top Tox, a Skype Replacement Built On 'Privacy First'
Not entirely true. They are no more centralised than email servers. Each domain gets to nominate their own XMPP servers via DNS - which
can be shared across cooperating domains.
top Reinventing the Axe
Well... You probably won't find too much Eucalyptus in Finland...
top Kids Can Swipe a Screen But Can't Use LEGOs
Megablocks are not LEGOs. They are made by a different company, and "happen to" be sort-of compatible with proper LEGOs. If you have ever tried comparing them, you'd be sure to find that Megablocks do not stick together as well as LEGOs - I believe that LEGOs are produced to much finer tolerances than Megablocks.
Disclaimer: I am Danish, and (naturally?) a LEGO fan. To me, Megablocks and LEGOs are completely different. Just like water and Carlsberg are different (yes: I was bottle fed as a baby. Live with it)
top Apple Again Seeks Ban On 20+ Samsung Devices In US
This sort of news *really* makes me miss PJ of Groklaw fame
:-( - I have no doubt she could provide good insights and interpretations of what goes on...
top Swedish Man Fined $650,000 For Sharing 1 Movie, Charged Extra For Low Quality
Don't be lazy. By being lazy you reducing the quality of the language, which (obviously!) is bad. Perhaps you should be liable for damages for unauthorized copying of the judgement text? With "reduction of quality" making it even worse!??
I read and speak Swedish, and the google translation is not bad at all. Basically, the damage to the reputation of the movie(s) was valued at 300K SEK. The reasoning for this does not appear to be explained futher in the judgement, but I suspect the judge is not familiar with torrent download sites and believes that all torrent users expect perfect quality.
And it smacks of being punished for the same thing twice.... If I have a bad viewing of a movie because my TV set is wonky and add my review accordingly, I'm damaging the reputation too, right? ANYBODY who submits a bad review are in the same boat.
But this is only ~7% of the total judgement...
top Software Patent Reform Stalls Thanks To IBM and Microsoft Lobbying
Surely you know the Golden Rule?
The Golden Rule: The ones with the Gold make the Rules.
top New Framework For Programming Unreliable Chips
So: This assumes that something, somewhere knows which transistors are unreliable. This data needs to be stored somewhere - on the "good" transistors. How is this data obtained? is there a
trustworthy "map" of "unreliable transistors" ? And the code that determines the probability has to run on the "good" transistors too. Will those transistors stay good?
I cannot see any way of allowing *any* transistor being unreliable... And based on my (admittedly incomplete) understanding of chip production, *any one* of the transistors on the sillicon can be faulty, so there still is a chicken-and-egg problem in here somewhere.
Surely, such "suspect" transistors can only be used for storing the final end result of a calculation: If you were to use it for intermediate values on which you base "if" statements (or any sort of branch), your code will end up unreliable as a result. Unfortunately, 99% of the time the "end result" of one calculation is used as input to another calculation, so the problem spreads like rings in the water.
What if humans want to rely on the output of the computer? Does that pixel on the screen matter? If you are playing Angry Birds, fine. But the pixels may be important if you're a doctor looking at a scan. Or you're a flight controller scanning the screen for planes. The graphics routines do not know the context in which they run. So the actual usability of this ends up being radically diminished....
What use is a computer where you cannot trust the result? We already have logic bugs, race conditions, usability issues etc confusing everybody - I don't think we need to make the computers even
top The NSA Is Collecting Lots of Spam
That's no good! Terrorists will just disguise their emails as spam by sending it out to millions, and things will go unnoticed by the NSA: Too many dots to connect, which will (as usual) only be discovered by hindsight.
Obviously the intended terrorist agent on the receiving end will have a similar problem... Which means that the NSA can recognise the terrorists, because they're the ones reading everything in their Junk folder!
Oooh - the arms race will never end
Nice to see that spammers are useful for something though: Keeping both the NSA and (some) terrorists busy at the same time!
top How To Develop Unmaintainable Software
Development race conditions. Ever done svn up on the production server, just to find that someone had committed broken code between your test run and the deployment
If this happens, then you are doing things wrong.
know that YourApp version X is what QA tested. Because the developers tagged it before giving it to the QA guys.
know that upgrading your live environment to YouApp version X is not the same as "Upgrade live to latest commit". This race condition is easily solved by proper understanding of how people use your version control system.
