http://www.cs.auckland.ac.nz/~pgut00...vista_cost.txt
Might have been posted before, but its had an update![]()
http://www.cs.auckland.ac.nz/~pgut00...vista_cost.txt
Might have been posted before, but its had an update![]()
No matter how hard they try, I get the sense that large corporations have a certain nack for shooting themselves in the foot. o_O
Back to Ubuntu it is for me then.![]()
He does make some exaggerations to re-inforce his case (I can't imagine why a computer in a medical or military application would be running apps that setup a MIG session and turn on the DRM junk), but he does make some very good points. TBH, I hadn't heard of these nefarious PVP-OPM and PVP-UAB 'features' before reading his article and they do appear to be dangerously loony ideas from an obsssesive-compulsive.
These measures also seem to be missing the point. We already know that the entire mechanism can be compromised simply by debugging the app. What have they done to prevent someone simply running a kernel debugger on 32-bit Vista?
funny story thoughSay you've just bought Pink Floyd's "The Dark Side of the Moon", released as a
Super Audio CD (SACD) in its 30th anniversary edition in 2003, and you want to
play it under Vista. Since the S/PDIF link to your amplifier/speakers is
regarded as insecure, Vista disables it, and you end up hearing a performance
by Marcel Marceau instead of Pink Floyd.![]()
Originally Posted by Advice Trinity by Knoxville
He neglects to mention that all hardware SACD players turn off the S/PDIF output as well (when playing an SACD) - not that it would be of any use, as SACD doesn't use PCM. Some of the examples he uses just harm his argument by showing ignorance.
There are currently 1 users browsing this thread. (0 members and 1 guests)