Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Tether, Real backup, Root apps (Score 3, Informative) 185

WiFi Tether without paying extra to the carrier for the same data you're already paying for is a feature.
Backup specific apps and their data ("Titanium Backup" or its successors) or the entire device ("NANDROID" backup via TWRP, CWM, PhilZ, etc)
Root apps allow flexibility carrier-ROMs don't. Greenify shuts down unused apps. Xposed allows changing almost anything about Android operation (the "framework") with easy installation. See this link for top rooted apps.

None of these are available with locked bootloaders, and stock ROMs. (The NANDROID backup is available with stock ROMs but is if little value).

MotoG4 using Silesh Nair xt16xx 7.1.1 Lineage OS 20170113 ROM

Ehud Gavron

Comment Super Awesome Improvement!!! (Score 2) 109

I'd rather the Hamas terrorists sit around hacking Israeli army enlisted men's smartphones than strap explosives to themselves and go kill innocent civilians in populated cities.

Exploding bus = brutally murdered people and body parts everywhere while the terrorists and their sympathizers dance in the streets and Iran pays them.
Hacked smartphone = nobody dead.

This applies to all terrorists, be they Hamas, Hezbollah, Iran, French-muslims, etc.

Please, terrorists, do go on and continue your oh-so-super hacking.

Swords to plowshares indeed.


Comment Re:Slow day on slashdot? (Score 1) 73

It's not a memristor. See this article which does a much better job of explaining it than WikiPedia.

Memristors by definition is not a stateful electronic component, so, to answer your question, no, it's not a 4-state memristor. The original article does talk about "states" but it refers to the ternary numerbing system available in the device. Ternary is better than binary for efficient storage (log base 3 of n vs log base 2 of n) but hopelessly inefficient for actually accessing it or doing anything with it.

Imagine, if you will, the old "sort the coins with the balance-scale" problem. Given n coins you CAN do it in log(3)n+2 instead of log(2)n+1 which is "better" except there's an algorithmic cost to have to identify discrete coins and move them around. In the log(2)n solution you just put half on one scale, half on the other, and see which side goes up and which side goes down.

Computationally intensive algorithms make a ternary system less efficient than a binary system for FAR MORE than the cost that one saves in storage or having different 'states' as they call it.

As to the comment that you can do logic gates, that is not in the original article. All the article purports to claim is that the memory chip can do operations on the data in the memory chip so you don't need a CPU. Put more simplistically it means that the memory chip can do CPU-like functions without the transfer back and forth of memory. In-place ops are significantly less computationally expensive than those requiring memory-mapping, DMA, or whatever transfer mechanism is used.


Comment Slow day on slashdot? (Score 4, Informative) 73

A memory chip is not a processor.
The *summary of* the article didn't say what the article did.
Nothing the summary says is close to what is true.

NO MEMORY UNIT WILL PERFORM CPU FUNCTIONS at less than 2 orders of magnitude worse (that's 1/100 performance/power) today.

There's no "discovery" here. You can use stones and sticks to compute. Using a memory chip is far more advanced. And just as stupid.

Slow day on slashdot?

Yes. I signed this post. Because I'm in the industry. I'm not a troll. I get to call out when people put out stupid articles where they summarize stupid research papers that have nothing to do with reality land. Like this one.


Comment All about herself... (Score 3, Informative) 511

Scott Greenfield from simplejustice gives his take on Ms. Wu's whole-hearted attempt to represent *HER* desires and *HER* feelz and not anyone else in her failure run for Congress.

It's a good read. Scott is a lawyer who blogs daily... and he doesn't pull any punches. Unlike Ms. Wu he is able to view things objectively.


Submission + - Bug in libvirt allows unauthenticated VNC sessions

gavron writes: A bug in the libvirt virtualization library allows attackers to connect to VNC servers that have no password set (that are using a non simple-password authentication) but instead of denying access... no authentication will be tried and the user will be connected.

The US National Vulnerability Database rates this a 9.8 on the CVSS severity level.


Comment Problem. Solution. Specification. (Score 2, Insightful) 303

Before asking for "how do I figure out what to do?" (spec) you should define what's up (problem) and determine how to handle it (solution) and then come up with the specification.

