Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Idiotic Summary (Score 1) 325

There's been a working version of Android in the iPhone since April and Apple has done nothing about it. Why then would anyone claim Apple is going to try to stop people from running ChromeOS on iPads? Is there even a shred of evidence to support this bizarre hypothesis? That is exactly the level of openness Apple has consistently shown to be in their "playbook".

Yeah, Apple can't do anything about it on these older devices, because it was an exploit in the bootrom. You can't modify ROM (hence the "O"). There's no way for them to fix the exploit on older devices. What they can, and did do, however, was fix the exploit so that the same hole couldn't be exploited on future devices. One such exploit is commonly referred to as "24kPwn", and it has been patched in the newer devices (3GS and newer).

Is there even a shred of evidence to support this bizarre hypothesis?

There is, the fact that Apple continues to patch these holes in their software to prevent exploits that allow installing other operating systems. If they're so "open", why are they actively combating the issue?

Comment Go jailbreak! (Score 1) 292

Even if (or, when) Apple rejects it, they can put it on a Cydia repository. When Google Voice came to the iPhone many people jailbroke for it. I'm sure Apple is weighing in these consequences, but I'd almost like to see them reject it just so more people jailbreak.

Comment Re:It's about the tools (Score 1) 115

TheRaven64, I'm interested to find out that Adobe's Flash Player is implemented in a Smalltalk VM, but couldn't find any verification of this. Do you have any links showing the Smalltalk connection to the flash player?

Comment Re:Am I the only one... (Score 1) 117

No, you're not :)

It's astounding how the group that produces and supports Conficker can do so many things correctly, from cryptographically signed updates distributed P2P to blocking cleaning software and DNS access to antivirus vendors, it's pretty spectacular.

They definitely get the easy way out though, with such a narrowly defined scope. Without having to mess with users' input, GUIs, and all sorts of other peculiarities, it's a lot easier to get your code well-secured with malware than if you were writing a traditional application.

Comment Re:pHash (Score 4, Interesting) 116

The problem you're describing is known in the Music Information Retrieval (MIR) world as content-based recommendation (CBR). There are a number of ways to do it, but they're all based on measuring similarity.

The idea is that people perceive songs as similar based on the characteristics they have, which are termed features. By representing a song's features in a model you can compare the models to see how "distant" they are, and then choose songs from a set that are least-distant. The work that my research group is pursuing represents songs based on timbral features (MFCCs) and rhythmic features (bpm, pulse clarity, syncopation, etc).

If you're interested in the approach, see http://paragchordia.com/research/cbr.html

Comment Re:What kind of lies? Statistics, there you go the (Score 1) 34

As a student of mathematics, I say that it is much more difficult to manipulate data to legitimately suggest different results that most would suspect. As they say, the numbers never lie. Of course, the statisticians might lie. Or the statistics might lie, in the sense that there is always a chance of a biased study. But the numbers never imply causation, merely correlation.

Slashdot Top Deals

Never trust anyone who says money is no object.

Working...