Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.


Forgot your password?

Comment: Re:God, what drivel ... (Score 0) 91

by bmajik (#48921453) Attached to: Latest Windows 10 Preview Build Brings Slew of Enhancements

You know, you're right. Nobody should ever try anything new with voice interaction. We should leave that shit off because its buggy or only knows how to do web searches based on bad guesses.

We shouldn't spend any time putting this stuff in front of users and learning what works well, what doesn't work, what people like, what they don't like. God forbid we try and see if there are ways to integrate it with how people currently use computers.

Instead, what we should do is wait until the 23rd century, when we have starships. Even though we've done no incremental work between now and then, in the distant future, voice recognition and natural language processing is just going to be really, really good, because The Future. It's just going to build itself, and when we are bald and say "COMPUTER" to our starship, its going to listen and then do exactly the right thing, and nobody is going to ask why the bridge has so many buttons and levers and consoles and shit if there is a ship-wide computer with unlimited power and perfect human voice recognition. And we're going to gloss right over how a near-Ai level of natural language understanding still needs us to say COMPUTER first before it figure out who we're talking to, as if anyone else on the bridge could execute the command we're asking when we're staring off into nowhere instead of at another human in the same room...

Anyway, I'm running 9926 on two machines - neither of which are touch-enabled. I've never talked to the thing yet. It appears to run faster than 8.0/8.1. The start menu behavior is better, and you can flip back and forth between little-menu-on-desktop or "big screen of metro" with a simple gesture.

The UI feels positively snappy. The paradigm has been reversed entirely from 8 - now, metro apps run on your desktop - instead of your desktop is some weird bad neighborhood nobody wants you to go to.

I think a lot of people will like Windows 10.

Comment: Incidentally... (Score 1) 46

by fuzzyfuzzyfungus (#48921447) Attached to: FCC Prohibits Blocking of Personal Wi-Fi Hotspots
What I find most baffling about the whole affair is how something that one would ordinarily think of as a fairly overtly malicious exploit, spoofing the appropriate management frames to break a network you don't have authenticated access to the configuration interface for, became a 'respectable' tool for 'management', even included out of the box in fancy commercial products from vendors with risk averse legal teams and so on.

This seems like the place where somebody who has been dealing with enterprise wireless gear long enough to have observed the change might be found. Did this 'feature' cross over from what was initially a proof of concept by a security researcher? Was it recognized as a possibility before the standards had even been hammered out and was available from day one? Do we know what vendor adopted it first? Were there any who specifically didn't offer it for legal, rather than technical, reasons?

At this point, it is certainly the case that at least some wireless management consoles adopt a very...possessive...tone, detecting 'rogue' APs, despite those APs being no more or less legitimate than any others, in terms of spectrum use, and offering 'containment' or various similarly clinical euphemisms for dealing with them. How, historically, did it come to be that this nasty DoS trick went all legitimate, even as generalized hacker hysteria can get you a stiff dose of CFAA charges for almost anything that involves a CLI and confuses the DA?

I'd love to have my hands on all the versions of various vendors' wireless management and administration packages, to see how this feature evolved over time. I can certainly see its appeal; but I find it hard to believe that nobody had serious doubts about its legality from time to time.

Comment: Re:grandmother reference (Score 1) 432

by vux984 (#48921331) Attached to: Ubisoft Revokes Digital Keys For Games Purchased Via Unauthorised Retailers

No. A refund is a return payment made from a merchant to a customer. Refunds are not made to third parties that were never part of the original business transaction.

Ok. Agreed. Ubi shouldn't owe them a 'refund'. But they are the party that owes restitution here.

The customer should seek restitution from the middleman that made the fraudulent charge.

"fraudulent charge" is a pretty strong charge to make. The keys were sold legally in Eastern Europe by buyers who then exported them legally elsewhere.

The only "contradiction" would be to what Ubi -wants-. That doesn't amount to fraud. It is not fraud to buy something in a price discriminated market, and legally export the product.

