Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment This isn't Open Source, then (Score 3, Interesting) 85

I'll try to buck the trend here by skipping the derision and offering constructive advice. ;-)

A single license that gives users access to the code but limits the ability to redistribute the code and distribute patches to the "core" is what we'd prefer.

In this case, the closest match I can come up with off the top of my head is to apply the Microsoft Reference Source License to the source code.

This is not a Free/Libre or Open source license, because the constraints you are looking for are in direct conflict with the Open Source Definition, clauses 1 and 3; the Copyfree Standard Definition, clauses 1 and 3; and the Free Software Definition, freedoms 2 and 3.

Do you expect that if you were to permit redistribution of the core and modifications to it that others in the community would completely take over the project and continue its development without your business's involvement (a 'fork', in development jargon)? That would be the primary reason I can think of for such a restriction.

Comment Re:Manners please. (Score 1) 479

It's very easy to be curt and brusque in text, or at least be perceived that way. It's a learned skill to be able to do text chat support and not come off as being dismissive, put-off-ish, and/or plain rude.

Perhaps, for that very reason, many chat support representatives I've encountered instead err on the side of obsequiousness. Many take it too far, almost as if they're trying to trigger irrational rage responses, and others ring hollow with Eliza-like echo statements ("My frob won't womble." "I'm sorry to hear your frob won't womble.") - it wouldn't surprise me one bit if there was a pacifying-echo hotkey on their end.

Comment Old asshattery in new packaging (Score 2) 144

welcome to the internet of things, if you would argue as to what this "ass-hattery" has to do with IoT... then I present to you this "business model"

This form of asshattery is by no means limited to the "Internet of Things", or "Web 2.0", or "Social Media", or any other buzzword you might choose to throw out there. I'm not even certain it's restricted to Internet manifestations, though those are certainly the easiest and most prominent.

Submission + - Ext4 Corruption Bug Found in Linux

jones_supa writes: It seems that an Ext4 data corruption bug has slipped into Linux at some point. Josh Triplett warns about the issue in the Debian bug tracking system. His server machine already experienced major damage to the filesystem. A patch has already been created, which describes the situation as follows: "Currently it is possible to lose whole file system block worth of data when we hit the specific interaction with unwritten and delayed extents in status extent tree. [...] For now we can fix this by simply not allowing to set delayed status on written extent in the extent status tree. Also add WARN_ON() to make sure that we notice if this happens in the future." Consider applying the patch (or simply upgrading to Linux 4.0.3 which incorporates the patch) to prevent filesystem corruption.

Comment Re:No. (Score 1) 507

we the developers were the first ones to go "Woah there, Peaches".


There aren't so many gender-neutral horse names to choose from. You seem quick to judge - perhaps he alternates between fillies and stallions in his horse metaphors.

These discussions usually continue long after the horse is beaten to death - call it blunt metaphors trauma.

Comment Re:magic ingredient: perfluorooctyltriethoxysilane (Score 1) 87

This uses POTS, not FDTS, so there are ethoxy groups instead of chlorine atoms bound to the silicon. Still flammable, but POTS is innocuous enough that it's used to coat pigment particles in cosmetics.

I suspect even FDTS gets a lot less nasty once a coating settles in. R1-Si-Cl + H-O-R2 -> R1-Si-O-R2 + HCl, the HCl escapes as a gas and the rest stays put, covalently bonded to the surface.

Comment Re:512 should still be too high a bar... (Score 1) 89

MITM positioning is a prerequisite, but that's not hard if you run a Wi-Fi hotspot. This is a bid-down attack, tampering with initial negotiation to limit the cipher suite and strength to something more breakable without raising alarms.

If you can additionally prevent the use of PFS cipher suites so the 512 bit key is used for pre-master secret encipherment, you need only break the static 512-bit key once to read all the traffic protected by it.

Comment Re:Since when is AMT controversial? (Score 2) 179

Exactly. How is this materially different from an integrated remote-access card and baseboard management controller? I'm at a loss why Intel used an Argonaut core for it, though. I'd have expected a lightweight x86, or maybe an ARM. However, all that is beside the point.

The main reason for all the hullabaloo is that the Intel firmware that normally runs on this coprocessor is delivered as a closed-source blob, which raises trust issues given how pervasive its access to the machine is. It's also had its share of bugs and exploits, some of which work even if AMT is turned off in the BIOS, since the coprocessor may still be doing mundane baseboard tasks like fan control.

Comment Their drivers might be garbage, the silicon's OK (Score 4, Interesting) 160

AMD got the $6 billion to buy ATI by spending the cash reserves they had to build their next generation fab. The result is that after they bought ATI they had to sell their manufacturing operations sliding even further into irrelevance as their costs are much higher than Intel.

It's not like they don't actually have a sensible plan, though. While they might not be able to catch Intel in the short run on high-end CPUs, some of their newer APUs (some of them outright SoCs) are surprisingly efficient little beasts built for the low-power market segment: silent or fanless mini PCs, tablets, ultraportables, and an assortment of bespoke embedded gadgets. While the CPU side trails Intel's, on-die GCN soundly demolishes any integrated graphics Intel puts out there.

Comment Re:Nothing has been lost! (Score 1) 290

The is an infinite number that can be collected over an infinite amount of years... However at any particular point of time there is only a limited number available to be used. The the number cannot be dramatically increase or decrease with a sign of a pen.

The number of new coins issued with each block is cut in half every 210,000 blocks (approximately every four years), and summing from 1 to infinity over 1/(2**n) equals one, not infinity. The total circulation will asymptotically approach approximately 21 million.

Comment Re: Bitcoin != Coins (Score 2) 108

trading gold is nothing more than trading the energy consumed in mining it.

Gold comes from mines? I always believed it came from pawn shops and elderly relatives.

Well, the generation of that gold probably occurred in a process even more energy intensive than bitcoin mining, such as a very large star going out with a bang. After that it's just been transferred around.

"Free markets select for winning solutions." -- Eric S. Raymond