Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Apple is a weird company (Score 1) 24

Apple is so flush with build capacity right now, they started pumping out laptops using their lower end mobile technology, all of which can be recycled later in other product lines, given the number of people happy to trade-up and how small the footprint of their SoCs are. Apple already takes extensive advantage of this for other parts already, including cameras. Sure, it would knock out bleeding edge innovation for a few years but that would equally impact a lot of key ARM and x86 rivals too.

As lower end consumers make up the bulk of Apple customers, they could just continue selling the lower end to keep themselves going, all while continuing to provide long-term software support to maintain loyalty at the higher end. There is no way Apple has not already considered this anyway, as they are diversifying their manufacturing locations for everything except the Apple Silicon SoCs themselves.

Comment Erm, no (Score 3, Interesting) 27

NVIDIA does outlast AMD for support lifecycle, it is just on Linux their support is garbage from day 1 and not worth having. BAR1 cannot use system memory as a supplement for dedicated VRAM, no vendor VAAPI support, CUDA cant overflow into system memory transparently, broken power management the moment you engage NVDEC among many other problems. Nobody cares about full suspend to RAM in 2025, since it is a gaping security hole anyway even with TME support, it is a joke when people imply that is one of the last few major issues with NVIDIA Linux support.

At least AMD provides proper Linux support these days, unlike NVIDIA, and now AMD have stepped aside on AMDVLK to help contribute to RADV instead, things should get even better,

Comment When will they fix Update and Restart (Score 2) 44

They still do not have a temporary single-use TPM+key+datetime mechanism for BitLocker to allow for updates to be fully completed in a secure and autonomous manner on systems which normally need a password or PIN input. Worse still, they have not addressed the lack of security for BIOS updates on TPM-equipped systems, they still auto-suspend BitLocker in a manner which allows for data theft. It is possible to know the what the new PCR outputs will be ahead of time, so itâ(TM)s not impossible to implement multiple TPM key slots for BitLocker and avoid leaving a gaping hole in the first place!

Comment This is likely what Trump wanted (Score 1) 10

It is very possible Trump wants the EU to use EU manufactured products, and wants the US to use US manufactured products and for China to use Chinese products, irrespective of the economic impact, and the perceived loss of control. Even the tariffs are reciprocal with the intent of having countries try to go Juche on internal manufacturing. The prez also recently turned up to the UN and told every country they should be more self-reliant, that they should have strong borders and that they should be thinking about protecting their own unique cultures in the process.

Before Putin dived off the deep end, he would often talk history and talk up the unique cultures of other countries in a non-judgmental way, emphasising similar viewpoints. It is also a very similar set of talking points to the views China espouses regarding the sovereignty of other nations and how they should operate.

Sure, Trump is clearly a bit mad these days, but he is Senator Armstrong levels of mad.

Comment Re: new devices (Score 1) 140

Except that most applications on iOS use CloudKit in various ways you do not immediately see. Those integrations only work with iCloud, even if you do not use iCloud Drive and such. Then there is the lack of being able to install software without using the App Store, the inability for third-party services to do full phone backups and the inability for background processing to occur freely, relying upon location tracking events or dummy push notifications as a means to wake threads for limited time periods. It most certainly is the cloud striking again.

Comment Re: Again we said the same thing about TV (Score 1) 48

Irrespective of school funding, none of this explains the difference in performance based upon social media use. Even if you bring the baseline down to absolute dribbling, this result still suggests that social media users will dribble more than those which do not use it.

Comment Re: Did they remember what a cunt he was? (Score 3, Informative) 103

Jobs did not invent the walled garden approach, he actually wanted everything to be a web app available through Safari, touting the idea of how the overwhelming majority of code should be ran via the browser natively, long before Google Chrome even saw a 1.0 release. I can hold many things against him but this was not one of his decisions, it is actually something that developers pushed for themselves originally.