In other words: Use the tags, Luke!
"svn update" (or whatver equivalent in your chosen VCS is) is only useful for projects that require no compilation or installation other than "just copy files about". Most are more complex than that.
top E-Voting Source Code Made Public In Estonia
So... The hackers will win. And the problem is....?
top GCHQ Tapping UK Fiber-Optic Cables
Agreements with Verisign (or other CAs) would not help here: Verisign will NOT get the website's private key when somebody ask for a certificate.
It is possible (but unlikely) that the CSR (Certficate Signing Request) may be of use to NSA though. It does NOT contain the private key.
It is MUCH easier to strong-arm a CA to sign NSAs newly-generated key for e.g. "facebook.com" and play man-in-the-middle on whatever traffic they're listening in on - isn't that what Iran did with google traffic? (My memory is vague here...)
top Whole Human Brain Mapped In 3D
Endogenous input? That ain't input, but feedback
top Fear of Death Makes People Into Believers (of Science)
He is so reliable that we can create formulas based upon it
The formulas do not demonstrate the presense of any deities. They show the relationship between cause and effect; not a sign of a divine intelligence, love, hate, desire to be worshipped or any other attributes generally associated with deities. Basing a belief in a deity upon the laws of the universe as we understand them is non-sensical. So you need some other basis for bringing a deity into the picture.
If you argue that a deity created the universe to perfectly fit human believers then you fall foul of the
Anthropic principle. Even more so if any the multiverse theories are true.
top Anti-Infringement Company Caught Infringing On Its Website
Go ahead. Download Tears of Steel. From wherever. You're allowed to - it is licensed under the Creative Commons Attributions 3.0 license, so you're allowed to! Be sure to read the license before re-sharing though - you'll have to give credit where credit is due.
http://mango.blender.org/sharing/ for details.
top Google Releases Glass Kernel Source Code
Even if they bits were pointed out, lots of people would be suspicious anyway. And if you're developer, you'd know how to find the differences anyway - in a format you're familiar and comfortable with.
I believe that the tool you're looking for is called "diff".
top Baseball Software Can't Score What Jean Segura Did Friday
bases, trotting, dugout!? What IS this? Some sort of millitary or pig (of the oinking kind) reference? C'mon... just ONE clue would be nice!
top UK Government Mandates 'Preference' For Open Source
Ahem... Good analogy, bad conclusion...
A good analogy is if the UK government mandated that fleet vehicles have their design and manufacturing processes laid bare, or they wouldn't buy the vehicles. I really don't care about the processes documentation - buy the best car at the best price.
If the government did this, it would be in trouble as soon as the vehicle needs maintenance. Or if you wanted to modify the vehicle later. If you MUST go back to the vendor for this, you have just accepted the fate of a captive customer - good luck in the negotiations.
about a year and a half ago
top Bit9 Hacked, Stolen Certs Used To Sign Malware
There is no indication that this was the result of an issue with our product.
Well... technically right, but the "product" people buy is not just the software: It is the whole package, which includes the on-going maintenance of whitelists, signing binaries and whatnot. And
that appears to have been badly compromised.
We are continuing to monitor the situation.
Surely, if the product is that great, then you can relax, right? Isn't that what you're selling to your customers? "Security in a box?" (I know. Security is an on-going process, but not if you ask sales)
While our investigation shows our product was not compromised, we are finalizing a product patch that will automatically detect and stop the execution of any malware that illegitimately uses the certificate
Repetition Repetition... "product not compromised"
... except that it no longer provided any protection against those evil hackers?
I think I'm getting my head around doublespeak - will be useful when I respond to bugs...
about a year and a half ago
top Ubuntu Smartphone Shipping In October
So.. Ctrl-N and Ctrl-P ain't working for you?
about a year and a half ago
top Google Chrome 25 Will Serve Searches Over SSL From the Omnibox For All Users
Rubbish. "Omni" comes from Latin, meaning "all"... Surely you must have encountered this prefix before.... "Omnibus", "Omnivor", "Omnidirectional microphone", "Omnipresent Gods" etc etc
about a year and a half ago
Jorgensen has no journal entries.