Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re:Was anyone else imagining... (Score 1) 277

Dr. Freeman worked in the anomalous materials lab, and his team was given a sample of "stuff" and had to figure out what it was based on its observable properties.

This is the opposite case: the material's identity is known, but its properties are not.

Therein lies the rub of anomalous materials: you don't know if the anomalous material will do something unfriendly like detonate when any given test is performed.

Hence, the hazardous environment suit and heavily armored chamber deep underground in an unpopulated desert.

Comment Re:Finally! Will it last for AMD? (Score 1) 281

I'm hopeful that AMD will be able to press this new design into better performance than Intel can manage with their current technology at this price point.

Your optimism is cute, but unwarranted. AMD won't really be a threat until they can easily beat Intel at every performance level, price be damned.

Intel has no problem dropping prices to match the price/performance of anything AMD does. Inel is able to demand the prices they currently do because of AMD's decade-long streak of incompetence. Intel knows they can charge more because AMD isn't a threat.

If you want to know what Intel does consider a threat, you have to look at the ARM architecture (and ecosystem). Granted, ARM isn't a single company, but that's part of Intel's problem: Competing with ARM is fighting a Hydra - one company's failure doesn't really affect the ecosystem much, and the combined might of all of the ARM licensees ensures its viability.

ARM has almost perfect dominance for everything mobile and embedded - a market Intel has been trying desperately to enter, with zero success.

Comment Re:Yet more skewed bullshit testing from AMD. (Score 1) 281

You're saying a comparison to a CPU core nearly a year older is a fair comparison?

The story hasn't changed in nearly a decade: AMD boasts they have "massive" performance gains over their old hardware, and that they can selectively beat Intel's old hardware.

The problem is that Intel invariably has its own improvements, and they easily beat AMD's best-case hype.

I really would like to see AMD return to beating Intel's chips, but this doesn't leave me hopeful.

Comment "Bug that takes forever in generating keys" (Score 1) 216

TFA reads like a classic example of "User refuses to learn to use screwdriver, complains all fasteners are hard to use."

* Author seems to think encryption is a simple magic bullet.
* Author doesn't even bother reading the manual for the tool.
* Author reviews only one tool in a large family of tools, blames the entire family of tools for his own ignorance and incompetence.
* Author doesn't know about the problem space, has expectations that reveal a tragic level of misunderstanding.

The bottom line is encryption is easy.... authenticity is not.

Without authenticity, encryption isn't terribly useful.

Authentication isn't a problem that's been remotely solved. If you have a better idea than the following two, you're going to make a fortune:

- A web of trust requires real effort on the part of the user to work - you have to attend a few keysigning parties for it to work. Even then, can you really trust a web of trust?
- A trusted third party model assumes a third party is actually trustworthy -- which experience has shown isn't really the case.

Comment Re:PKI itself is the culprit (Score 1) 216

But if the PKI infrastructure makes it really hard to manage certificates, there's not a lot the mail user agent can do about that!

I've been using PKI infrastructure for about as long, and my experience has been very different, even with non-technical users.

I'm curious what issues you're running into that makes it "really hard to manage certificates." Perhaps your definition of difficult differs greatly from mine..

Comment Re:So much doubletalk and bullshit ... (Score 3, Interesting) 68

So it wouldn't surprise me at all that the banks want to negotiate a lower service fee (much like the UK and Russia have done).

I have zero sympathy for the stores, however, whose motivation is clearly to track their consumers, and sell the invormation. You know, little things like tracking what we spend, what we buy, how much we spend, where, what time, and so on. Very much like how in the days before EMV, the magstripe on a credit/debit card was (and still is) used to track consumers in the US.

It's shockingly invasive (and creepy) to start getting advertisements for baby needs the same week I bought my first Baby bottles in anticipation of my firstborn. My transaction information was clearly bought and sold. Who needs Big Brother to watch when every major store and payment provider is just as invasive.

Comment Re:180 from "Don't be evil" (Score 1) 229

This is complete opposite from "Don't be evil". This is outright intrusive and evil.

Big brother is real... he's just not a government employee, nor does he work for Apple or Microsoft.

When Google does absolutely anything that's pro-user and pro-privacy at the cost of advertiser intrusiveness, I'll re-evaluate that statement.

Comment Re:Connected devices (Score 1) 229

I'm generally in the camp of "If your 2nd factor is an app you're doing it wrong".

2nd factor is pretty worthless if it doesn't require human interaction, otherwise, you get malware working with a keylogger to silently connect over Bluetooth and obtain valid 2nd factor as long as you're within range.

Slashdot Top Deals

"Consistency requires you to be as ignorant today as you were a year ago." -- Bernard Berenson