Comment Microsoft is following the law (Score 1) 19

The product isn't illegal to possess or distribute, there's no army of officers confiscating computers for having illegal code on them.

it's only illegal to process other people's data with it without their express and explicit consent to do so. You can happily use all of Microsoft's products to process your own data (and personal data belonging to other people who have consented) perfectly legally. This means Microsoft is legally in the clear to sell it to anyone they like, as long as they do not warrant it as being fit for any particular purpose, the legal responsibility is on the user of the product (not the vendor) to make sure they have sought consent from the parties whose data they are processing.

In the case of police, they both possess and collect a lot of data *without any consent* as part of their job, which means they would be breaking the law if they processed it any manner not necessary for the explicitly exempted purpose of law enforcement. It's not Microsoft's job to teach the police how to comply with their own laws, as it's reasonable to assume that (since they're law enforcement) they should understand the laws they're enforcing better than anyone else!

Comment Re:Nvidea drivers (Score 1) 9

NVIDIA cards seem to work well with Wayland now on both GNOME and KDE, the last major bug was the (potentially seizure inducing) XWayland problem where frames would desync in video games, making them flicker like no tomorrow and that got fixed in 57x.xx but 580.xx has some problems with GTK apps using the Vulkan backend still (even on Xorg methinks) but you can use EGL and everything is fine. Assuming you're happy with the usual limitations of no official VA-API support, no shared memory support and excessive VRAM use, glitchy power management under some circumstances (same as with Xorg) then you're good.

Looking at nvidia-smi output does show Wayland uses a bit more VRAM than Xorg but scaling on a dual-4K screen is so much nicer on Wayland (especially with KDE) and when running out of VRAM, the session doesn't seem to die (like on Xorg) but some apps will spawn transparent windows (not rendering but still technically "working") and others won't load at all.

Comment Buybacks are not that easy (Score 1) 73

There is no way to know for sure how many units that person actually possesses, and upon making the offer, one can always lie and say they have less than the total number for any reason, a simple reason being disposing of a non-functional unit in the trash. All a nice under the table offer would result in is a sale of the majority of them with a massive profit, but with a few inevitably retained. A surprise raid by the cops offers a plausible way for SEGA to claim all possible lost devices which have not already been purposefully destroyed have been retrieved and held in escrow, as so-called evidence.

The hilarious part now is that the police cannot turn everything over to SEGA, as the evidence is not SEGA property. If they have, they are screwed, as leaving the cables and other accessories gives all the necessary proof. If this person has photos of everything to document it all, which is likely, then things get even worse.

If the police have acted inappropriately and turned non-SEGA property over to SEGA by mistake, then a private prosecution will inevitably follow, and the police will not only be forced to offer a formal, written apology, but also issue compensation to a much larger value than the items themselves would ever be worth. Not all of the goods would have started life as the property of Nintendo, so the police cannot even rely on the defence of claiming they were intervening appropriately in the handling of stolen goods.

A big screwup all round and a huge violation of individual property rights in the name of large corporations will not go unnoticed.

Comment Time for China to do its duty (Score 1) 148

How long until clones with added assassin teapot style functionality emerge, where one can unlock them using one or more secret methods unknown to those interested in keeping the devices locked up? The fix for this problem is to make teaching engaging and worthwhile. Perhaps a few teachers should actually bend the rules on PG content and hack their brains a bit better!

Comment This is not rocket science (Score 5, Insightful) 65

Police forces should run their own infrastructure, preferably using products where the source code is available, and deliberately keep everything away from the general internet except for a web browser and an email client, each inside a cheeky little isolated remoteapp. None of this is particularly difficult to achieve. If the data is sensitive enough that officers can only process it inside a station, it is sensitive enough that it should not be processed online at all. If it can be processed outside of a station, then things called VPNs exist, and systems can always be centralised using national policing resources at that point.

Slashdot Top Deals

Sendmail may be safely run set-user-id to root. -- Eric Allman, "Sendmail Installation Guide"

Working...