer would have taken that option and not only would it have been likely that all the passengers would have been killed, but bystanders as the planes computer attempted to correct and eventually goes down in a populated street.

This comment looks sensible on the face of it, but I have to disagree with you. I have a pilot license and am familiar with the process of flying. I've never flown a fly-by-wire aircraft, but I've automated a radio broadcast desk - which might not look like it's relevant, but it taught me that "knowing when to trust the computer" is not an obvious state, not in a radio station and I seriously doubt in a cockpit.

For me the final "aha moment" came when the computer was attempting to tell me something useful, but because I was concentrating on a completely different aspect of interacting with it, I completely missed the information. In my case it caused a few seconds of dead air on a radio station, nothing life threatening, but not human obvious either.

The challenge is not "when to trust a computer and when not to" - the challenge is "how do you get the information that the computer is using to the human in such a way that they can manage that input stream in a timely fashion. Stick shakers are an example of making use of an extra input channel.

Accidents in planes are rarely just one thing going wrong, they generally are a whole string of things. A computer in the mix just exacerbates the issue.

Comment Re:SSL certs via DNS; trust is hard (Score 1) 94

In short, it's just some random operator on the 'net whose only real credential is they paid the fee needed to register a domain name (or SSL certificate).

I see. You are under the illusion that an SSL cert (ought to) assert(s) meatspace identity (or identity other than "one who controls domain xxx.com." Perhaps that identity assertions other than those contained in cn or altSubjectName ought to have some meaning. Kinda what EV intends to do... for corp's.

The real problem here is that "trust" is just a very hard problem. It's labor-intensive to establish trust. What should want? Two forms of ID? Credit references? Notarized forms? Personal appearance? Background check investigations?

You are mixing / begging the question on a few concepts here, including:
- granularity of identification
- strength of identification verification
- reputation

Perhaps if these concepts were dealt with in an orderly, separate manner, the question of trust would be more easy to quantify and address.

Now we're trusting a company -- whose interests aren't necessarily coincident with ours -- to authenticate others for us.

Trust but verify. They publish a statement with respect to the policies and procedures that they follow. They are audited to ensure they follow those policies and procedures. It is up to us (and the browser makers [?]) to ensure that those policies are sufficient for our purposes.

Comment Re:Yeah, that'll help (Score 2, Informative) 94

Please name such a CA which "happily hand over valid certs to anyone with a credit card" and does not "take reasonable measures to verify that the entity submitting the certificate signing request has registered the domain(s) referenced in the certificate or has been authorized by the domain registrant to act on the registrant's behalf" and which is trusted by the major browsers.

And then, perhaps, explain why you feel this is in _any_ way relevant to a discussion on DNSSEC.

Though, I suppose, this is Slashdot. Why post based on relevant facts rather than baseless, off-topic innuendo?

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...