Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Perpetual (Score 2, Interesting) 61

Having spent a whole hell of a lot of time lately on Gnome, configuring it and testing various configurations for rollout at the company I work for, all I can say is that it just works. There's a browser, and bizarrely, printers just work on Linux now in a way they just used to work on Windows, and it's now Windows, at least in an enterprise environment, where printing has become the technical equivalent of having your teeth filed down. Where work does need to be done is on accessibility, so we have one staff member who will stick with Windows 11 for now. Libreoffice's Calc is good enough for about 90% of the time, and Writer about 95%. We remain open to Windows machines for special use purposes, but most people after mucking around for a bit are able to navigate Gnome perfectly well, since once they're in the program they need to use, what's going on on the desktop is irrelevant.

On the enterprise back end, supporting global authentication has been around a long time, and if you only have admins who know how to navigate a GUI, then you have idiots. The *nix home folder is infinitely superior in every way to the hellscape that is roaming profiles, so already you're ahead of the game.

Comment Re:registered-only list. (Score 1) 43

Phone-to-provider encryption seems like a better option. The only unencrypted information to start with would be your provider's ID, so your traffic is routed to their systems for decryption. Basically... my best current guess for greater security? Give up your mobile phone number, use data and a VOIP app. Then the cops will have to get a warrant (assuming your VOIP provider worries about that) not only to know the content of your conversation, but even to know who you called.

You're never going to be able to hide your phone ID and location with current cellular technology, though. You're not connecting to a tower at all unless it knows you're a valid client, and once you connect to a tower they at least know your general direction (most towers have antennas facing each direction, and aren't omnidirectional) and can guess your range. If you hit three or more towers, they can start to approach GPS accuracy pinning you down.

Long before you have to worry about all that, the cops will already have you under surveillance. Every box on every pole around your usual hangouts could be a camera and mic. They could have put devices in your car or home. And I wouldn't bet on them waiting on a warrant to do these things. The warrant will come when they think they'll need to use the information in court and might get called on it.

Comment Re:"Abstraction: Towards an Abstracter Abstract" (Score 1) 110

What we need is a 2nd study, using 400 students, separated into four groups:
1. Using Google ONLY by looking at the 3rd page of results (the first two pages are now taken up with Gemini AI and targeted advertising).
2. Using ChatGPT Only.
3. Using inventory computers in a large metropolitan library
4. Using old fashioned card catalogs and books.

I wonder if we chose a significantly esoteric subject, with a 100 question exam given after a week, if any useful clustering could be detected.

Comment Re:So, yeah for microkernels? (Score 4, Interesting) 36

That just about sums it up. Moving drivers into user land definitely reduces the attack surface. As it stands, antivirus software in most cases is essentially a rootkit, just one we approve of because that low level access allows it to intercept virus activity at the lowest level. With a microkernel, nothing gets to run at that level anyways, so microkernels are inherently more secure.

Traditionally the objection to microkernels was they were slower, since message passing has a processing cost in memory, IO bandwidth and CPU cycles. In the old days where may you had a couple of MB of RAM, or even 8 or 16mb of RAM (like my last 486), with 16 bit ISA architecture and chips that at the high end might run at 40-60mhz, a microkernel definitely was going to be a bit more sluggish, particularly where any part of that bandwidth was being taxed (i.e. running a web stack), so Windows and Linux both, while over time adopting some aspects of microkernel architecture (I believe Darwin is considered a hybrid), stuck with monolithic architecture overall because it really is far less resource intensive.

But we're in the age when 16gb of RAM on pretty high end CPUs where even USB ports have more throughput that an old ISA bus, that I suspect it may be time to revive microkernels.

Comment Mining+power (Score 1) 22

I guess the logical next step is to capture the heat output as hot water, concentrate the heat somehow (or heat the water a bit more) and use steam to drive a turbine producing electricity. Ye cannae break the laws of physics, but it should be possible for a datacentre to recoup at least part of its electricity costs this way? Essentially a steam-driven power station where the heating element is a bank of GPUs with water running over them.

Comment Re:Interesting game of chicken (Score 1) 70

Well, at my workplace we're opting out of the game entirely. Other than a few machines that require Windows for accessibility or specialized apps, we're moving over to Linux. I test-ran a few different distros, and settled on Debian 12. With a few images and Clonezilla and a bootable USB stick, I've started eliminating Windows 10 from most machines. There's some training that needs to occur, but so far nothing has exploded.

We have perfectly good machines that even if we wanted to upgrade (which we don't), would basically be thrown out, and this dude won't abide that.

Slashdot Top Deals

"I think trash is the most important manifestation of culture we have in my lifetime." - Johnny Legend

Working...