"Trench CAT6"???? No, you are unclear on the concept of a)trench b)concuit, and c)CAT-6. Before you ask me why I'm dissing your plan see above about Problem/Solution/Spec. In short, copper bad, fiber-optics provide opto-isolation, CAT-6 won't get you anything CAT-5 won't since you stupidly rely on *one* commodity ISP, and you have nothing to trench for. Short answer: inner-duct with multi-mode fiber will carry 1G, 10G with no electrical connection nor ground issues.

UPS? No. LOL. That's good for your kitchen. If you want solid power get a -48VDC battery pack, a rectifier/charger, and an inverter for AC operations.

Whiteboard walls? How is "what I do with my walls" part of any IT strategy? Do whatever you want with your walls. You want IT advice? See above. You want interior decorations advice, see an interior decorator.

Your concepts of physical security (double up the wall beams and which lock should I supply) are absurd.

Let us know when you have your fortress done.

I'd like the opportunity to drive my car through your front door in 15 seconds and see how great your $3.75 works.

I did try to be helpful... but as other posters have pointed out... SERIOUSLY???


Comment Headline correct; summary wrong (Score 3, Insightful) 399

Any employer can donate the gifts (or funds) they would have spent on employees, or any amount for that matter, to charity. That part of the story is clear and good on Alphabet for helping out needy schools to the tune of more money than I'll ever make in my lifetime.

What is not accurate is the phrase "on its employees behalf" and other posters have already indicated that if the employees don't get the tax advantage, then the donation is not "on their behalf." Indeed the incentive is for Alphabet to get the deduction, effectively providing a $30M gift which costs them probably half that.

However, unlike other posters who say "If I'm not getting the benefit then F*** them" I think on it this way: If I were an employee and was told "This year instead of giving YOU a gift we're giving one to a poor child in need" then I would think about whether I was ENTITLED to a gift (no), or whether I just got spoilt and greedy and want want wanted a gift, and now I'm crying my big head to sleep on my big pillow.

Good on Alphabet. Good on everybody who supports helping out those in need.

P.S. I'm not a tax expert, lawyer, nor doctor. But I do write my opinions on the Internet.

Comment Don't hate on Microsoft (Score -1, Troll) 129

Powershell is no different than any other Microsoft product. Security is not a consideration. Consumer lock-in and revenue is.

This is no more "news" than "MPAA goes after another movie critic who shared a screener" or "IRAN says it hates the US in a new message."

Nothing to see here. Microsoft has never claimed to, never tried to, and has never made any software product that is resistant to hacks.


Comment Fishing Expedition (Score 5, Insightful) 124

Coinbase should be able to get this quashed.

If the IRS had evidence of a crime, they're allowed to get information to further identify the person who committed it.

If Coinbase had committed a crime, they're allowed to get information as to who else was involved in it.

However, to subpoena a list of all clients in a certain geographical area over a three year period is to presume them guilty and then look for the innocent. That's a classic fishing expedition, and the courts should disallow it.

I am not a lawyer. Consult lawyers for legal advice. This is simple common sense.

P.S. I know the IRS is powerful... but not ALL powerful.

Comment First Amendment what? (Score 1) 820

Both Peter Thiel and Donald Trump are thin-skinned rich white guys who bully anyone that they think insults their thin-skinned specialness.

Both have shown clearly they are FOR free speech when that speech is FOR them, and AGAINST free speech when that speech is against them.
That means they are neither pro free speech, the first amendment, or basic human rights.

It is not surprising that a narcissistic misogynist xenophobic racist bully would enlist others like him to a transition team.

Trump's history is full of contracts where he refuses to pay and unilaterally changes how much he'll pay after he gets the product. If this sounds familiar it's the same as what Darth Vader did with Lando Calrissian when he took Han Solo's carbomite-frozen body to Jabba the Hutt.

Those who voted for Trump for President are in for a few nasty surprises when he does the same things to our allies, to our treaties, to his own campaign promises, and to the people of this land. Unfortunately, so are the rest of us.


Slashdot Top Deals

The difficult we do today; the impossible takes a little longer.