It's been this way for years. ATI/AMD support for Linux is unbelievably bad. nVidia support is basically perfect, with the exception of the open-source issue. In the past, I've bought a brand new (nVidia) video card, right after it was released, brought it home, and got it running under Linux, day 1, with no headaches. If you want decent Linux graphics, go nVidia.
Slashdot videos: Now with more Slashdot!
Another interesting one is Diamond Age (aka A Young Lady's Illustrated Primer). Pretty interesting book that introduces a lot of CS concepts (although also explicitly mentions CS).
That's actually the opposite of true. Many techniques (http://static.usenix.org/event/woot09/tech/full_papers/paleari.pdf, http://roberto.greyhats.it/pro..., http://honeynet.asu.edu/morphe..., http://www.symantec.com/avcent...) exist to identify the presence of a CPU emulator, because these things aren't (and will likely never be) perfect. Most of those techniques don't even rely on timing attacks. Once you introduce timing attacks (*especially* if there's an external source of time information), all bets are off.
This reads like an urban legend... Every field office got a copy, (seemingly) lots of employees were notified, but it's only public 30 years later? Hmm...
I'm glad people are out there thinking about this. As I understand it, though, there are a couple of drawbacks to this specific approach.
1. The unique identifier that now allows you to be tracked across each application you use. I guess this can be solved by having multiple IDs per app. You might want to consider this.
2. "Pay per authentication"...
3. Requirement for your phone to have connectivity. While this doesn't matter most of the time, it can be important when, for example, you're traveling abroad and don't have phone service.
4. You need to be a trusted party for your users. If you're compromised, the whole system is screwed.
Other approaches, such as Google Authenticator, provide 2FA without the requirements of connectivity, trackability, trust, or payment. The only advantage (and this is also quite a weakness) that I can see with your approach is that it's probably easier to replace a lost phone; just call you guys and have you reroute the passwords to a different app. The problem is that this opens the door to social engineering attacks (see #4).
I read that as "Spocks-as-a-Service". That'd be a waay cooler market.
Nvidia (no fucking way)
If you're enough of a dumbass to ignore the right solution (nVidia stuff *works*, binary blob or not, as opposed to ATI's, also binary-blob, braindead crap), you deserve to fail. Every media PC I've built has been nVidia; no problems on the graphics side.
You mean we're supposed to use a fork??
The movie was an atrocity.
The book series was *ok*. The first was was quite good, the second one was alright, and faced with the prospect of reading several more books in the series, I gave up and read the Wikipedia summary of the series. I don't feel that I missed out on anything.
What did the PfP program do that was so bad to mp3.com? Honestly curious.
So, off goes linux, on goes FreeBSD.
+1 Funny! Spit my coffee all over the keyboard!
Opera also came with a super awesome ad banner that took up the top 15% or so of your screen. Luckily, the other browsers neglected to steal that feature.
To be fair, the stupid ad bar was removed, but a lot of people were permanently dissuaded from using Opera because of it.
Portal 2 had an option for this for those that really want to try that out
This always happens to me when I'm typing on a phone -- the autocorrect will correct away properly spelled but obscure words into pretty much randomness.
But it's still quite funny
If this is upheld and catches on, it could have pretty horrid implications world-wide, especially with how willing people are to litigate against companies (such as Google) that are actually based in a different country but have presense in the litigator's country by virtue of internet access....