Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Firefox 36 Arrives With Full HTTP/2 Support, New Design For Android Tablets

Michalson Re:Hello (146 comments)

Using this setting is more then just removing a button. WebRTC allows a number of privileged network commands to be run (with very poor protection against misuse), including one that can be exploited to enumerate of all your network end points. That means a web page can see your internal network addresses (for example your intranet IP address and any secondary or virtual interfaces). This can even reach behind a VPN or TOR connection, defeating just about any IP privacy guard.

If you have WebRTC enabled (it is by default in Chrome and FireFox) you can visit this demo by Daniel Roesler which runs some WebRTC code to get your IP address(es). If you are on a VPN you'll notice that it can sniff your real IP address, and if you have multiple network connectors (such as if you run developer virtual machines or servers) you'll see those segments too.



HP Introduces Sub-$100 Windows Tablet

Michalson Re:Will it run Linux? (182 comments)

As long as you can get drivers you should be able to. It's an x86 rather then ARM based so Microsoft does require the BIOS to support both secure and unsecure booting. If HP hasn't provided a special button press to get into the BIOS during startup (like holding down F1 or DEL, or Volume + like on the Surface) you can get there from Windows now. Boot into Windows 8 and then use Recovery from the start menu to reboot the system into Advanced Recovery mode (sort of a graphical version of the old text menu where you could choose from options like command prompt or boot in safe mode). From the new graphical recovery console you'll need to go into the advanced options under trouble shooting and select UEFI Firmware Settings. That will get you into the tablet's BIOS where you can disable secure boot (several distros do support secure boot but honestly it's just easier to disable it so you can throw on anything). The same recovery console can also be used to override the boot device if you have any issues getting the tablet to boot from a USB stick or external DVD drive.

about 5 months ago

Ask Slashdot: SIM-Card Solutions In North America?

Michalson Re:You'll want either AT&T or T-Mobile. (146 comments)

If you are only going to use it in Canada either 7-Eleven's "Speakout" or Petro Canada Gas Station's "Petro Canada Mobility" provide a cheap way of getting onto Roger's Canada wide network without any of the restrictions they slap on their in-house brands Chatr and Fido. There used to be a nice cheap way to get data but since they starting offering Android phones you'll get the same insane fee (10$ for 100mb) as the other Canadian carriers but without any unlimited option. SIM cards are $5-$15 dollars depending on current promotions and you can purchase a SIM card, airtime or phone over the counter in 30 seconds (just make sure you say clearly which provider you want airtime for, these are gas station/convience store clerks, not telecom pros). Speakout tends to be slightly cheaper/better package deals but 7-Eleven locations in Canada are few and far between.

I'll agree that Wind does offer a good deal if you want to go outside of Canada, not just in the US but their roaming rates are far more competitive then other Canadian carriers.

But you might want to look into what roaming rates you can get from a carrier in your own country first, they might be better.

about 8 months ago

TechCrunch and Others On the Microsoft Surface Pro 3

Michalson Re:But... (136 comments)

Yes, all 3 generations of Pro can have security turned off in the BIOS to allow a Linux install. But running Linux and actually doing anything aren't the same, there aren't properly configured drivers for a lot of things (as can be common for laptops). Even on the Windows side drivers initially held back the SP1 because Wacom hadn't released a compatible binary. The SP3 uses N-trig for the pen so it might be easier to get working but the Wifi, Bluetooth and even the advanced touch covers have all proven difficult to get working drivers on the SP2 and the hardware seems to be mostly the same in the SP3. You may find yourself with a screen and a USB port and not much else.

about 9 months ago

Canada Halts Online Tax Returns In Wake of Heartbleed

Michalson Re:Tax filing (50 comments)

Canadians can still file by mail just fine. The difference is in timing - if you file by mail it will take the longest to get a refund if you had one coming. If you file online you'll get it faster, and if you file it online and have signed up for direct deposit they have/had an advertised time of 8 days between filing and getting your refund deposited. Basically the less manual paper stuff that has to be processed and shuffled around, the faster the Canadian Revenue Agency will process your return.

