Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:What is Kik? (Score 1) 480

Actually that's not necessarily true. I've worked closely with a software patent attorney in the course of my business and, while not a developer or engineer, he did have a substantial working knowledge of software development and architecture. He was also very knowledgable about GPL in commercial products, linking, reverse engineering laws, etc...

Comment Re:Well, THAT'S interesting. (Score 1) 435

Are you sure about that? There is no such thing as a "work-owned' iCloud account. This isn't like Google Apps where IT can remotely administer your work account. The password reset would've had to have been done either by answering security/personal info questions or social engineering an Apple support person.

Comment Re:Welcome to the world of the future. (Score 1) 66

Photos doesn't support local networking because it's an entirely new application and Apple is notorious for being extremely minimalist when they redesign things. Their product design team was tasked to come up with the "perfect" photo app and that means older features that very few people use go out the window. Apple really really really doesn't care about information monetization, it's just not part of their business model. It does genuinely seem like their leadership believes protecting user privacy is more valuable to them than the snooping. If you use a Mac and iPhone or iPad you should just use iCloud Photos. It makes your photo organization and synchronization much easier and from my perspective there are little to no downsides.

As I think would be evident, Apple is obsessed with design. I just read a reviewer talking about the new Apple wireless keyboard/mouse/trackpad combo. They basically said that compared to others you can buy, it's a shitty keyboard because the design is so unique. But the unique design is obviously exactly what they were going for and there are a lot of customers that will appreciate it. If you want to be cynical about Apple, then you just need to be scared that they'll make things that are focused on design over functionality. They may even redesign something YOU liked because THEY didn't like it.

Comment Re:Welcome to the world of the future. (Score 1) 66

Bzzzt! Mac and iOS applications can be re-signed using a new private key/certificate pair without recompiling. This is especially useful for the dozens of enterprise iOS apps that I've built for customers. These apps are signed with an Apple Enterprise Distribution cert so they can be installed directly on devices without using the app store or going through the approval process. Their provisioning always expires after one year though so I have an automated method of unpacking the apps, replacing the old provisioning file, repacking and resigning them. Existing devices with the apps can just have new provisioning files pushed to them over the air. (I've been in this business for almost three years)

SIP is an extremely effective security feature, but of course it's also extremely annoying. /usr/local is where you should be writing to. Or /opt/local in the Unix style. Either of those locations are whitelisted for writing. As are all the system-level locations that users are supposed to put various plugins, extensions, or configurations. Furthermore, disabling SIP just requires booting off the recovery partition and running one command in Terminal.

The intent of these features like code signing and SIP is absolutely NOT about pandering to the idiot masses. Apple isn't worried that some moron is going to open up /System/Library and say "hey who put all these files here? off to the trash you go!" They're more concerned that your flash player updater is tainted and when it asks for root to install an internet plugin it also installs malware or patches your launchd with a rootkit. Kext and application signing makes it relatively trivial for them to protect virtually all Mac users from malware. Unless you've disabled Gatekeeper the OS will refuse to run anything for which the signing cert was revoked. SIP makes the system virtually immune to any sort of malicious system patching such as key loggers or rootkits without a serious kernel exploit. These methods don't guarantee perfect security but they do make it much harder to attack OS X, as well as make updates to OS X more effective at protecting against existing malware.

Comment Re:Technically, suspend is not the problem. (Score 1) 378

On the other hand, Apple does something ungodly with their iPhone/iPad/iPod devices. When connected to a computer via USB, they change their device ID depending on what state the operating system is in. They have separate USB device identifiers for both the booted iOS mode and each of the myriad of hardware recovery modes they can end up in. Causes downright awful behavior on Windows where when you go to do an iOS reinstall, the host things you unplugged your iPhone and plugged in something else and thus goes and does its painfully slow driver search all over again. I've written software that does lots of low-level interaction with iOS devices in these various states and we had to document how to change Windows' boneheaded driver search behavior so our customers aren't stuck with an hour-long "searching for drivers" headache.

