Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re: Could have been a contender (Score 5, Interesting) 211

In 1995, a kid in my dorm showed me this new OS called Be. Running on a PowerMac 603 with a single cpu and 16mb of ram, he showed me how Be could play 6 video files simultaneously. Mapped to 6 faces of a cube. And you could spin the cube around via the mouse while all 6 videos were playing. Never any input lag, or dropped frames. It was a thing of beauty.

Comment This demands legal action (Score 1) 564

Microsoft have been wantonly abusing their customers with these non-consentual updates to Windows 10. This should not stand. There needs to be strong legal action against this sort of thing. Let's start by calling it what it is: #WindowsUpdateRape.

I didn't consent to the upgrade, I repeatedly said no, Microsoft repeatedly re-pushed the same upgrader and nagware to my machine. The best way to describe this behavior is "update rape".

Comment Re:Not surprised (Score 1) 118

The stable ABI is what created most of the mess in Windows. Listing this as a shortcoming of Linux shows you have no idea what you're talking about. A huge mass of badly maintained binary only drivers is not a good thing, it's an incredible liability.

Drivers need to be maintained. The only way to ensure that is to have their maintenance be part of the kernel maintenance. A stable ABI would directly counteract this.

And Microsoft keeps doing transgressions. They haven't washed out their stripes. They've just been slapped on the wrist enough to not be blatant about it.

Comment Re:FBI hack should not be made public (Score 1) 346

The case is not only extreme, it is valueless. When law enforcement knows that much about the situation, they already know what to do. The contents on the iPhone will not help them at all.

That illustrates no conflict at all. The answer is clear; privacy wins in this case. There exist no guarantees at all that the bomb exists, that the iPhone contains anything which will help defuse it, or that the information on the iPhone even is correct.

And if the bomb exists, and law enforcement have been so mind bogglingly incompetent that getting inside the iPhone is the only way to locate it, then the answer is to get less mind bogglingly incompetent law enforcement. Not to destroy the privacy of every iPhone owner in the world.

Comment Re:Shows the limits of freedom (Score 1) 1095

Who's freedom is more important? The transgendered woman who looks like a bearded, burly man who wants to use the men's room, or the women, who wants that bearded burly person in their women's room?

Oh wait, that's not what the women want! They want the obviously man looking person to go to the men's room. But the law prohibits that.

Is that really the majority rule?

Comment Re:Blackmail to allow perverted activities? (Score 2) 1095

Your arguing AGAINST this new NC law.

Under the law, someone who was born a woman but now looks like a burly, bearded man HAS TO use the bathroom together with your wife.

The law FORBIDS that person from using the men's room, and DEMANDS that person walks in with your wife.

If she says "please leave, this is the woman's bathroom", she is in breach of the law.

Comment Re:No winners here. (Score 1) 379

The concept of "single binary" is misleading. Computer science doesn't even include formal definitions for that concept, so it is not at all something basic. And frankly, I don't even understand what you mean by that in the context of distribution. I suspect that neither do you.

What this is about is distribution of various executable files. At the core is the question if one executable (zfs.ko) is derived from or to be considered a part of another executable (the kernel) *during distribution*. What happens at runtime is immaterial.

Slashdot Top Deals

"If truth is beauty, how come no one has their hair done in the library?" -- Lily Tomlin

Working...