On the other hand businesses are in a different boat - there are still some small businesses that can file by mail but most organized entities must file a least some of their tax forms like the HST (sales tax collected) electronically. If you can hire an accountant to submit an inch thick tax return just to get out of a few more dollars in taxes then you can afford to fill it out and submit it electronically instead of other taxpapers footing the bill for all the manual entry.

about a year ago

MtGox Finds 200,000 Bitcoins In Old Wallet

Michalson Re:Smelling more fishy every day. (227 comments)

While the MtGox situation is very, very suspicious the way Bitcoin works it makes the stealing and 'finding' of bitcoins very strange compared to traditional currency. Imagine a dollar bill. Much like a Bitcoin it has a unique serial number at the bottom. You can deposit it in a bank where they will keep a ledger so they know how much money anyone can withdraw from the teller while keeping most of it in the vault. If the vault is robbed it will quickly be discovered when they open it up in the morning and find it empty.

But Bitcoin differs in that last part. When you spend or transfer a bitcoin you aren't handing over the original, you're making a copy and the person receiving it is adding an extra digit to the serial number. Even though you still have it your copy of the coin is no longer legal tender and if you go to a store and try to spend it the cashier will tell you the serial number is too short and someone else owns the legitimate digital copy of that coin. If a thief gets into the bitcoin vault he doesn't need to remove or change anything, he just copies all the serial numbers and immediately 'pays' it into wallets he owns or controls, making his copy the legitimate article and the coins in the vault useless bits of data. The owners of the vault don't know this - the contents of the vault have not been changed in any way and it's only when they remove some of the money from the vault and try to spend it that they'll discover they've got worthless old copies.

While less likely it is also possible, with ledgers being moved around and even manipulated by thieves, that bitcoins that where assumed withdrawn are in fact still legal tender - if the bank made a copy of a one of their coins to service an apparent withdrawal, but that copy was never 'spent' then the original is still good. This is one of the difficulties of Bitcoin, unlike physical currency or even centrally managed digital currency (what a lot of your money basically is) you can't determine if each coin is worth something or just a bunch of worthless numbers without asking for the opinion of a bunch of other people. The extra layer of security of a vault actually makes it harder, since you are trying to keep that data out of the wrong hands, not share it with others to get their daily opinion (imagine if a bank removed every bill from the vault daily to check them with those counterfeit pens - how many opportunities to steal the money would that add).

about a year ago

Indian Space Agency Prototypes Its First Crew Capsule

Michalson Re:Something new? (48 comments)

To be fair, while the Chinese capsule is probably a 'copy' given the engrained culture of copying things and passing them off as original (jets, tanks, bullet trains, cartoons, statues, retail stores, etc and etc), the Soyuz shape is actually a very mathmatically 'perfect' spacecraft given a certain set of requirements. In fact the shape is so dependent on math that America almost built a nearly identical craft for the Apollo program without either country knowing what the other was doing.

When designing spacecraft weight is everything - to move something in space you need a proportional amount of fuel, and then you need even more fuel to move that fuel. Tsiolkovsky's equation shows how adding even a small amount of weight to the final stage of a rocket greatly increases the weight of the lower stages. Soviet engineers zero'ed in on one specific element and that was in order to return something to Earth you needed a heatshield, a parachute and other equipment. As a rule of thumb they figured out that for every pound of spacecraft you wanted to bring back to Earth you would add about 2 more pounds to the spacecraft's weight.

Given how much weight was dependent on the size of the return capsule they decided to design it first and make it as small as possible, then build the rest of the ship around whatever they had come up with. The lightest possible return capsule would be a sphere: maximum volume (so you can fit 3 guys) with the minimum mass. But a sphere wouldn't work since it wouldn't remain steady and the G forces would kill everyone. Applying some math from the field of aerodynamics created the 'headlight' shape, providing lift while adding the minimum possible mass. The headlight return capsule is the part that is going to be identical no matter who designs it - the Soviet Union, the American contracters or the Chinese. As long as the design principle of a minimum mass return capsule is used it will look more or less the same from the outside.

The rest of the ship has more room for originality but is still going to be affected by math and common sense. A service module where the engine and fuel go will exist and it will obviously fit at the bottom/base of the spacecraft. To aid in launch aerodynamics it makes sense for this service module to be a cylinder with a rocket on the bottom and sized to fit with the spacecraft's largest surface at the top. Apollo's service module followed the same logic. Finally you need a crew cabin (the orbital module), since the whole point of a longer duration spacecraft is that your guys can get out of their seat. Since the orbital module isn't needed for deorbiting it makes sense for the reentry module to be connected to the service module, and so the orbital module by default gets put on top of the whole stack. Since it has a smaller attachment point anyway (the small end of the reentry module whose shape is already fixed) it might make sense to make the orbital module roughly spherical, since this again maximizes volume : mass and both the Soviet and Chinese versions did that.

