Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Its a trap!! Dont do it! (Score 1) 340

Looks like it shares more than that. The source for the login button is:

<fb:login-button perms="user_likes,user_about_me,email,user_hometown,user_relationship_details,user_location,user_website,user_work_history" onlogin="oRRQ.login();">

The site has no legitimate need for all that info if it just wants to know that you're a real person.

Comment But is the data actually transmitted anywhere? (Score 5, Interesting) 322

In this video, the researcher is looking at debug logs from the phone itself, not network traffic logs showing remote communication. He clearly shows that keystrokes and URLs are being passed to the IQ software running on the phone, but presents no evidence that the data is actually sent to anything outside of the phone.

Has anyone determined what the IQ software does with all this information besides writing it to the debug logger? Is it actually sent somewhere, or saved to persistent storage on the phone? (I'm no Android expert, but I'm under the impression that debug messages are discarded when there's no debugger attached.)

Having this software running in the background is sneaky and certainly makes spying more possible than it would be otherwise, but it's not necessarily the huge immediate privacy violation that everyone seems to be assuming it is.

Comment Re:More proof opt-in is the ONLY way to do it righ (Score 1) 134

The article's suggestion of address hashes is kinda bogus, and especially dangerous if the hashed addresses are known to be customers. Assuming a spammer/phisher already has eleventy billion addresses, this is a hash collision attack. All the spammer has to do is hash their list and look for matches. Instant customer list.

That's the intended usage of the list of hashes: for each address that the marketer already has, they can determine whether it's the address of an existing customer so they can exclude it from the ad campaign. No technological measures can avoid the fact that if you want an advertiser to exclude your customers from an ad campaign, you have to give them a way to determine who your customers are. Only trust (and trustworthiness) can resolve that.

But hashing the list would at least prevent the marketer from learning new addresses that they didn't already know about, so it's better than giving them the raw list.

Comment There are special cameras for this (Score 1) 170

I don't know how timing is normally done for auto races, but I've been part of the staff at a few track & field events, such as the Nike Indoor Nationals, and seen how the timing is done there. There's a special camera that captures a single column of pixels, carefully aligned with the finish line, that records a rapid sequence of images whenever something changes in its field of view. The software assembles all these one-pixel-wide images into a single image whose horizontal axis is time rather than space. You can clearly see each runner, though arms and legs often look a little curved since they're moving as they pass through the plane of the finish line. In particular, the ID number tags worn by each runner are clearly visible.

Recognition isn't automatic, but it doesn't need to be. The operator just clicks on the front of each runner's shoulder (the part that "counts" for finishing the race) and reads the number from the runner's ID tag, and the time value associated with that column of pixels is recorded as that runner's finish time. So there's a human delay involved in matching the time measurements to the runners, but no human delay in the measurements themselves.

The company that did the timing at the races where I worked was CFPI Timing, and the tech page on their website has lots of details. Apparently the camera system I described is made by FinishLynx.

Comment Re:i dont get it (Score 1) 423

3D at the movies use polarized light, and each eye gets their usual 24fps. No flickering because there is no "black" in between each frame.

RealD uses polarized light, but through a single projector, running at 144fps, switching "sides" six times per (24fps) film frame. Your eyes see left-right-left-right-left-right for each still picture before moving on to the next.

Since each eye sees black while the other eye is seeing a picture, RealD does flicker. It's 144fps flicker, which most people don't notice, but some people are sensitive enough to be bothered by it.

Comment Re:I can't support the OP... (Score 1) 290

Patents protect inventions like McCoy's. Copyrights protect works of creative expression, such as books and music. They're two very different things.

Since a copyright protects only a specific expression (rather than an "idea"), a Tetris-like game shouldn't infringe Tetris copyrights unless the developer copied actual graphics, music, code, etc. from the original Tetris game. A patent on falling-block games, if one existed, would cover Tetris clones, but this isn't an allegation of patent infringement.

Comment Re:3D is lame (Score 1) 381

Is that true of IMAX as well? I was under the impression that IMAX is still mostly film-based, though it's been a few years since I've actually seen an IMAX projection system. (The Tuttleman IMAX Theater at the Franklin Institute in Philadelphia has a big glass wall that lets the public see the projection room with the big reels in the center; I'd be sad if they're no longer present.)

Speaking of IMAX, you mentioned the polarizing filter needing power to sync with the projector. That's true of RealD 3D, which uses a single digital projector alternating between the left and right pictures (three times each) for every frame. Do you know if it's also true of IMAX 3D, or does that use dual projectors to show both pictures at the same time? I've been wondering whether IMAX might be better than RealD for some people who get headaches watching 3D movies, if it avoids the temporal dithering needed when using a single projector.

I assume the "special reflecting screen" is one that doesn't alter the polarization of the light it reflects.

Comment Re:It sucks I agree (Score 1) 472

Switching from ext3 to ext4 resolved this for me. Since ext4 allocates files in extents of up to 256MB, deleting even a very large file involves freeing just a handful of extents, rather than a huge number of individual 4k blocks.

Another advantage of ext4 is much faster fsck times on large filesystems — minutes rather than hours.

Comment Re:Havoc Pennington? (Score 3, Informative) 201

By the way, do you know what language did they use to program gnome-shell? Javascript.

The JavaScript is the high-level "business logic" that manipulates nodes in a scene graph to move things around on the screen. The actual scene-graph library, Clutter, is written in C and renders via OpenGL.

I think it's a pretty reasonable design decision, actually. High-level behavior in a high-level language that's easy to maintain, lower-level implementation details in efficient compiled native code. It's similar to what browser-based apps like Google Maps do, with Clutter taking the place of the HTML DOM.

Comment Re:UDF? Seriously? (Score 1) 484

Plain UDF 2.01, the kind you'd use on a hard drive or USB flash drive, is readable in Windows XP (I tested this recently), and is read/write in Vista and Win7. It's also supported in recent versions of OSX. Unless one needs to support old operating systems, UDF seems like a reasonable choice.

Slashdot Top Deals

The trouble with opportunity is that it always comes disguised as hard work. -- Herbert V. Prochnow