Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Irish Politician Calls For Crackdown On Open Source Internet Browsers

iYk6 Re:I think I speak for us all... (335 comments)

He starts by condeming browsers and proxies that help people browse the internet anonymously. Then he jumps to saying that anonymous browsing leads to trading drugs, weapons, and pornography. Then he commends the USA NSA for spying on Americans but is concerned that now that they have been caught Americans might do something about it.

about 8 months ago
top

Speed Test 2: Comparing C++ Compilers On WIndows

iYk6 Calling home threw off the results? (132 comments)

Did calling home really throw off the results? Since that is something that ordinary users would have to put up with, I would think it should be part of the test. It might be difficult to get an average, but testing Intel's compiler only when it is at its fastest doesn't seem fair.

about 10 months ago
top

2-D MMOG Glitch Released Completely Into the Public Domain

iYk6 Re:Cue Zynga code steal in 3 2 1 (70 comments)

How exactly would one steal a public domain work, even for a loose definition of "steal?"

about 10 months ago
top

GCC 4.9 Coming With Big New Features

iYk6 But but Google? (181 comments)

But then how would Googlebot know that Phoronix is really great and popular and they should rank it higher in searches?

about 10 months ago
top

Call Yourself a Hacker, Lose Your 4th Amendment Rights

iYk6 They do have the ability to release code silently. (488 comments)

The tipping point for the Court comes from evidence that the defendants â" in their own words â" are hackers. By labeling themselves this way, they have essentially announced that they have the necessary computer skills and intent to simultaneously release the code publicly and conceal their role in that act.

Sounds reasonable. Anyone with an intermediate understanding of computers and the internet would be able to publish something silently. Create an account with a seedbox, upload file, upload torrent to thepiratebay.sx.

It looks like all they did with the "hacker" identification is determine that they were intermediate level with computers and networking.

Judging from the summary, this is a standard courtroom procedure, and the submitter is trying to sensationalize it by leaving out all of the other evidence.

about a year ago
top

Should Google Get Aggressive About Monetizing Android?

iYk6 Not if they know history (168 comments)

History is ripe with companies that built a product that does something different, and in ways better, than the competition. And once their product is successful, they try to emulate something that somebody else does, and their product share slowly declines as their users realize there is no longer anything special about the product.

Look at Firefox. It was a faster, lighter, less annoying and extensible browser. Over time, it slowly got bulkier, slower, and in some ways buggier. They annoy users by panicing any time a certificate is signed by an authority not on the list. When Google released Chrome, Firefox decided they wanted to have a Chrome-like super fast release cycle, which hurt extensions. Users are slowly leaving Firefox for other browsers, especially Chrome, as Firefox becomes less and less special.

If Google locks down the OS and prevents users from installing their own applications, then Android will no longer be special. People will still use it, since it's still a smart phone and devices will be cheaper than Apple. But as soon as a competitor comes along that offers what Google used to offer, users will quickly leave, and within several years Android will be a memory.

about a year ago
top

Several Western Govts. Ban Lenovo Equipment From Sensitive Networks

iYk6 How would we know? (410 comments)

No evidence has yet been presented to back the claims...
Is it fearmongering?
Or is there some legitimate basis for the ban?

How would we know whether or not evidence exists? All we know is that we haven't seen any. Time will tell. If no evidence is preseneted in the next month or so, then we'll know that it's just fearmongering, and not a legitmate basis for a ban.

about a year ago
top

NSA Utah Data Center Blueprints Reveal It Holds Less Than Thought

iYk6 Obviously the previous reports were wrong (197 comments)

Obviously the previous reports were wrong. Anybody familiar with computers and storage space knew that the numbers reported by NPR and other "news" outlets were ridiculous. They were saying that the center would hold 5 zetabytes, and would only cost $1.2 billion! That's about 25 cents per TB.

Best I could tell, NPR et al misunderstood a Wired article from over a year ago. In the Wired article, somebody said that they would eventually like the processing power in the center to exceed 1 exaflops, and then maybe someday after that 1 zetaflops.

about a year ago
top

Google Storing WLAN Passwords In the Clear

iYk6 Surprising? (242 comments)

the fact that Google can read them (and disclose them if forced by 'law') is a bit surprising, too put it nicely.

That's not just nice, that's outright flattery. Seriously, who is surprised by this? Lots of cloud backup storage services don't let you encrypt data (or make it hard to do so), so why would it be surprising that Google, the mother of all data hoarders, would want to store and read this stuff?

about a year ago
top

ISPs To Censor Porn By Default In the UK By 2014

iYk6 Re:Why not block other things by default, too? (310 comments)

Block the whole internet by default. Customers have to submit a list of checkmarks letting the ISP know what they would like to have unblocked.

about a year ago
top

New CFAA Could Subject Teens To Jail For Reading Online News

iYk6 This reminds me... (230 comments)

This reminds me of a female blogger several years ago after that tennager suicide case. She reported that she heard match.com didn't allow married people to use their site. She said that couldn't risk confirming this herself, since she was happily married.

The point is, how are you supposed to know if you are allowed to use a site, if you can't even read the terms of service without risking violating the terms of service?

about a year and a half ago
top

Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot

iYk6 Samsung laptops (154 comments)

UEFI has been implicated in the death of Samsung laptops running Linux.

That had nothing to do with Linux, and UEFI had no fault in that. The problem is that Samsung wrote a serious bug into their UEFI implementation that causes the laptop to brick if the user does X, Y, and Z under any operating system.

about a year and a half ago
top

IBM Designing Superman Servers For World's Largest Telescope

iYk6 Re:26 petabytes? (67 comments)

Agreed. There are roughly 100 million internet enabled households in the United States. If each of these sent and received, on average, 1GB per month, that's 100 PB.

about a year and a half ago
top

Can You Do the Regular Expression Crossword?

iYk6 That's not right (115 comments)

For example ... an * [matches] any number of characters and so on.

No. That's shell expansion, not regular expression. To match any number of characters, you would use ".*".

about a year and a half ago
top

Online Ads Are More Dangerous Than Porn, Cisco Says

iYk6 Risky != Risky??? (110 comments)

The popular belief is that security risks increase as the user engages in riskier ... behavior online

So security risks don't increase as I engage in risky behavior? How does that even work? If something doesn't increase risk, then it isn't risky. I can start downloading and executing everything I see without increasing security risks?

about a year and a half ago
top

Fukushima's Fallout of Fear

iYk6 Re:This is about information policy (124 comments)

Or even more reason to be afraid...IIRC part of the problem was they weren't telling people how bad it really was wasn't it?

That was the problem. By lying, officials were indirectly telling people that the nuclear disaster was so bad that they had to lie. Plus, not knowing how bad it is adds another layer of stress.

about a year ago

Submissions

Journals

iYk6 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>