General Electric, one of the bidders for the Apollo program, performed a study that came up with a nearly identical craft despite the Soyuz blueprints that existed at the time being a closely guarded Soviet secret. The main difference was their version of the orbital module. Rather then focusing on the volume : mass ratio (sphere) they focused on a shape that would work best for the fairings (Soyuz requires a large fairing to protect it during launch, much like most satellites do). This resulted in a cone shaped orbital module, essentially a lighter more minimal version of the Apollo command module. Of course the GE design was never used because NASA had decided what Apollo would look like long before a million (1960s) taxpayer dollars where spent on the design studies. The NASA design focused on a different key requirement - the module should have the same diameter as the Saturn C-2's upper stage. Because of that requirement the size of the heatshield became a fixed property. With a heatshield that big there was no reason to not bring back the whole spacecraft, minus the service module, and so you got the Apollo design that went to the Moon.

about a year ago

Tesla Model S Caught Fire While Parked and Unplugged

Michalson Same way as other cars (329 comments)

Normal gas cars catch fire every day just sitting in peoples driveways or driving along. It's usually a short in the 12V (regular car battery) system related to one of the electronic accessories. It can happen because water gets in and corrodes a contact (like the electric windows) or heat from a nearby item like a headlamp wears down the insulation or other wear and tear that cars are subjected too. In some cases it is identified as an engineering fault rather then a unique occurance in which case a recall occurs. If you go back 3 years you can probably find at least one recall for each of the major manufacturers to fix an electrical fault that 'could lead to a fire'.

Having some basic knowledge about car fires makes it clear just how much Tesla fires are about media hype.

1 year,12 days

Microsoft Warns of Zero-Day Attacks

Michalson Re:New Attack? 0 Day? (165 comments)

Easy. You have something (like a header) that leads the image decoder to allocate a certain amount of memory on the stack (a buffer) for an expected piece of data. Then you have the decompressed data be larger then it was advertised or calculated, overflowing the buffer and so overwriting other items on the stack, like the return address. By changing the return address you can point it back at the buffer, which when the CPU tries to read those bytes as code instead of data it turns out they do bad things.

Vulnerabilities in media decoders are a prime vector for infection since they are usually processed automatically. The only reason you are seeing it in software from 'a decade ago' is that hackers face so much competition from white hat researchers when it comes to browsers, fighting for vulnerabilities from a usually shrinking pool. With fewer opportunities some are turning to media decoders found in applications like Office. It's a less effective vector since it requires several actions from the user, but the upside is that these applications are often not as aggressively patched as browsers have become which means a single vulnerability might work for months.

For a comparison it's been almost a year since the last arbitrary code vulnerability was reported in FireFox's GIF decoder, and 2 years since the JPEG decoder was last turned into an attack vector (to the best of my knowledge). IE, Chrome and Safari have experienced similar droughts, with all the major browsers only having 1 or 2 image based vulnerabilities reported annually for the last few years, and usually by researchers who allow it to be patched quickly rather then as a zero day being exploited. Of course other types of media exist. CSS/HTML5 has rapidly become a media format in of itself and a little over a month ago FireFox was vulnerable to arbitrary code execution due to the way it decoded animations in CSS stylesheets (this was reported by Google and patched with the release of FF 24). TL;DR Researchers are hogging all the good browser vulnerabilities, so hackers are playing in the dusty old rooms nobody has visited in years.

about a year ago

Owner of Battery Fire Tesla Vehicle: Car 'Performed Very Well, Will Buy Again'

Michalson Want to know more about car fires in America? (232 comments)

Here is some interesting information on car fires from the US Fire Administration (USFA->FEMA->DHS) and the National Fire Protection Association.

From 2008-2010 "Approximately one in seven fires responded to by fire departments across the nation is a highway vehicle fire. This does not include the tens of thousands of fire department responses to highway vehicle accident sites.". The leading factors in ignition where "mechanical failure" (44.1%) and "electrical failure" (22.3%). 1

The actual number of highway car fires in that period was approximately 582,000, or an average of over 500 car fires every day on American highways.2

In this accident which involved an electric car a large piece of sparking metal debris was run over by the car and thrown up with enough force to slice through the cars stored energy compartment, in this case one of the batteries. The driver was alerted via the display to a problem and instructed to pull over immediately due to the fact that one of the batteries was now leaking and smoldering. A short time later the burning ember reached critical temperature and was able to ignite the softer materials in the adjoining 'frunk', the carpeted front side trunk located where most cars have an engine. The other 15 battery compartments, having not been skewered by a giant metal spike, remained unharmed due to the firewalls and other protection, as did the passenger compartment.