Comment Re:The problem with Apple is compatibility... (Score 1) 110

OS X 10.11 El Capitan System Requirements:
MacBook (13-inch Aluminum, Late 2008), (13-inch, Early 2009 or later)
MacBook Pro (13-inch, Mid-2009 or later), (15-inch, Mid/Late 2007 or later), (17-inch, Late 2007 or later)

(source)

Mind you that's the unreleased OS X version currently in beta! And it definitely supports ANY MacBook or MacBook Pro shipped in 2009. And a lot of them shipped before then. (There was no 13-inch MacBook Pro shipped in early 2009.)

Furthermore your Mac doesn't support Win8 under bootcamp because the drivers that are included for your Mac model don't support windows 8. You can try to install it manually and then maybe you'll find up-to-date drivers for the hardware. It'll probably work, depending on what "unsupported" Mac you have but it's quite simply "unsupported."

Comment Re:Google: Select jurors who understand stats. (Score 1) 349

Today one of my junior developers basically threw a fit over what he was calling a violation of the C standards in all of our production code. He was quite rude about it to me, suggesting that I as the project lead had displayed some magnitude of incompetence in being ignorant of just how badly things had been screwed up. His gripe was basically that the multiple inclusion guards in most of the header files (you know, #ifndef SOME_HEADER_H #define SOME_HEADER_H #endif) were of the form "__ProjectName__ModuleName__HeaderName__." Of course the C standard definition says that any name beginning with a double underscore is supposed to be reserved for the compiler. You know, in case some compiler decides to #define something that would conflict with a symbol or variable name you were already using in code. Now the funniest part of this was that these "malformed" header guards were so numerous because the IDE we use just so happened to be automatically generating them exactly according to that pattern, by default.

Now in this case I was fairly incensed because this developer was confronting me about the "major problem" he discovered right after I got out of a three hour intellectual property meeting (complete with lawyers!) and I then realized that in that three hours he had written about 20 lines of code. I nearly blew my stack again when the next day another junior developer submitted a pull request that basically consisted of a renaming of all the header guard definitions throughout the project... I don't even know whether to call it lack of experience, lack of perspective, or some sort of manifestation of "I just graduated with a CS degree and I took an Advanced Operating Systems course so I know everything!"

Comment Re:Unsupported obsolete OS (Score 1) 368

You're not "blocked" from installing Mavericks (or Yosemite) on a 2006 Mac Pro. I happen to have one of them running Yosemite. However if you try to boot one of those machines in yosemite you'll quickly discover that it can't boot because that Mac Pro only supports 32-bit EFI and Mountain Lion and higher only shipped with 64-bit boot loaders. Not "blocked," it literally can't boot. So then you do 30 seconds of googling and find a simple patch to install on your hard drive which allows 10.8, 10.9, 10.10 ad infinitum to boot on any system that only supports 32-EFI, like your 2006 Mac Pro. Then you try to boot the system and either have no graphics output or kernel panic. Because the drivers for the almost 10 year old graphics card in your Mac Pro aren't available in a 64-bit build. So you spend $50 on some recent ATI or nVidia card that the 64-bit drivers do exist for (my GeForce 640 GT is supported out of the box on Mavericks and Yosemite) and THEN you can run Mavericks on your 2006 Mac Pro. Nothing has been blocked. Apple just decided they didn't want to spend engineering resources porting, fixing, and rebuilding firmware and drivers to support a hardware platform that was rapidly approaching "vintage" status. Fortunately their exist Mac enthusiasts and developers who aren't as picky about what they spend their valuable time on.

Comment The README (Score 1) 1

Check out the manpages for launchd, launchd.plist and launchctl. There's your README, it's pretty extensive. Also, OS X in general has a hierarchy of configuration and system data.

/System/Library is the root of the hierarchy, intended for system-wide configurations that are part of the original installation. /Library is also system-wide but is intended for components that are added or updated by the user. ~/Library is the user-specific location. Each of these config locations has a LaunchAgents and a LaunchDaemons classification. LaunchAgents are considered a deprecated technology but their usage is still available. The difference between the two is that daemons are intended to run solely in the background without user interaction and can be active without the user being logged in. Agents only run while the user is logged in and are permitted the ability to present a UI to the user when necessary. It's really not that complex.

Slashdot Top Deals

Where there's a will, there's a relative.

Working...