Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Amazon just removed encryption from the software powering Kindles, phones, and t (dailydot.com)

Patrick O'Neill writes: While Apple continues to resist a court order requiring it to help the FBI access a terrorist's phone, another major tech company took a strange and unexpected step away from encryption. that powers its Kindle e-reader, Fire Phone, Fire Tablet, and Fire TV devices.The change, which took effect in Fire OS 5, affects millions of users.

Comment Re:Hmm (Score 3, Insightful) 197

Except that you need to track their consumer Windows versions in order: Windows 3.1 - Good, Win95 - Bad (Then OK with SP2), Win98 - Good, WinME - Very Bad, WinXp - Good, Visa - Bad, Win7 - Good, Win8 - Bad Bad.
(Don't put WinME out of order and don't mix in Win2k if you aren't also going to include Windows NT)

Submission + - Intel Updates NUC Mini PC Line With Broadwell-U, Tested And Benchmarked (hothardware.com)

MojoKid writes: Intel recently released its latest generation of NUC small form factor systems, based on the company's new low-power Broadwell-U series processors. The primary advantages of Intel's 5th Generation Core Series Broadwell-U-based processors are better performance-per-watt, stronger integrated graphics, and a smaller footprint, all things that are perfectly suited to the company's NUC (Next Unit of Computing) products. The Intel NUC5i5RYK packs a Core i5-5250U processor with on-die Intel HD 6000 series graphics. The system also sports built-in 802.11ac Wi-Fi, Gigabit Ethernet, USB 3.0 and USB 2.0, M.2 SSD support, and a host of other features, all in a 115mm x 111mm x 32.7mm enclosure. Performance-wise the new 5th Gen Core Series-powered NUC benchmarks like a midrange notebook and is actually up for a bit of light-duty gaming, though it's probably more at home as a Home Theater PC, media streamer or kiosk desktop machine.

Comment Re:So how much power will this use? (Score 1) 212

OK, I'll give you that: in order to be a logged in user or to post comments, the connection should be encrypted. But there is no reason I should need SSL just to view the page. One could argue that on an unsecured connection, I could be shown content that didn't really come from the slashdot servers. But I don't trust anything I get from slashdot anyway.

Comment Re:So how much power will this use? (Score 1) 212

Indeed, there is a lot of traffic on the web that has no need to be private. This slashdot page for example. But encrypting communications takes extra CPU cycles, and extra CPU cycles take extra energy, and will require more servers. Sure there is a lot of web traffic which should be encrypted, but the rest of it shouldn't be, for the sake of the environment and for the sake of that battery powered device in my pocket.

Comment Google's Paypal (Score 2) 105

I spent a lot of time coding a good checkout solution that worked with Google Checkout, so I was pretty mad when all the work I did went down the drain when they discontinued it. I was fortunate to had already integrated Paypal and Amazon checkout before it was discontinued, so the business impact was pretty small.

But it did teach me to be 10 times more careful when investing time to integrate with a third party platform.

But this also shows an interesting trend away from APIs and "Mashups." 5 to 10 years ago, providing an API for your startup was considered an essential way to promote your platform by having it integrated all over the place. I suspect too many developers got burned in the way that I was with Google Checkout, and stopped trying to "mashup" APIs to the point where there was no longer much benefit to provide them.

Comment Re:In-window popup autoplaying video ads with soun (Score 1) 557

You seem to be implying that everyone is always on a computer which they are allowed to modify in any way.

This. I'm at work right now, and the best I'm allowed to do here is run Chrome (the alternative being IE). No Firefox, no NoScript (which is what I normally use at home).

To other posters: I'm aware of, and sometimes read, Soylent News. Thanks for the other various suggestions as well. Sniff you jerks later!

Comment In-window popup autoplaying video ads with sound? (Score 3, Insightful) 557

Seriously, DICE? I'm sitting here looking at the first few comments, hoping for a little clarity and maybe even some insightful discussion - you know, Slashdot style - when the window contents scroll up and a video ad, with sound, starts playing.

I am done with this piece of shit website. How do I delete my account?

Comment Trade secrets, not patents (Score 5, Interesting) 148

What we're dealing with here is a trade secret dispute. Zenimax alleges that Carmack was privy to inside knowledge of Zenimax's work on VR tech while he worked there, and now he's allegedly run off with that knowledge and given it to Oculus VR.

Think of it like the formula for Coca Cola - it's not patented, never has been, but it's protected by trade secrets law. If someone works for Coca Cola and discovers/absconds with the formula, and then sells it to, e.g., Pepsi, then that person violates trade secrets laws by doing so. But if Pepsi independently discovers or reverse engineers Coke to discover the formula on their own, without relying on Coca Cola's inside knowledge, then more power to them.

Comment Re:wouldn't matter if it weren't canned (Score 1) 396

Perhaps, but there is far more reason to think that Putin is lying, because he's been telling bald-faced lies to the entire world as recently as the past couple of weeks (concerning Ukraine). At least in the US, our politicians tell their lies in a gray area such that fact-checkers give numeric ratings to indicate just how untruthful a statement is. Putin just tells outright lies as if he believed them to be completely true and reasonable himself.

Or, phrased another way: In Soviet Russia, Putin fact-checks you!

Comment Re:The President doesn't micro-manage this stuff (Score 1) 134

This is about technological implementation, and it's part of NSA's purview as a spy agency to explore technologies that further their ability to do their job. Part of that is discovering weaknesses in cryptographic systems which are trusted by the people you want to spy on.

The NSA also plays a counterintelligence role, and they're falling short of that if they don't take action to notify developers of a widely used Internet infrastructure utility that their software contains a critical exploit. If they can exploit it, so can the spy agencies of any other government with the skills to do so.

Slashdot Top Deals

There's nothing worse for your business than extra Santa Clauses smoking in the men's room. -- W. Bossert

Working...