Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Apple makes money either way... (Score 1) 348

64 bit is no advantage on a device with less than 4 GB of non-upgradeable RAM.

Actually, there are several advantages. The most glaringly obvious is the fact that it has double the number of registers and that those registers double in size.

We are also changing over to ARM's redesigned version 8 of it's instruction set which adds several new types of instructions that previously didn't exist at all.

Also added is support for hardware based virtualization, as is seen on some Intel and AMD SKU's.

Comment iPhone 5 was difficult to manufacture (Score 4, Informative) 348

How quickly people seem to forget:

"The iPhone 5 is the most difficult device that Foxconn has ever assembled. To make it light and thin, the design is very complicated," said an anonymous company official to The Wall Street Journal. "It takes time to learn how to make this new device. Practice makes perfect. Our productivity has been improving day by day."

http://www.informationweek.com/mobility/smart-phones/foxconn-iphone-5-is-hard-to-make/240009249

If you want a device you can sell for 99 bucks on contract it needs to be easier to make.

Comment Re:He is not an expert... (Score 3, Interesting) 303

There is a standard feature made available by ARM called TrustZone which enables hardware based separation of a device's OS and apps from a trusted environment, including trusted peripherals such as biometric devices or storage devices.

It's been around for a while now and has also been adopted by AMD for their upcoming X86 chips.

Details here:

The security of the system is achieved by partitioning all of the SoC hardware and software resources so that they exist in one of two worlds - the Secure world for the security subsystem, and the Normal world for everything else. Hardware logic present in the TrustZone-enabled AMBA3 AXI bus fabric ensures that Normal world components do not access Secure world resources, enabling construction of a strong perimeter boundary between the two. A design that places the sensitive resources in the Secure world, and implements robust software running on the secure processor cores, can protect assets against many possible attacks, including those which are normally difficult to secure, such as passwords entered using a keyboard or touch-screen. By separating security sensitive peripherals through hardware, a designer can limit the number of sub-systems that need to go through security evaluation and therefore save costs when submitting a device for security certification.

http://www.arm.com/products/processors/technologies/trustzone.php?tab=Hardware+Architecture

So yes. ARM enables Apple to physically separate the operation of the biometric device and storage of encrypted biometric information in what Apple calls "secure enclave" storage where it is not available to the OS or to apps.

Comment Re:Yes, and? (Score 1) 237

Comment Get off my virtual lawn! (Score 4, Interesting) 154

You might want to listen to the guy who figured out how to pull this off without damaging the user's eyesight decades ago, Google.

TFA:

Google Glass and several similarly configured systems now in development suffer from another problem I learned about 30 years ago that arises from the basic asymmetry of their designs, in which the wearer views the display through only one eye. These systems all contain lenses that make the display appear to hover in space, farther away than it really is. That’s because the human eye can’t focus on something that’s only a couple of centimeters away, so an optical correction is needed. But what Google and other companies are doing—using fixed-focus lenses to make the display appear farther away—is not good.

Using lenses in this way forces one eye to remain focused at some set distance while the focus of the other eye shifts according to whatever the wearer is looking at, near or far. Doing this leads to severe eyestrain, which again can be harmful, especially to children.

Comment Re:Updates (Score 1) 587

When you buy a particular device, the hardware inside that device (e.g. SOC, Camera, Baseband) doesn't change. As long as Google doesn't change how the drivers interface with newer versions of the OS, the drivers for your particular device will continue to work.

For example, graphics card drivers for Windows 2000 worked fine in XP. Windows Vista introduced a new way to handle graphics drivers which required a driver update, but this new method is still used being used in Windows 7 and 8.

Comment Updates (Score 5, Interesting) 587

Until the Android ecosystem can handle an issue as basic as providing it's users with OS and security updates, Android is not ahead at all.

Over half of the Android devices out there are still running variants of version 2 of the OS and lower while the last three Android releases are version 4 and higher.

Android needs to be rearchitected so that carriers provide drivers for the hardware, while Google takes full responsibility for updates to the OS. This approach has been working with Windows for decades.

Comment Re:Macrumors shows $329 as the base price. (Score 4, Informative) 211

AC parent is correct.

One of the blogs with an inside source and a proven track record for nailing what is to come in recent Apple announcements, 9 to 5 Mac, has also come out and said the starting price will be $329.

Read for yourself.

Sadly, a $250 price point seems to be wishful thinking. Apple isn't going to pull a Google and sell things anywhere near break even.

Comment Re:Downgrade rights (Score 5, Interesting) 671

Actually, the opposite is true. This was possible before RTM, but Microsoft has removed this ability in the final code.

CNET reports that users of the recently-leaked RTM builds of Windows 8 and Windows Server 2012 have discovered that one of the tweaks Microsoft has made since the launch of the last public test build, Windows 8 Release Preview, centers on the boot process. Microsoft is reportedly now blocking users from bypassing the boxy Start screen, preventing them from booting straight into Desktop mode.

Previous test builds allowed Windows 8 users to create a shortcut that switches to the Windows 8 desktop. If the user didn't want to boot their machine into the tiled desktop UI (formerly known as Metro), they could simply schedule this shortcut to be activated immediately after logging into the user's account.

Rafael Rivera, coauthor of the forthcoming Windows 8 Secrets, has reportedly verified with RTM downloaders that Microsoft's block of the boot bypass is indeed in place. He also believes that Microsoft has blocked the ability for administrators to use Group Policy to allow users to bypass the tiled startup screen. That said, it seems that Microsoft is trying to keep the desktop of old out of sight, hoping users will simply grow accustomed to the new blocky era of Windows.

Slashdot Top Deals

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...