Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Progress (Score 1) 246

This certainly doesn't represent "a rolling back of the progress it made over the last fifty years". For the vast, vast majority of people performance/kw is more important than raw performance in a single core. If my process gets a core to itself instead of sharing one that's 10% faster, that's progress.

I'm sure there are applications out there that must be single threaded, but I'd be surprised if Intel stopped making hot, high performance cores for people in that boat. It's just going to be a niche market.

Comment Re:This is what real choice looks like (Score 1) 349

However, I'm unsure how useful it is to brick the phone rather than disable the fingerprint reader in question and force the user to enter their passcode they created

At first that seems a bit nicer for the user, but thinking longer term I think it makes a lot of sense to disable the device if it's detected it has been tampered with - I feel that's OK because of the ease of restoring the system from a backup, including the secure items in the keychain. If one bit of hardware has been compromised who knows what else was - why risk it? It just adds a lot of complexity around knowing the system is truly secure or not.

Comment The Asterisk solution (Score 1) 219

I've been thinking about running my own in-home PBX to deal with this, too.

Whitelisted numbers, friends, family, and businesses I want to talk to: Rings right through.

Numbers not on the whitelist: straight to voicemail, my phone does not ring, not even once. The voicemail says, "Hello?" a few times to see if anyone answers, then says "This is a recording, please leave a message" in order to (presumably) get the robo-calls routed to an actual agent.

Numbers on the blacklist: Forwarded to Lenny, or something very special I program myself. (I don't like that "Lenny" says "Yeah" and similar positive type words from time to time; those crooks might claim that was an agreement to get a subscription to The Wisdum of L. Ron Hubbard crammed onto my phone bill.) My ideal would be to sound perfectly normal, do some interpretation of what they're saying to actually address things they say, and do a "curious about the product but not agreeing to anything" act for as long as they stay on the phone.

On the top of the blacklist are those evil <redacted> who call six times simultaneously, so the phone rings a whole lot longer than normal before going to voicemail, and the Caller-ID announces their name six times. Bastards. This is the sort of thing that makes me yearn for the "Scanners" power to reach down the phone line telekinetically and set their computer on fire.

Bonus, custom voicemail messages for appropriate callers, white/non/blacklisted. Like "Hi, Mom, we're not home, call my cell."

Comment Re:Caller ID Blocker (Score 2) 219

I told the "Microsoft Tech Support" crook "But I don't have a computer."

That apparently wasn't in his script; it took a while for that to register.

My wife was about to bust up laughing. After I hung up, she said "You lied!".

I said "No, I didn't. I don't have *a* computer. I have *a bunch of* computers.

Comment This is what real choice looks like (Score 0) 349

Apple is not "getting away" with anything. They are actually being serious about security on the phone. I know this might be confusing because you are used to a world that just does the minimum possible to pretend to secure hardware and telling you it's actually secure...

This is what real choice looks like. People can buy an iPhone that is actually serious about security and may lock you out of data if you mess up the device. That's why backups are important... after all if anyone had an iCloud backup of their iPhone it wouldn't matter if the phone suddenly decided to lock you out, because you could get another device and it would be restored.

Or, people can say - I'd prefer not to be as serious about security, and buy an Android device. That is a valid choice also and I can see why others would make it. Please however do not think if that is your preference, that we should also want that same lower level of security to be default. I prefer for example my parents have this higher level of security and I just have to make sure that they have backups that are working, but at least I don't have to worry about malware or thieves stealing the farm as it were.

Comment Re:Happened to me (Score 1) 151

I bought my own cable modem, had been using it for over a year when I finally decided to return Comcast's modem. Took it down to their local office and had the customer service rep. check the modem back into inventory and remove the rental fee from my account before leaving. The first month after having it removed everything was fine, there was no rental fee billed, the 2nd month after it re-appeared on my bill and they tacked on an extra charge for the prior month as well as sent a separate mailing notice to inform me they had noticed there was no rental fee on my account and it must have been a billing error on their part but not to worry as they weren't going to charge a penalty, just 2 months worth of rental fees. In order to have the issue resolved I had to call customer service and have them "open an investigation" to check with the local office to verify they had received my old modem back.

I have a better story than yours. I purchased my own modem back when my local cable company was @Home. Comcast then bought @Home, and I upgraded and replaced my own modem for DOCSIS 2.0 and later DOCSIS 3.0.

Then last year, I get a letter from Comcast telling me that due to some error in their billing, I had somehow not been paying their modem rental fee - an error that they were now correcting.

After several calls to Comcast Customer Support, I was asked to provide the MAC address of my modem, so that Comcast could check it against their inventory. My modem was not in their inventory, so they agreed to remove the rental charge.

Two months later, the rental charge is back on the bill. I call customer support, and the lady insists that my modem belongs to them, and "proves" it by reading back the MAC address I provided to them two months earlier.

It took two more months, and escalating my complaint to the corporate office, to get everything fixed.

Comment Re:Allow me to quote... (Score 1) 571

Foreign governments have been hacking us pretty aggressively, including getting all the dirt on everyone who applied for secret clearance (where you list everything you could be blackmailed for). It seems quite likely they'd have read email on an unsecured server for anyone high profile, since that's so much easier (and let's not kid ourselves that Hillary is the only one doing this!).

The SAP documents include names of "NOC agents" - actual moles in foreign governments and whatnot. That's not the only kind of SAP documents, but it's a common reason for a doc to limit access so strictly. You die when you get outed.

Comment Re:Why so scared? (Score 1) 662

What sort of professional performer wouldn't want the majority of his audience to enjoy the show? He's saying that he's unwilling to change his style of performance to the point it's not his any more to achieve that - better to stay away. It's also quite valid to call out that that shouldn't be necessary - being so thin skinned isn't good for people - it makes them unhappier in life than they should be.

Comment Re:Freedom of Speech is the key. (Score 1) 662

I think there is a difference between ridiculing people for what they are and have no control over (skin color, sex etc.) and for the choices they make, like their choice of religion.

Many people think that. So fucking what? To paraphrase Carlin: if you find a comedian offensive, there's a volume knob and there's a channel knob. If you find a speech on campus likely to offend you, don't attend. If you want to prevent that speech because people will actually attend, then go fuck yourself.

Comment Re:You must be new here (Score 1) 1818

To my mind, AmiMoJo's posts are exactly the same in value and content as GNAA posts. But there's an objective difference: GNAA posts only get downmods, but AmiMoJo's post sadly get both up and down mods (it's an imperfect world). On that basis, keeping his posts visible would mean most people could stop browsing at -1 and the GNAA posts would in practice disappear.

If we leave it to any subjective judgement, controversial opinions look just like GNAA posts, but clearly they aren't and thus clearly we need some objective system to provide special handling of them.

Slashdot Top Deals

Save a little money each month and at the end of the year you'll be surprised at how little you have. -- Ernest Haskins