Forgot your password?
typodupeerror

Comment: Re:Central Cybernetics (Score 1) 146

by correnos (#34500174) Attached to: USDA Services Moving To the Microsoft Cloud

Computing goes in cycles, as always. There's nothing new about the concept. Now, stuff is moving online to server farms, since companies are able to manage resources most effectively. In another decade or so, things may start to come back to desktop computing. Maybe people will have small servers built into their routers that all devices will sync to, i don't know.

And if things do end up moving all the way to hosted solutions, with the standard being thin clients in every home, why would we bother with one in each city? Bandwidth's getting cheap enough now that we could go with two or three hubs to a continent and have that be our computers.

Comment: Re:Welcome to the Mozilla botnet ... (Score 1) 287

by correnos (#33182348) Attached to: Like Google's Chrome, Mozilla To Silently Update Firefox 4
In which case they could downgrade. I would at least hope that firefox will make that task somewhat easy. The thing to remember is that security/bugfix updates are (almost) always-you guessed it-fixing bugs and security holes. The better way to go IMO is to fix the problems you know and give a chance to revert in case the fix breaks some other untested thing.

Comment: Re:Welcome to the Mozilla botnet ... (Score 1) 287

by correnos (#33175072) Attached to: Like Google's Chrome, Mozilla To Silently Update Firefox 4
And how does seeing "This application has an update" allow you to magically deduce whether the update will be good or not? If you're decently tech savvy you'll probably just look and see if it is a major version, and if not just update and be done with it. If you're not, you'll hide the update in the corner and treat it like the devil, and maybe call your poor poor cousin to help you out. They already said that major updates will still ask for confirmation, and for security updates all parties are better off with auto updates. Unless you're a security auditing nazi, in which case you can disable the auto-update feature for yourself, no one's stopping you.

Comment: Re:silent, or totally invisible (Score 1) 287

by correnos (#33174932) Attached to: Like Google's Chrome, Mozilla To Silently Update Firefox 4
Packages are only slow to update if they are part of a lethargic/paranoid distribution Very little patching is generally involved. Packages are almost always designed to be installed to root, but you're right that it is possible to install it for single users. Using Arch, update times are hardly ever a problem.

Comment: Re:I love the wording in the above translation. (Score 2, Interesting) 293

by correnos (#32895078) Attached to: Chile First To Approve Net Neutrality Law
I have a linux machine at home running an ssh server. I like this, it allows a lot of flexibility in what I do anywhere. This constitutes a web server. I would also like to get a personal website running soon as a place to host projects. Does any of this make me a small business? No? That's right, and I shouldn't have to pay the fees of a small business customer for home use.

Comment: Re:Jury is still out (Score 0) 305

by correnos (#32887786) Attached to: Do Home Computers Help Or Hinder Education?
I think the big difference is that much more focus was given to training the teachers in OLPC, while in the NC study they tried (and failed) the fire-and-forget strategy. Computers are no more magical at improving learning than calculators, encyclopedias, or whatever tool you can attempt to hand out, let sit for a month and see what happens.

Comment: Re:Irresponsible (Score 0) 348

by correnos (#32534112) Attached to: Google Researcher Issues How-To On Attacking XP
How would this guy be responsible for the bug? Did he create it? Did he break into the M$ servers and implant the bug in the source code? If you want to be whiny and lump the blame on someone, find the coder who wrote the code with the bug. The Google employee is only being responsible and notifying the public about a standing security hole that needs to be protected against. Security through obscurity is no security at all.

For large values of one, one equals two, for small values of two.

Working...