Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Linux has history of problems with laptops (Score 2) 181

Depends on the model. The second generation Thinkpad X1 Carbon didn't work with Linux *at all*.

If you want a Linux laptop, look for someone who actually supports Linux on the laptop. Dell has a few, including their XPS 13 developer edition. Purism's Librem laptops are a little more expensive, but specifically built for Linux. There are a handful of other vendors that primarily support Linux.

Lenovo has been hit-and-miss for a while now, and this isn't showing much that's recent:
https://support.lenovo.com/us/...

Comment Re:welcome to python (Score 0) 148

> Python 2 is still maintained because developers aren't porting their code to Python 3.

That's not really what I see. At Python meetups and conferences, the Python developers I meet are near unanimous in their praise for Python 3. On my workstation, there are more packages that depend on python3 than on python. Porting is clearly happening.

Comment Re:welcome to python (Score 3, Informative) 148

Python was initially released in January 1994, almost 23 years ago. Since then, some libraries have been deprecated, first producing warnings, and later being removed. That process gave users and developers time to update the code without completely breaking following an upgrade. Backward compatibility was reasonably well maintained until 3.0, which was released in parallel with 2.6. Python 2 is still maintained while developers port code to Python 3.

That's a big contrast from Swift, which was initially released almost exactly 2 years ago, and made significant backward-incompatible changes without an interim version that retained compatibility. Python's not perfectly backward compatible, but it's a whole lot better than this.

Comment An illustration (Score 1) 366

https://www.penny-arcade.com/n...

Lots of people are repeating the refrain "RAID is not a backup." To that, I want to add an illustration of what that means. If there's only one place your data is located, you don't have backups.

If your data only exists on a "backup" drive, then it isn't backed up. You need to have two, and a single RAID volume doesn't provide that. No matter how many disks are in it, a RAID volume is just one "place." The same goes for Storage Spaces. If your disks are mirrored, then corruption or accidental deletions will remove the data from both.

Of the three proposals, only the last one would actually give you a backup.

Personally, I want as much distance from my data and its backup as is reasonably possible, so my recommendation would be for cloud backups or, if you don't like that idea or the price, then a small NAS for backups. A WD My Cloud 4TB (which will be 2TB in RAID1 mode, which I recommend) runs $180.

Comment Re:from the five-days-too-late dept (Score 1) 42

Let's add a summary from a Sophos blog:

https://nakedsecurity.sophos.c...

The problem with "proper" security is that it works against the user

NIST guidelines:
Favor the user. To begin with, make your password policies user friendly and put the burden on the verifier when possible.

Long passwords that you can't remember

NIST guidelines:Applications must allow all printable ASCII characters, including spaces, and should accept all UNICODE characters.. We often advise people to use passphrases, so they should be allowed to use all common punctuation characters and any language to improve usability and increase variety... No composition rules. What this means is, no more rules that force you to use particular characters or combinations

so far no one has come up with a better way to do it.

Says the guy who obviously hasn't read the guidelines they're criticizing.

Comment Re:Once again, open source is vulnerable (Score 3, Informative) 115

I'm not in the habit of responding to obvious trolls, but this case makes very clear the flaw in the logic of people who actually believe that open source is insecure.

The bug is in the specification, which is necessarily open in order to create inter-operable systems. And what is code, if not a machine readable specification?

The idea that closed source is more secure, taken to its logical end, is an argument for closed systems that don't inter-operate with other systems. Their operation would have to be entirely secret and proprietary.

Comment It's just one business (Score 1) 39

> abusing its dominance in search to benefit its own advertising business

Yeah, but those aren't separate businesses. They're the same thing. Google accepts questions (search queries) from users and gives them back answers (relevant information, including information from people who paid to be considered relevant). Even advertising embedded in pages is the same; the page information constitutes an expression of interest in a topic, and the advertisements are intended to answer that interest. That's one coherent business. It's not one I like, but that doesn't make them separate businesses.

You wouldn't accuse Schick of abusing its dominance in re-usable handles to benefit its own razor-selling business.

Comment It's the second switch that'll really anger users (Score 1) 771

If the rumors are true, the iPhone 7 will have no audio jack, and a Lightning port.

The MacBook already uses USB-C for power. How far into the future does Apple expect to get before the iPhone does as well? A transition to Lightning headphones is going to cost users a whole bunch of money, and a lot of people who aren't very technical are going to spend that money on Lightning headphones instead of an audio adapter.

The day Apple migrates to USB-C, making those lightning headphones useless (or requiring a USB-C to Lightning adapter), even the most loyal users are going to throw a fit.

Comment Gnu (Score 1) 492

"because it is Linux"

Actually, it's not. It's a GNU system running on Windows. There's no Linux involved, at all. There's just a compatibility layer that implements the Linux system calls on the Windows kernel.

This is GNU/Windows, and it only serves to highlight the fact that the correct name was always GNU/Linux.

Slashdot Top Deals

Little known fact about Middle Earth: The Hobbits had a very sophisticated computer network! It was a Tolkien Ring...

Working...