Europe is very economically diverse. Germany has nearly 4x the per-capita GDP as Poland, which happens to be right next door. What's affordable to someone in Germany is not necessarily affordable to someone in Poland.

My city is very economically diverse. Less than a mile away are people making a fraction of what is typical in my neighborhood. Yet we both pay the same price for milk, cars, and movie rentals.

I hear your argument, but I'm not sure what makes the line between germany and poland a magical line the free market dare not cross.

That bike rack that you mentioned above is purchased outright, whereas Ubisoft's games are licensed.

Semantics. I *purchased* a license. I don't pretend I have any special exceptional copyright ownership of the underlying intellectual property any more than when I purchase a copy of a book... but I did *purchase* a license. The store had a "buy" button, I pressed it. A one time transaction was completed. I know own a license. Its listed as one of my games. And I can click a link to my "purchase history".

  There's a principle in law... if it looks like a duck, and quacks like a duck, then its a duck. (You see this principle applied in other areas too like when corporations dress up their employees as "independent contractors" and the law sees right through it.)

Many leasing companies will not allow the lessee to take the vehicle out of the country without permission.

A lease agreement is a negotiated several page document that both parties sign multiple times over. Pretty sure that's not a better analogy for buying a video game.

Region locked game consoles are a good example of this. Outright revoking access to the service is crude, which is why many publishers are switching to language-locked editions. A high-priced English-French-German-Spanish-Italian edition on one side, and a cheap Polish edition on the other. This can negatively affected ex-pats that don't speak the native language, but that's a very small group.

Yup. I agree they can do stuff like this. But you can take a region locked game console to North America and play games purchased in that region for it. They don't get to show up your house with a hammer and smash your console.

or you agreed to the ToS and accept the consequences of breaking them.

Which terms of service did I any one agree to before buying the key that indicated UBI could revoke the game if they weren't from the country the key originated from?

I don't deny they exist... but I'd like to see them.

Comment: 802.11w (Score 1) 46

by iamacat (#48921303) Attached to: FCC Prohibits Blocking of Personal Wi-Fi Hotspots

FCC will not stop a moron staying in one of hotel rooms (or say appartments) sending disconnect packets to everyone around them. The only solution is to secure your network from trivial sabotage and applicable standards are readily available. Why waste time policing the hotel itself when every one of it's guests can do the same thing and worse?

Comment: Re:Good (Score 1) 46

by fuzzyfuzzyfungus (#48921261) Attached to: FCC Prohibits Blocking of Personal Wi-Fi Hotspots
Less likely. The FCC is pretty clearly within their powers in saying that you aren't allowed to intentionally interfere with other people's Part 15 devices by using your own to generate disruptive RF.

There is no obvious coverage for forbidding the sale of devices having a Part 15 radio component; but lacking a software configuration for providing network access to other devices with that device. They might be able to shove it into the conditions of a spectrum auction, and make it binding on the buyer; but it's more of an FTC problem.

Comment: Re:grandmother reference (Score 1) 432

by sjames (#48921231) Attached to: Ubisoft Revokes Digital Keys For Games Purchased Via Unauthorised Retailers

Really, the law hasn't caught up to this sort of thing. It's not really illegal, nor is it particularly legal. Part of the problem is that it would cost a lot to hash it out and there's just not enough money involved unless it becomes a class action. But as a general principle, if someone pays you for something, you're not allowed to take it back unilaterally.

I have been speaking more of the moral/ethical position of it (which is all we have given the ambiguity of the law).

Meanwhile, I have never seen a EULA that actually had anything to say about this situation . I doubt it could be claimed that this was clearly pointed out to the people who bought the game at any time, before or after the sale.

Comment: Re:Not really. (Score 2) 116

by ultranova (#48920775) Attached to: Gamma-ray Bursts May Explain Fermi's Paradox

First, us humans prefer killing each other to science. This is a proven fact.

Really? How did the arrangements for that experience go? Subject gets to choose between a test tube or a bound assistant and a (hopefully fake) knife?

