Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re: What's the deal with wireless charging.. (Score 3, Informative) 125

I used to be a fan of wireless charging, but when I last used it it out around 1A, which is a slow charge these days, and made my phones very hot, which is bad for battery life. USB-C ports seem to hold up better than older formats, so I'm less concerned about plugging in these days.

Comment Ummmm... (Score 5, Insightful) 147

The full 4th U.S. Circuit Court of Appeals in Richmond, Virginia, voted 12-3 that the government can get the information under a decades-old legal theory that it had already been disclosed to a third party, in this case a telephone company

... with whom I have a contract that ought to contain privacy terms and a disclaimer than certain information may be provided to law enforcement only under due legal process, i.e. a warrant.

Comment Re:You what? (Score 1) 161

1/6 of the downstream traffic and 1/3 of the upstream traffic is impactful on an ISP network

Maybe I missed it, where are those numbers coming from?

Also, let's say it is 1/6th or even 1/3rd of the traffic, that doesn't say anything about the capacity.

because it consumes resources that would otherwise be available for other uses

Ignoring the distinction between traffic and capacity, your argument is "if the traffic wasn't being used for what the subscribers wanted to use it for, it could be used for..." what exactly?

and/or requires the ISP to invest in additional infrastructure to prevent that traffic impacting other uses.

Yes, ISPs need to invest in infrastructure to ensure the service level they sell meets the real world wants and needs of the customers they sell it to. And the problem here is? Seems like the fundamentals of running a business to me...

You appear to come from a world that has infinite speed zero latency networks. Welcome to Earth, where we have an internet that requires switches, routers, fibre optics and complex networking.

Ooohhh, it's "complex". Better stop applying independent thought processes and follow the narrative then, like you have.

Comment You what? (Score 1) 161

How exactly is torrent traffic impactful on an ISP network? they're just routing packets around (okay, maybe you need a larger routing table?), it's the nodes that have to do most of the work. Unless they're using carrier-grade NAT, in which case get IPv6 working you lazy b*s.

Also, looking forward to seeing http encapsulated VPNs!

Comment Re:So it's not unlimited, then... (Score 1) 346

T-Mobile Unlimited plans work like this:

* You can use as much data on your cellphone as you want
* However, there is a limit as to how much data you can use with tethered devices

To be fair to T-Mobile, they make this really clear in their plans. People then install software to bypass the tethering limit by manipulating the tether to look like data from the cell phone.

There is nothing sketchy about what T-Mobile is doing here.

Comment Re:Interesting, from someone other than Google. (Score 4, Insightful) 278

I had the same initial reaction, but realistically I spend so much time on Android/Chrome/Google Docs/GMail/etc. already that avoiding OnHub will do nothing to stop Google knowing far too much about me. In many ways my phone is more sensitive than my router.

My bigger worry is that Google will add whatever features it wants whenever it wants, and who knows how much control we'll have over any of it. Maybe they'll even start sharing your bandwidth to support things like Google Fi. What I've noticed through Android and all the supporting apps is Google just does whatever shit they want to. They don't even particularly seem to care if you like it, even if you're stuck with it for a long time, so long as it supports some long term goal they have, that they might not have even disclosed.

So, if you're willing to spend $200 - the price of a high-end consumer router - to get some nice tech but be at the whim of Google, then maybe this is for you.

Comment Re:File this under "NO SHIT" (Score 1) 264

For languages like JavaScript, it's such an easy/accessible/portable language I actually wonder what the breakdown is. Just like every other language there are people who are really proficient in JS and aware of good practices and design, but there are also people who are so used to learning from ugly hacks of others they may feel it's acceptable, or they just have so little background with good code they have no idea that half their program constitutes an ugly hack. C certainly has a higher barrier to entry and you'll often find yourself working with professionals rather than other amateurs, so ugly hacks are called out because as the developer you know it's bad and you know others will judge you for it if you hadn't acknowledged it yourself.

Of course, in JS I'm sure there are a lot of ugly hacks due to ugly browsers. Naming no names, but you know, ones that can be used to explore the internet.

Comment Re:UAC is for idiots (Score 4, Insightful) 187

The fact some program that can change the UAC settings is pretty huge example of why Windows has issues separating userspace from root space. It just simply can't do it right. Who's brilliant idea at Microsoft was it to provide any sort of API that can let any program (besides the control panel widget that lets you adjust UAC settings) adjust UAC settings?

I hope you realize what you are saying here is the equivalent of a Linux user saying "The fact that some program can change permissions after I launched it as root is an example of a huge security hole. Whose brilliant idea was it to provide any sort of mechanism that can let any program I run as root do things a user who is root can do?".

This is an example of why UAC exists, in fact: A program that is not UAC elevated could not change your UAC settings (if you hadn't turned them off already).

Comment Re: UAC - A Double Edged Sword (Score 4, Informative) 187

Yes, a component in an admin context may not be accessible to a component used by user in a non-admin context. This is called a "security" model, and prevents the non - admin process manipulating the admin-context process to do things it shouldn't be able to do. You make it sound like a quirk, but the entire design is that "non elevated components can't talk to elevated components". Try starting Notepad as admin and dropping a text file on it from the non - elevated explorer view, it won't work by design.

Slashdot Top Deals

Memory fault -- brain fried

Working...