If the owner had been driving a gas powered car and that metal spike had instead been driven up into the gas tank, ripping it open and showering the fuel with sparks as it was dragged along the highway, would the driver have had any warning other than a loud bump and then the passenger compartment being consumed by flames?

This is not the first Tesla fire, there was another involving the Roadster resulting in a recall of 439 vehicles. The source of the fire in that instance was not the advanced battery at all, it was one of the old style 12V lines (Tesla vehicles still include a regular 12V battery for lights/instruments and 'ignition') being in a bad position near a headlight and susceptible to damage that could spark a fire. Going back to the statistics above we have over 100 car fires each day (22.3% of 500) caused by those 12V wires and components being damaged and shorting out. For example Honda recalled over 140,000 (non-hybrid) Fits in the US this year because the wiring in a 12V door switch could get wet, short out and start a fire. GM had the same problem last year and had to recall almost half a million vehicles.

about a year ago

Never Underestimate the Bandwidth of a Suburban Filled With MicroSD Cards

Michalson I can't be the only one to see a flaw in this math (208 comments)

Did no one else immediately think of the weight as soon as the author started talking about filling an SUV with microSD cards? I'm reminded of the saying '100lbs of pillows/feathers is still 100lbs', in reference to how people seem to overlook that very light objects are still heavy if you carry enough of them.

While the exact weight of each of the 19 million microSD card would vary a nice starting point is about 0.4 grams plus or minus 0.1 based on general specs. That's well over 16,000 lbs or 8 tons of microSD cards in the back of that SUV, which according to the page linked in the article is rated for a payload of only 1580 lbs. To get an idea of how much 8 tons is, that's the weight of a medium sized Caterpillar backhoe.

about a year and a half ago

Hackers Steal Opera-Signed Certificate Through Infrastructure Attack

Michalson Quote: current evidence suggests a limited impact (104 comments)

Well of course, this only affects people that would run software signed by Opera and they have already taken steps to notify both of them of the situation.

about a year and a half ago

Java API and Microsoft's .NET API: a Comparison

Michalson Re:I don't want to be "that guy", however (319 comments)

Microsoft has also had the benefit of Anders Hejlsberg being the lead architect, one of the best minds in the industry. There are maybe a handful of people in the industry today that can stand at the same level as him, and none currently alive that can stand taller. Hiring him away was a major boon to Microsoft and a crushing blow to Borland.

about a year and a half ago

iTunes: Still Slowing Down Windows PCs After All These Years

Michalson Re:Purposeful (519 comments)

Consider the 'carpet bombing' exploit that was discovered in Safari a while back. It allowed a website to save any number of files to the default download location without any interaction or notification to the user. The exploit worked on OS X and Windows but was a far greater threat on Windows due to some changes Apple made when porting Safari from OS X. Despite the public discovering this Apple dragged its feet and tried to claim it wasn't an attack vector.

So what where the difference between the original Mac version and the same code ported over to Windows, which in theory should have simply replaced the OS specific calls? First the Windows port changed the default download location to the desktop, despite the fact that Windows has a downloads folder just like Mac. That means files get deliberately dumped all over the desktop until the screen is a mess. That's a minor thing though it does help make Windows seem cluttered to the average user.

The major change was they removed the code that marked downloads as untrusted. So when a hostile website silently saved an executable file called Safari.exe (directly to the users desktop) there was no untrusted flag. No other browser on Windows works this way; IE, Firefox, Chrome and Opera all mark downloaded files as untrusted to prevent them from being accidently run without a user notification. Safari on OS X marks downloaded files as untrusted so that users are shown a notification. But the port removes this basic functionality. And taking away that safe guard makes it a lot easier for malware to be installed on Windows when a user is browsing with Safari - not just the Safari specific exploit that silently downloaded files, but also the wealth of executable malware that likes to pretend to be a legitimate file (such as websites that attempt to give users an executable file in lieu of a promised video or torrent download)

about 2 years ago

$13 Txtr Beagle Ebook Reader To Sell For $69

Michalson It needs the companion app at $69? (79 comments)

It really doesn't take a lot of power to read an eBook. Some of us have been doing it since the Palm days (for reference I had no problem reading eBooks on a 4MB Palm IIIx, which used a 16 Mhz low power SoC version of the CPU that powered the Apple Lisa).

