Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Outdated? (Score 1) 220

I don't think this is actually an issue though.

Most of the people I know who have phones using keypads and a 2-inch screen don't use them for browsing the web, and have no intention to do so.

If I'm building a mobile web application, I'm going to target the touch screen devices, because those are what people who actually use mobile phones to browse the web are using.

Comment Re:Outdated? (Score 2, Interesting) 220

Modern smartphones can handle just about anything you throw at them. The UI is the problem, since what works on a 22" widescreen monitor, with a keyboard and mouse, doesn't work on a 9" touchscreen.

We're not going to see alternative mobile UIs going away any time soon, and that in my opinion is a good thing. The desktop version will work if you really want all the features that it comes with, but it's not going to be the optimal way of using things.

Native mobile applications are also a big factor here, and are often a far better choice so long as you have the man power (or money) to produce them, since they give you a far more targetted UI, which can integrate with a phone's hardware features to provide something even smoother.

Comment Re:tomato (Score 1) 180

There aren't that many of them - certainly most of the web applications I've seen are checking for a session cookie, not checking what IP address you're coming from.

It's been requested a couple of times, but quite quickly disabled, because people coming in through proxies which use bonded lines aren't as rare as you might think, and people would keep getting their session dropped.

Comment Re:After reciving an e-mail that appeared... (Score 1) 360

Thus I'm not at all surprised that a non-technical member of the intelligence/law community could fall for a phishing e-mail.

The question is, why is someone that "non-technical" in charge of cybercrime for the FBI? I'm not asking that he be able to crack his way into anyone's computer, but it would be nice if he had a little awareness of these things.

Comment Re:hey, UK (Score 1) 359

There are parties other then the Tories who are "not Labour" - why do people insist on believing we're a two party state? If more people would use their votes for some of the smaller parties, maybe we'd actually see something useful happening in parliament, instead of two groups of people with more or less identical policies flinging shit around like monkeys.

Comment Re:That's OK... (Score 1) 582

Britain's typically have 35 or 37.5 hour weeks, often including lunch.

I wish we did! My contract states 40 hours a week, with an hour for lunch not counted in that time.

In practice lunch is 15 minutes to grab something to eat, and then back to my desk, and I rarely leave the office on time. We used to have reasonable hours, but those days are over.

Comment Re:Clarification (Score 4, Insightful) 100

Using the special URL, the old password is removed and a new one generated in its place with no confirmation required.

While you're right in saying the attacker can't access the admin's account, the admin themselves also can't access it, because their password has already been reset to something else, and they'll have to get the new one. It seems more like a minor inconvenience to me, then a massive bug which will end the world, but still a flaw.

Comment Re:What about bittorrent (Score 2, Insightful) 407

1) way cheaper (arn't they like 5 cents to make or something like that, being generous maybe even a whole dollar with the case)

You appear to be confusing the cost to produce the disk, and the cost to produce it's contents, and what you're in fact being asked to pay for.

Unless the DVD you buy is completely blank, it cost more then 5 cents to produce.

Comment Re:What's the issue here? (Score 2, Informative) 1016

this is far less of a moral grey area than downloading is.

No, you've got that backwards.

Downloading a game ISO has only one purpose. The playing of that game, without paying for it.

Modding an Xbox, as you say yourself, allows you to run XBMC on it. A legitimate use of the hardware, which harms nobody.

Comment Re:Outbreak of distros (Score 1) 121

This isn't really intended for people who want to make SuperAwesomeLinux 17, although it could certainly be used for that. It's target audience is software companies, and open source projects, who want to provide a quick and easy way to create virtual machines to run their software.

It's designed to get around the problem that to get your software into a company at the moment, you need to provide installation instructions, which may or may not work, and could take hours to follow. This is just what's needed to get anyone to *look at* your software. By providing virtual machines it becomes a lot simpler to get people to take a look at your software, because they just need to download it, and fire up VMWare or similar.

And then, when they want to put it into production, they can move the VM to their virtual servers (most large companies have them now, it's our standard method of deployment), and start it up.

That's me paraphrasing badly, if you want it from the horse's mouth, have a read of Nat Friedman's blog entry on the subject.

Slashdot Top Deals

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...