Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:John Carmack (Score 1) 57

John Carmack was simultaneously working for Oculus, ID Software, and not mentioned at all here is Armadillo Aerospace where he was even doing NASA contracts all at the same time. Trying to be Buckaroo Bonzai by doing everything at once is more than most normal people could do. It was about the time Zenimax took over ID Software that John Carmack wanted to continue doing this sort of multi-tasking, but they insisted he decide who he was going to work for exclusively.... and he told them to go take a hike.

If you are an engineering who is moonlighting on multiple side projects, it can definitely get a little bit fuzzy about what stuff you develop on your own time vs. what you develop for your employer. In Carmack's case, the previous management was a whole lot more open to him pretty much doing as much as he wanted to do and however he wanted to do it as long as they got a piece of the action. ID Software got the better end of the bargain in that situation and made a whole bunch of money off of the work that John Carmack was able to perform on their behalf.

That these asshats tried to kill the goose that laid golden eggs... is what they are pissed about. Even more because that goose flew away rather than them getting to eat goose for dinner and laid some golden eggs for somebody else instead that made billions of dollars for those investors.

Comment Re:Why can't there be an open phone? (Score 1) 463

Talking about the Linux kernel. Most of the processor manufacturers only release source code to OEM's under a strict NDA for the Linux kernel which is completely illegal for GPL and then the OEM quotes their NDA for not releasing the source.

I've asked, I needed to compile some custom things into the kernel. To this date, only HardKernel (with the O-DROIDs) has complied with the GPL.

Comment Re:Why can't there be an open phone? (Score 1) 463

Whatever kernel modifications they make is quite important to get the thing to run because most of them DO make custom kernel modifications.

You can take Android from AOSP, that's no problem once you get a kernel to run but a LOT of the hardware and even software functionality for Android is baked into the Linux kernel (think video, audio, USB, SD card, sensors), most of it is hard-linked, not a kernel module binary you can copy over (you can verify that by rooting the device) so it violates the GPL when they REFUSE to publish the Linux sources along with the binary release.

And no, Samsung and HTC are notorious for violating the GPL continuously. They never release the source code along with the binary releases and for most modern devices they simply refuse to release the code, often only releasing very old versions for yesteryear's devices. I've even had a discussion with Amlogic who simply told me: no, you have to pay $10k to become an OEM before we give you access.

Comment Re:Shorter summary (Score 1) 137

So you leave your front door wide open when you go on vacation because no piece of shit should walk in and steal or vandalize your stuff? Yeah, whoever does that intentionally and maliciously deserves to be punished (although a bullet is a bit far) but the 'owners' are also responsible to take precautions.

Comment Re: False premise (Score 1) 463

Let me field that answer. They'll use it, just like organizations kept using WinXP pre-SP3, until the new Director of IT came along and said "Are you fucking kidding me?! What incompetent idiot let you stay unpatched and critically open to everything that has come along in the last fucking decade?! Oh, the same one who thought it's a great idea to never upgrade hardware, despite your staff barely surviving on machines that crash daily, or catch fire like those two did last week."

Comment Re:Right (Score 1) 137

You can update outdated Linux distributions for free, there is no valid excuse to using old and outdated open source software. Closed software often has the drawback that you're "locked in" by whatever vendor, they can increase the upgrade price ten-fold and you'd have no options.

On the other hand, even outdated Linux distributions pose a significantly lower risk of a successful hack.

Comment Re:CEO is shown lying by his company's own actions (Score 1, Interesting) 137

You must have an MBA. Today's security is a continuous process and most if not all security procedures will last longer than a few years and will result in a near zero chance of getting hacked. This is a medical marijuana dispensary, not even a hospital or credit card company, the reason they got hacked is because they lacked the skills or didn't want to spend the money necessary to secure themselves.

Keep your systems updated, remove encryption standards that are out of date, close services and ports you don't need, don't use Windows, and if you must, don't give your users Administrator or root rights and if your software tells you otherwise, get different software.

But most business owners don't care until it's too late, if you ever worked with Micros Point of Sale systems or anything from any 'top 5' vendors for anything, you'll see that security doesn't matter to them. Walk into any bar or restaurant, a few days later go back and you can 'steal' 100s of credit cards and yes, they are connected to the Internet secured with nothing but a 10 year old Netgear router.

Comment Re:Top priority? Always? (Score 3, Informative) 137

HIPAA rules do not describe how to secure your data. It only tells you that you need to secure your data and the procedures to follow when you're not compliant. It doesn't prescribe a particular encryption or what needs to be encrypted.

Case in point, most hospitals do not use encryption when exchanging private health information (because systems from idiots like EPIC are simply incapable of it). HIPAA just says you have to document it and mitigate. In most cases, the mitigation is "our internal network is secure, external sites use VPN" and then it doesn't matter the external VPN vendor only supports DES (yes, still single DES in 2016/2017), it's documented as being "encrypted", any hacking would be the result of 'evil hackers' which they can't do anything against and then it becomes the FBI's responsibility to catch the criminals, the hospitals have done their due diligence and don't need to report breaches because they have gone according to HIPAA standards.

Comment Wrong question (Score 1) 215

There is already open source software for pretty much any problem you may have. In your case, a combination of ffmpeg, avisynth and some coding (if you can make your own shaders, you can cobble a shell script together).

Or you mean, how can I get someone to package a nice GUI with all the stuff I want in it? Not how open source works. Open source only amplifies the effort you put in something useful, and if you don't have the skills to make something useful, learn them or buy them.

Comment Re:Why can't there be an open phone? (Score 1) 463

The problem is that nobody goes after manufacturers that violate the GPL. If Google were to put their money where their mouth is, they should pursue ALL the manufacturers that refuse to release the GPL code to their Android software.

Here are some of the big GPL violators:
Amlogic
MINIX
Samsung
HTC ...

Comment Re: False premise (Score 1) 463

Yes, the big manufacturers are on that path (Apple, Dell, HP) and that is fine for ultra portable devices but there are plenty of smaller manufacturers springing up that do custom (fat) laptops, desktops, workstations and servers. As long as there is a server market there will be a workstation market because that's all modern workstations are.

Comment Nothing new (2011 dupe?) (Score 4, Informative) 132

We've know for quite a long time about the titanium. Here's a story from 2011: http://www.upi.com/Did-DB-Coop...

It hasn't been relevant for a long time, the guy walked off with $200k and may or may not have survived. In the mean time, a small band of cyber criminals has been hacking banks and ATM's for the last decade without ever being caught despite still being active, having been tied to close to $1B in losses worldwide.

Slashdot Top Deals

10 to the minus 6th power mouthwashes = 1 Microscope

Working...