Reading the specs for the device it seems that its 4 GB of storage are used to hold 4 bit uncompressed bitmaps - the companion app must render each page as a bitmap, send it to the device by bluetooth and then the device just dumps it on the screen with no processing power at all. That would seem to be the 'cost savings': take out the CPU and RAM and replace it with a simple 8 bit controller linking BlueTooth, flash and display, or at least that must have been the original sales pitch before anyone actually sat down to design it.

By comparison a $30 photo frame contains a CPU powerful enough to decode JPG files fast enough to display them as a slide show. That's more powerful then the Palm at half the cost of the Beagle. Part of that is because the cheap ARM CPU inside costs under $2 and has all the power you could need.

I think the simple truth is that 80-90% of the material cost of the Beagle (and it's competitors like the entry level Kindle, Nook, Kobo models) probably comes from the eInk screen and the NAND memory. There just wasn't a huge savings to be had by eliminating the CPU and RAM. They seem to have saved $10 after markup over their competitors (who not only have CPUs but touch screens and rechargable batteries as well). This seems like a pie in the sky sales pitch that wasn't aborted as soon as they discovered the cost savings where not there.

about 2 years ago

Can Valve's 'Bossless' Company Model Work Elsewhere?

Michalson Nope (522 comments)

Valve has been in the unique position of having some hit titles in the past that they had good publishing deals on. That's given them the financial cushion to run things however they wanted with whomever they wanted, without any of those pesky obligations most developers have to meet to pay the bills. And then of course they stumbled onto Steam, the patching platform turned online store where they get a cut of all the other developers profits.

To highlight a similar scenario, 3D Realms was able to dick around for almost 15 years (1996-2009) thanks to the big pot of cash they had from the first Duke 3D game and a few farmed out expansions. We know for sure now that those years where not spent under some masterful system of management creating the most polished game ever, they where terribly managed years in which the same game was reinvented every 4-6 months everytime Broussard saw a new game.

Valve management is certainly not the disaster that was 3D Realms, but at the same time it's very hard to apply their near-zero management style without also having access to their near-zero financial obligations. Valve can afford to mess around in the kitchen for years tossing meal after meal into the garbage until they have something they like. Other developers have to feed their family tonight.

So I guess what I'm saying is that regardless of whether the bossless model works for Valve, other companies have to actually produce games on time and on budget. Where exactly is Half Life 3...

about 2 years ago

Ask Slashdot: Data Storage Highway Robbery?

Michalson Re:it's not really just storage (168 comments)

To expand on this Salesforce.com has two different blocks of storage allocated for any Salesforce instance. One is data storage which is for tables and you start at 1GB for your database. This is where the quote of $3000 for each additional GB comes from. The other is file storage, where you save PDFs and other record attachments. You start off with 30GB and it is much more in line with normal cloud data storage prices. Your usage of both is displayed seperately on your companies Salesforce admin page.

As the parent said the cost of that 1GB is not really the disk space but the expected transaction cost in terms of servers. The number of bytes shown as used is not even based on any actual disk usage (this would be complicated with table structure, overhead, indexes and fragmentation). For most tables they use a formula of 2KB per record - it doesn't matter if it's an contact record which is probably stuffed with much more then 2KB, or a very simple custom sales record containing a name and a dollar amount. There are a few special tables that are treated at 512 bytes per record, like the table containing chatter updates (Salesforce.com's social media like notifications). Taken all together this means that the "1GB" of data allowance is really 250,000+ records, depending on how much is chatter vs. actual records and not anything related to disk space. It's just easier to explain it as 1GB to a management person rather then as a complex relationship between records, transactions and indexes.

more than 2 years ago

Ask Slashdot: What Would You Include In a New Building?

Michalson One small thing (422 comments)

You've got lots of answers about cabling, some for cooling and a few for power. One tiny thing you don't want to overlook is the door. You should ensure there is a plus sized pathway (check for tight turns) all the way from outside the building to the computer room where you'll have an extra tall, extra wide outward opening door. If you are building a smaller room this is really important since it may become impractical to disassemble a rack and reassemble it in such a small space (remember that there will be other running equipment you don't want to accidently knock about). Also make sure you have a properly sized ramp (and that the ramp is factored into any path and turn calculations) if you have steps or a raised floor. Unless there are security considerations a good setup would be for the server room door to be close to a large side door which in turn is close to the server rooms air conditioning units (when there is eventually a problem it would be terrible for the repair guy to have to walk back and forth through a machineshop to fix it).

more than 2 years ago

Malicious PhpMyAdmin Served From SourceForge Mirror

Michalson Which is the scary part? (86 comments)

A widely used web package has a backdoor inserted.