Second, humanity did not go from Horses to Nukes, a very very small percent of the population did it, those geniuses have everyone else standing on their coat-tails.

A small part of the population did experiments on uranium, while the rest mined that uranium, enriched it, built the roads that carried it from the mine to the lab, etc. Accusing a tailor of riding on the coattails he made is rather absurd.

The next leap will be by a very small group that is significantly more enlightened than the rest of the 99.95% of the population. If those people are benevolent, then everyone enjoys the fruits. If they are not....... Well, things can go very differently.

The invention to trigger the next leap will be by some group that is supported by others, allowing them to focus on something besides where their next meal will come from. After it has been made, it will be turned into something actually usable by other people, manufactured by yet others, distributed by yet other people along communication and transfer infrastructure built by, you guessed it, other people...

Heroic fantasies are just that: fantasies.

WE do not glorify learning, but instead glorify morons that can carry a ball, or can sing a tune. And we Vilify in society those that do love learning and are very smart.

People respect people who can provide something useful, be it entertainment, a focus for a cultural bonding event, or a cure for cancer. If you aren't respected as much as you think you deserve, it's usually because you aren't doing anything to earn it. Merely being smart and learned is no more worthy of respect than being richr; it's what you're doing with it that earns - or doesn't - the respect.

Honestly Humanity is a joke, almost a cancer. And if an advanced civilization stumbled across us, they would probably wipe us out to make the rest of the universe safer. We as a species love to hate others, we love murder, war, and control. WE thrive on hating those that are different or think or worship different.

Humans, in general, love thinking they're better than someone else, since that's easier than self-improvement. Sometimes that manifests as merely dismissing the entire species as "riding on the coattails" of a special few ubermenschen, and sometimes the delusion reaches the point of wanting to get rid of some specific group of perceived parasites. Either way, it's bullshit.

+ - 'Super-secure' BlackPhone pwned by super-silly txt msg bug->

Submitted by mask.of.sanity
mask.of.sanity (1228908) writes "The maker of BlackPhone – a mobile marketed as offering unusually high levels of security – has patched a critical vulnerability that allows hackers to run malicious code on the handsets. Attackers need little more than a phone number to send a message that can compromise the devices via the Silent Text application.

The impact of the flaw is troubling because BlackPhone attracts what hackers see as high-value victims: those willing to invest AU$765 (£415, $630) in a phone that claims to put security above form and features may well have valuable calls and texts to hide from eavesdroppers."

Link to Original Source

Comment: Re:grandmother reference (Score 1) 432

You're falling into the trap of confusing ethics and the law. Whatever you -- or I, since I expect we'd agree -- think of the ethics of the situation, so far I haven't seen anything to suggest their actions in not respecting keys used other than under the conditions they were sold with is actually illegal. The law with respect to digital purchases, DRM, and remote access/activation schemes may be some anachronistic dinosaur, but if it's the law right now then complaining about the action on a forum like Slashdot isn't going to change that.

Comment: Why use a cable? (Score 2) 134

by fuzzyfuzzyfungus (#48920541) Attached to: Engineers Develop 'Ultrarope' For World's Highest Elevator
Does anyone know why they wouldn't sidestep the infeasibility of particularly long cable runs by having the elevator climb the walls of the shaft directly, rather than being raised and lowered on a cable? I imagine that a cable and counterweight arrangement is more energy efficient for shorter runs; but if that isn't an option wouldn't a cog railway style mechanism, with 'track' on one or more walls of the elevator shaft, result in a system where the weight that has to be moved doesn't change at all with the height of the building? There would be some additional weight per unit height from the track structure; but that would be static and connected to the building's frame rather than being forced to support its own weight.

Too energy intensive? Wears too quickly? Safety breaks infeasible leading to risk of sickening plummet to doom?

I think there's a world market for about five computers. -- attr. Thomas J. Watson (Chairman of the Board, IBM), 1943