Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Psst. You can only grow to saturation. (Score 1) 40

Exactly.

Also, as Adam Conover (yeah, that Adam from "Adam Ruins Everything", he's also one of the WGA negotiators in that last strike) explains, Netflix deliberately deliberately price dumped for years, telling investors that this was necessary to secure a monopoly on premium streaming, knowing fully well that it was not a viable long-term business model. The other major distributors followed the same business model to try and compete with Netflix and, as expected, failed because Netflix already had the first-mover advantage and the most mature tech.

Now that this monopolistic market position has been secured by Netflix, investors expect a return on their investment; for that, Netflix must end price dumping and turn profitable. That means higher prices and/or -- as everyone in the trade knew since the cable TV days-- ads. Lots of ads.

Comment "The studio behind Megalopolis" (Score 1) 42

The article refers to Lionsgate as The studio behind the "John Wick" franchise and "Megalopolis", but that's really inaccurate.

Megalopolis is actually an independent film financed and produced by Copolla himself, spending his own personal finances. Lionsgate made the distribution deal after the movie was completed and made the rounds on film festivals.

Submission + - Leaked Contract Shows Samsung Forces Repair Shop to Snitch on Customers (404media.co)

samleecole writes: In exchange for selling them repair parts, Samsung requires independent repair shops to give Samsung the name, contact information, phone identifier, and customer complaint details of everyone who gets their phone repaired at these shops, according to a contract obtained by 404 Media. Stunningly, it also requires these nominally independent shops to “immediately disassemble” any phones that customers have brought them that have been previously repaired with aftermarket or third-party parts and to “immediately notify” Samsung that the customer has used third-party parts.

"Company shall immediately disassemble all products that are created or assembled out of, comprised of, or that contain any Service Parts not purchased from Samsung,” a section of the agreement reads. “And shall immediately notify Samsung in writing of the details and circumstances of any unauthorized use or misappropriation of any Service Part for any purpose other than pursuant to this Agreement. Samsung may terminate this Agreement if these terms are violated."

The contract also requires the “daily” uploading of details of each and every repair that an independent company does into a Samsung database called G-SPN “at the time of each repair,” which includes the customer’s address, email address, phone number, details about what is wrong with their phone, their phone’s warranty status, details of the customer’s complaint, and the device’s IMEI number, which is a unique device identifier. 404 Media has verified the authenticity of the original contract and has recreated the version embedded at the bottom of this article to protect the source. No provisions have been changed.

The use of aftermarket parts in repair is relatively common. This provision requires independent repair shops to destroy the devices of their own customers, and then to snitch on them to Samsung.

Comment Re:Catastrophe potentially averted (Score 1) 83

Exactly. There is already a very informative retrospective of the xz vulnerability and other projects that the backdoor author had access to.

Spoiler: "As of 9:00 PM UTC, GitHub has suspended JiaT75’s account. Thanks? They also banned the repository, meaning people can no longer audit the changes made to it without resorting to mirrors. Immensely helpful, GitHub. They also suspended Lasse Collin’s account, which is completely disgraceful."

:facepalm:

Submission + - Red Hat issues urgent alert for Fedora Linux users due to malicious code (betanews.com)

BrianFagioli writes: In a recent security announcement, Red Hat’s Information Risk and Security and Product Security teams have identified a critical vulnerability in the latest versions of the “xz” compression tools and libraries. The affected versions, 5.6.0 and 5.6.1, contain malicious code that could potentially allow unauthorized access to systems. Fedora Linux 40 users and those using Fedora Rawhide, the development distribution for future Fedora builds, are at risk.

Comment Re:The show wasn't that great (Score 2) 66

TStill, I was pretty happy when I saw the cartoon characters making a cameo in Dungeons & Dragons: Honor Among Thieves. I thought it was a nice little gift to us long-time fans, and they didn't have to do that.

Speaking on gift for fans, maybe you'd like to know that fans have animated and voice acted the original script from the unproduced last episode.

Comment Re:Red herring? (Score 1) 16

Apeople eventually elect someone like Pinochet

Pinochet wasn't elected, he spearheaded a military coup d'état. In the 1988 plebiscite, the first time Chilenean people could possibly vote for Pinochet, he was rejected by 56% of the voters.

Comment Re:Wasn't that the whole point of Java? (Score 5, Interesting) 118

Sure. But Java's (also used in C#, Go, Python, Javascript and many other modern programming languages) solution, namely Garbage Collection (GC) introduces a non-negligible overhead.

For things like scripting languages, frontend applications, GC is an excellent trade-off because the added security trumps the performance loss. But for use cases that require raw performance, GC doesn't cut it, so C and C++ are still widely used to build operating systems, device drivers, and web browsers (which must run web applications with acceptable performance).

Rust is, I think, the first programming language that started to change this status quo, because even with its memory safeguards (which are not like Garbage Collection at all), Rust can compete with C and C++ on performance.

Comment Re:Sigh. (Score 3, Informative) 153

I think this has always been true. Look at video games. The game engine (where the "serious" performance intensive work happens) is in C/C++, all of the game logic is in a scripting language.

That has definitely NOT been always true. In the past, video games were written completely in assembly for speed and compactness.

You're right, it wasn't always true, but it became true pretty quickly for some genres. The main example is perhaps adventure games: they didn't really need the same speed and responsiveness that action games needed, therefore adventure game programmers quickly learned to detach the game engine from the game logic.

And so Infocom developed Z-machine (a virtual machine for its text adventure games like Zork) in 1979, which was followed by Sierra's AGI in 1984 and by LucasArts's SCUMM in 1987, among many others.

Comment Re:You know your economy is dysfunctional when (Score 1) 156

CyberTuner is $1,400.

$1,400 for a tuning app? That's an expensive FFT.

I thought the same, until I saw it is a PIANO tuning app.

Pianos are notoriously the most fucked-up and complex musical instrument to tune. Piano tuner (as in a piano technician) is an actual profession.

An software that allows a piano owner to do it himself (considering the app does its job well) would be received as having good value, because the alternative is to pay an actual piano tuning professional every now and then.

Slashdot Top Deals

We can found no scientific discipline, nor a healthy profession on the technical mistakes of the Department of Defense and IBM. -- Edsger Dijkstra

Working...