Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:interesting experiment (Score 5, Insightful) 202 202

"You can't steal what is given away, and the law says that if you leave stuff lying around on purpose, that you're in a grey area. Specifically, by leaving it on the side of the road without any sort of permit, you're littering"

And this my friends, is why it survived in canada and europe for months but NOT the usa for more than a few weeks.

You talk so much mr poo, that you give away the real truth with your comment without even realizing it. That is why it was damaged in america in short order, because americans think exactly like this comment.

Comment Obligatory bash.org (Score 3, Interesting) 687 687


That aside, just don't screw with things. You mention caps lock, which I don't use, but any change is likely to just screw with muscle memory and not have any practical benefit except as some symbolic gesture against caps lock. For example, see second gen X1 carbon which replaced caps lock with home and end keys.

There is also the troubling by the way mention of the right mouse button. For the love of god do not advocate screwing with the right mouse button. You don't often need it, but when you do, all the schemes that try to de-emphasize it's footprint really screw with you and again *nothing of value is gained*.

Comment Re:nice, but they remove your games if you update (Score 3, Informative) 57 57

The more troubling question is why an application should feel forced to do anything in the face of a platform upgrade in order to work at all. A modern Windows desktop can still run 10 year old software without a hiccup. Going back 20 years you start needing something like dosbox to use a lot of the applications, though still doable. I haven't tried firing it up in a while, but last time I tried the commercial package of quake 3 under linux, it still worked on a modern distribution. Same for linux neverwinter nights. As an application maintainer for some linux stuff, the only things that I can recall forcing my hand to change something for things to work were systemd and python changes.

Android (and to a significant, but somewhat lesser extent Apple) are not doing that good with respect to application and/or hardware compatibility into the past. It's a tiring situation for developers to have to follow an upgrade treadmill in order to cater to new system sales, just to keep the current applications workable as-is.


Air-Gapped Computer Hacked (Again) 80 80

An anonymous reader writes: Researchers from Ben Gurion University managed to extract GSM signals from air gapped computers using only a simple cellphone. According to Yuval Elovici, head of the University’s Cyber Security Research Center, the air gap exploit works because of the fundamental way that computers put out low levels of electromagnetic radiation. The attack requires both the targeted computer and the mobile phone to have malware installed on them. Once the malware has been installed on the targeted computer, the attack exploits the natural capabilities of each device to exfiltrate data using electromagnetic radiation.
The Internet

Secret Service Agents Stake Out the Ugliest Corners of the Internet 169 169

HughPickens.com writes: Josephine Wolff reports at The Atlantic that Secret Service Internet Threat Desk is a group of agents tasked with identifying and assessing online threats to the president and his family. The first part of this mission — finding threats — is in many ways made easier by the Internet: all you have to do is search! Pulling up every tweet which uses the words "Obama" and "assassinate" takes mere seconds, and the Secret Service has tried to make it easier for people to draw threats to its attention by setting up its own Twitter handle, @secretservice, for users to report threatening messages to. The difficulty is trying to figure out which ones should be taken seriously.

The Secret Service categorizes all threats, online and offline alike, into one of three categories. Class 3 threats are considered the most serious, and require agents to interview the individual who issued the threat and any acquaintances to determine whether that person really has the capability to carry out the threat. Class 2 threats are considered to be serious but issued by people incapable of actually follow up on their intentions, either because they are in jail or located at a great distance from the president. And Class 1 threats are those that may seem serious at first, but are determined not to be. The overall number of threats directed at the first family that require investigation has stayed relatively steady at about 10 per day — except for the period when Obama was first elected, when the Secret Service had to follow up on roughly 50 threats per day. "That includes threats on Twitter," says Ronald Kessler, author of In the President's Secret Service. "It makes no difference to [the Secret Service] how a threat is communicated. They can't take that chance of assuming that because it's on Twitter it's less serious."

Comment Re:What's the point? (Score 1) 216 216

1. I suggest looking at Xpra. It's married to X, but is far better than X or NX at seamless remote applications. It's also an example of exactly the sort of remote experience that *could* be done within a Wayland context. The problem obviously being I had to point out something married to X as an example, rather than knowing off hand something that pulls off the same in Wayland, but the concepts are pretty sound.

Comment Re:What's the point? (Score 1) 216 216

I suggest looking at xpra. X and even NX I didn't have a lot of fun with, but Xpra has treated me well. The kicker is that the Xpra strategy concept translates to an architecture like Wayland (it captures applications via compositor interface and contextual data through window manager calls).

I have to side with those that say X's inherent network protocols are less interesting. The unfortunate fact is that everyone then cites things like SPICE and typical RDP configurations and VNC, rather than something that achieves the same seamless behavior that the fans of X want.

Comment Re:What's the point? (Score 1) 216 216

Spice is pretty crappy (after really wanting to like it for a while). I hear rumor that RDP can be decent, but thus far I've not seen examples of it doing remote application access in a seamless way.

My personal example of how seamless remote applications can work well is Xpra. Despite it's current marriage to X, the strategy used does not use the 'remote' capabilities of X and the concept translates directly to something like Wayland. It intercepts things at the compositor layer rather than remote X calls.

Comment Re:This Brings Back Memories (Score 2) 85 85

everyone lost their 401Ks

I find this interesting. I know of people who strangely put a lot of their 401Ks into the stock of the company they work for, but mostly in my experience 401k investments aren't particularly tied to the company of employment. At least I make sure my investments are not particularly tied to any one company.

Comment Re:It's not worth it any more (Score 1) 84 84

Intel has had a process lead, but that's not the only reason they make abnormal margins.

- Lock in. AMD's the only viable x86 vendor and they've been off in the weeds after their glory days that culminated in x86-64 and NUMA x86 architecture
-Ecosystem. Intel invests heavily in things like compilers and standard libraries and so forth. They pay to have good software developers enrich an ecosystem that favors their processors
-Microarchitecture. They frankly have very good hardware engineers.

ARM came to prevail because Intel took their eye off the ball in the low power space. Recent Atom family designs have made a strong showing in that space (in part due to software developers creating remarkable ARM emulation, in part due to excellent hardware design, and in part due to the business call to compete at more typical (for the market) margin). The 'ARMs sip power' reality was (unreasonably) extrapolated to "they'd kick ass in the datacenter", but now studies are being done and the ARM server designs are losing both on raw performance and performance per watt to the Intel offering (e.g. one done by CERN did open power 8 v. aarch64 v. two x86 variants (atom and xeon e3) and the x86 variants won most everything (except POWER did SMT better than most, but even that fell apart most of the time).

"Mach was the greatest intellectual fraud in the last ten years." "What about X?" "I said `intellectual'." ;login, 9/1990