Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Ha, he should get a medal (Score 2, Insightful) 402

And this is a bad thing how? We've saved billions by having them make our.. nearly everything. It's about time to start working on getting on the same page with China. We'll have to start sliding a little more toward cooperation, they'll have to start sliding a little more toward competition. With any luck, we can sort of meet in the middle.

Comment Re:Ha, he should get a medal (Score 1) 402

Meanwhile elsewhere... Scientists in the Soviet and China replicate the exact same research for no other reason then that it's not available when they could instead be working on something more useful, like improving on it. Doh. People! Try to cooperate. Getting into space is hard enough as it is, try to forge some info-trade agreements. Perhaps GPL the bitch as a sign of good will - it's not like the US is using it for anything much now. Also, China does not give a good god damn if they lock up their spies. They're golden on people, maggoty with 'em, if you want one they'll give you a spare one just in case.

Comment Re:Signals little for Google et. al. (Score 1) 161

That was kind of my thought as well. Lots of interesting things coming out of China (legit) and they may feel it's time to start moving more people toward 100% legit designs. Kind of like coding the rest of proprietary code out of a project bit by bit until it's all open. They're essentially pulling a Japan - going from "low quality copies" to "high quality copies" to "high quality imitations" to "the people others imitate". Incidentally exactly what the US did when it began, but that was before electronics.
Bug

Microsoft Finally To Patch 17-Year-Old Bug 251

eldavojohn writes "Microsoft is due for a very large patch this month, in which five critical holes (that render Windows hijackable by an intruder) are due to be fixed, in addition to twenty other problems. The biggest change addresses a 17-year-old bug dating back to the days of DOS, discovered in January by their BFF Google. The patch should roll out February 9th."
First Person Shooters (Games)

Code Review of Doom For the iPhone 161

Developer Fabien Sanglard has written a code review for id Software's iPhone port of Doom. It's an interesting look into how the original 1993 game (which he also reviewed to understand its rendering process) was adapted to a modern platform. "Just like Wolfenstein 3D, Doom was rendering a screenframe pixel per pixel. The only way to do this on iPhone with an acceptable framerate would be to use CoreSurface/CoreSurface.h framework. But it is unfortunately restricted and using it would prevent distribution on the AppStore. The only solution is to use OpenGL, but this comes with a few challenges: Doom was faking 3D with a 2D map. OpenGL needs real 3D vertices. More than 3D vertices, OpenGL needs data to be sent as triangles (among other things because they are easy to rasterize). But Doom sectors were made of arbitrary forms. Doom 1993's perspective was also faked, it was actually closer to an orthogonal projection than a perspective projection. Doom was using VGA palette indexing to perform special effect (red for damage, silver for invulnerable...)."
Security

Submission + - Many Cybercrimes Go Unreported (net-security.org)

An anonymous reader writes: More than half of the 500 respondents of the 2010 CyberSecurity Watch Survey believe they are more prepared to prevent, detect, respond to or recover from a cybercrime incident compared to the previous year. However, only 56% of the participants have a plan for reporting and responding to a cybercrime. The public may not be aware of the number of incidents because 72% of the insider incidents are handled internally without legal action or the involvement of law enforcement. However, cybercrimes committed by insiders are often more costly and damaging than attacks from outside.
Privacy

Submission + - Tracking browsers without cookies or IP addresses? (eff.org) 1

Peter Eckersley writes: The EFF has launched a research project called Panopticlick, to determine whether seemingly innocuous browser configuration information (like User Agent strings, plugin versions and, fonts) may create unique fingerprints that allow web users to be tracked, even if they limit or delete cookies. Preliminary results indicate that the User Agent string alone has 10.5 bits of entropy, which means that for a typical Internet user, only one in about 1,500 (2 ^ 10.5) others will share their User Agent string.

If you visit Panopticlick, you can get an reading of how rare or unique your browser configuration is, as well as helping EFF to collect better data about this problem and how best to defend against it.

Comment Isn't that kind of the end goal? (Score 3, Interesting) 368

I use linux professionally. So does most of the web. We're "forced" to GPL any improvements we have to make in the process of getting the job done. "Forced" is in quotes because fair is fair - so did everyone else including those bat**** crazy people following Linus and Sallman who wrote the seeds that grew into this and frankly I feel I'm getting more then I could ever give (at best correcting the occasional bug). GPL is there so it's clear to the managers that if you have a problem with that, feel free to pay quite handsomely. It's cheaper to improve linux (and/or the rest of GNU) then it is to not use it. Epic score - that was the whole point all along, right?

Comment Split it (Score 1) 121

Split "censoring airwaves" and "managing frequency blocks". I know they sound similar, but when it was mostly about managing what went where in the spectrum, there was cred (sometimes grudging) from those transmitting. There was some hate, but kind of like hot rodders v highway cops. Censorship of what has already been let onto a frequency or spectrum gets no real respect - you have to pay for talent in full dollars with a little extra for the anti-cred you get for being involved in it. Split them into two parts (and then feel free to take the second out back and shoot it, but that's a pipe dream) and the people doing actual sorting of spectrum can perhaps get some talent that wouldn't touch F*CC with a ten foot pole.

Comment Re:Single person != single identity (Score 1) 239

Hell of a lot of it. If you want to be found, you can easily get your name (with perhaps a general location, like "John Random Loser, Iowa") to be the top google hit. Put everything you please on the page, including any phone numbers, addresses, GPS coordinates, etc. There you go - anyone who knows your name and perhaps some minor detail to tell you apart from namespace crashes can find out all of your contact info. But we don't do that, because of the people we'd prefer didn't find us. We'd like a degree of control over who gets what and a modicum of firewalls to limit damage when one of the IDs get found out by the wrong people and has to be abandoned.

Comment Re:But... (Score 1) 651

The same standard as everyone else sucks, including for everyone else. Figure out a standard that works. Fair price for innovation, fair price for production. Right now, neither is - the US isn't using Vaseline (TM) on how things are produced, but happy to complain about what IP get made. Equally, China, as much of the area, isn't that interested in paying obscene patent fees. And while anything is underground you might as well shove it underground all the way - products made at gunpoint and zero worry about what is legal. Go to your room. Both of you. No, really, STFU. I won't hear a word more until you both can behave like adults.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...