One of the regional mirrors of the largested software respository containing tens of thousands of projects is either hacked or was a plant from the start.


The backdoor code looks to be the work of someone who learned PHP on Monday.


Honestly, the only way it could have been more obvious is if the file was called backdoor.php. There was no attempt made to disguise the location or what the code was doing which is why it got caught so quickly. A complete amateur got caught with control over a chunk of Sourceforge downloads. In computer security when you find a breach you don't just close the obvious point of entry, you have to take a big step back and seriously ask 'what else was compromised'. In this case the big question is who else.

If this clown could do it and didn't get caught until an end user saw the stupidly obvious file and its stupidly obvious code (as opposed to a server log or other Sourceforge audit turning it up) what are the competent hackers up to. Real backdoors are blended into the existing code instead of being added as a seperate file. Real backdoors are designed to be hidden from casual inspection instead being completely obvious in their function and 'I don't belong here status'. Really good backdoors are designed to not look like intentionally malicious code even after they are found (ex. the wait4 backdoor attempt in the Linux kernel was pretty good, it got caught because the CVS hack used to insert it in a regional CVS mirror was flawed in several ways that raised alarms).

So, what kind of security/procedure/audit could have been in place, needs to be in place, so that something like this will raise an alarm even when the hacker isn't the most incompetent backdoor author in history? What kind of audit is needed to be sure it hasn't already happened?

more than 2 years ago

Google Pressured Acer/Alibaba Because of Android Compatibility Issues

Michalson Is this what Microsoft did in the 90s? (255 comments)

In the 90s Microsoft was accused of and then convicted of monopoly behavoir against OEMs to push OS/2 (and other PC OSs) out of the market in favor of Windows.

Back then Microsoft provided 3 choices for OEMs:

  • 1. Don't play with Microsoft at all (sell PCs with OS/2 or other OS, operate as a niche dealer)
  • 2. Play with Microsoft but without a club membership (buy Windows licences at full price, sell however they want)
  • 3. Join Microsoft's club (get discounted licences but pay them on a basis of one licence per computer regardless of actual configuration)

Microsoft argued that this was not anti-competitive; they claimed the discount simply represented Microsoft not having to keep track of individual licences and that OEMs where free to buy licences individually instead. They lost that argument because it was found that since Windows already had a majority market share (for the time being) an OEM had to load Windows on a majority of their systems to satisfy consumers. Because of the pricing scheme OEMs could not be competitive with other OEMs if they took option 2, forcing them into 3 where Microsoft's terms made it uncompetitive to sell PCs with another operating systems. So Microsoft was convicted under the Sherman Antitrust Act.

Let's look at Google and its club the Open Handset Alliance (OHA):

  • 1. Don't use any official Android distributions (operate as a niche/self-supported market, ie. Amazon)
  • 2. Use any combination of Android and forked android-derived distributions, but can't join the OHA
  • 3. Join the OHA and use only an official Google Android derived OS

The official Android distribution can be seen as something wanted by the majority of customers (looking for a non-Apple/Microsoft or a inexpensive phone) at this time (unless you have something else big enough to get people to come to you, like Amazon) so most Android/android OEMs would be giving up the majority of their customers if they dumped official Android entirely; that removes option 1. Much like the licence discount a membership in the OHA represents a major competitive advantage - the OEMs are already way behind in keeping official Android up to date in their design and production pipelines even with that inside track and help from Google. An OEM on its own trying to make an official Android device is thus at a large disadvantage against OEMs that are part of the OHA. This makes option 2 uncompetitive, forcing any serious OEM into option 3. Option 3 goes even farther then Microsoft in the 90s - it doesn't just apply a tax, it outright bans the alternative.

So does the same 90s logic applied by the court - that regardless of Microsoft/Google's excuse for the 3 choices it isn't really a choice at all, and that the only viable choice blocks competition - still apply today?

more than 2 years ago


Michalson hasn't submitted any stories.


Michalson has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?