Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:How long will you all put up with this shit? (Score 1) 458

'trash talk'? You don't provide any evidence for that, to be honest. They do know when and how long you use your system, that was proven last month. The telemetry data is analyzed and is far more intrusive than what you state. Bitlocker keys being uploaded to MS' cloud is another example.

I'm sure there are genuine reasons for all of that, the sad thing is that the data can also be easily abused for other purposes and we all know if it can be used for other purposes, it will be used for other purposes eventually. Data once given is never going to be deleted/removable ever again.

Comment LOL (Score 1) 358

> Entity Framework just makes anything in the Java space look outdated

Well, that statement right there illustrates you don't really know the actual details, do you? :) I write .NET ORMs for a living and have been doing that for a long long time, and EF would wish it was near the functionality and flexibility of a random JPA/JDO compatible java ORM.

Comment Re:for those wondering about the deepthroating (Score 1) 688

> Linus rightly called out the idea as moronic and stupid.

How professional of him (and you). Here's the thing: people put _their_ time into a project _he_ runs, effectively do work for him he otherwise has to do himself. He doesn't have to kiss the contributors' feet, but acting like a 3 year old stating "That's stupid!" is on the other side of that spectrum.

Comment Re:Rule # 1 of Forum Posting (Score 1) 370

I've used my real name from the start as a free software developer, Debian developer, and professional scientist and professional software developer; I've also been involved in some heated discussions in my more youthful days, but that's never been escalated into anything outside being flamed by someone. There's a tradeoff here, and I don't think being anonymous/pseudoanonymous is sufficiently beneficial to warrant it; there's a certain loss of trust in doing so, and it hasn't been a problem for me in the last 18 years of free software- and software development-related activity.

I know what you mean, I'm on the internet since '89 and used my real name on e.g. usenet too but you have to realize that today is different than back in the days on usenet and forums and IRC channels where flamewars were kept inside and seldom bled out to other areas, left alone real-life. There are certain areas where I don't use my real name (e.g. in areas that are gaming related) and that's simply because they can be hostile like we know from usenet, but at the same time they DO bleed to outside areas and can affect other aspects of your life, i.e. bleed into your professional life. Back in the days that was uncommon (if you were in a flame war with some people on some IRC channel, chances are if they contacted your work your boss would likely answer "IR what?"), but today it's not. The tools are there, and more than before the concept of 'identity' is different: it's no longer only your passport and the information in it, it's also your combined profile online of all the sites you frequently visit and leave your opinion. So it's best to be careful, e.g. not to use a real name in places which have nothing to do with where you're using your real name.

Comment Correction (Score 1) 318

SOME are installed in the enterprise edition too :( cleansing them now. I can't express in words how fucking mad I am about this at this point. I have to run windows because my dev work runs on windows, but if that wasn't the case I'd be on another platform already.

Comment Drivers (Score 2) 378

Most of the time problems with suspend/hibernation are related to drivers which aren't properly initializing after the memory is restored. the thing with hardware is that the state of the hardware has to be restored after suspend/hibernation to the point that the driver expects as the state. So if a driver isn't capable of restoring that state, it will likely cause some sort of trouble.

Comment Re:It's fine... from the ISO. (Score 1) 485

If you do that, the first thing it does is ask for an activation key. Your windows activation key from your original Windows media is likely to not be accepted. My 8.0 key wasn't.

Had the same thing. I found out that you have to use the same SKU type for windows 10 as your original OS. So if you had windows 7 home, you can't upgrade using the windows 10 pro iso, you need to install windows 10 home. Also, not every key seems to work. All my MSDN keys failed, and also a windows 7 pro key from my laptop failed with windows 10 pro installation in a VM, as that key was apparently an 'upgrade' key. Sigh. It's such a mess. As if they suddenly realized that giving away the OS for free to many would cost them anything so they tried everything to limit the amount of installs.

Comment Re:I'm surprised they missed "Wi-Fi Sense." (Score 1) 485

It's also enabled by default if you don't customize your installation settings

No, that's not the case. What's enabled by default is that you automatically use a shared connection from a friend if you happen to be in range of that connection. The sharing part, i.e. the action the friend has to perform on their WiFi connection, is not enabled by default. So if you connect with your WiFi hub with Windows 10, you're not automatically sharing _that_ connection with your contacts.

This is a confusing topic though. Because it isn't all rosy and great indeed. If a person decides to share their WiFi connection (which is still a manual, non default action), and that person's contacts have all accepted the default settings, they all can log into the WiFi hub when they're in range. If they do come over with their Windows 10 devices, they then download the (encrypted) key to the WiFi hub. From then on they can use the WiFi hub on their own. It's unclear what happens when the contact is 'unfriended' or the connection is no longer shared: is the key then also removed (by whom?) pro-actively so they can no longer use the WiFi? Also, that MS is used as a hub to distribute keys among devices which are in close range of each other is not OK.

What's especially not OK are the apologists who dismiss criticism on Windows 10's invasive privacy (or should I say: anti-privacy) features as overreactions.

I use windows systems now for a very long time and windows 10 (I installed it in a VM for testing usage for my software) was the first windows OS which made me feel uncomfortable: I no longer felt in control of what the OS does and what will happen if I do a given action besides the action itself (e.g. what data is tracked and sent to MS...).

Programming

Submission + - A turing machine build with Lego (legoturingmachine.org)

Otis_INF writes: To honor Alan Turing, two researchers at the CWI built a simple LEGO Turing Machine, to show everyone how simple a computer actually is. Primary goals were to make every operation as visible as possible and to make it using just a single LEGO MINDSTORMS NXT set.

Slashdot Top Deals

Save a little money each month and at the end of the year you'll be surprised at how little you have. -- Ernest Haskins

Working...