Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:$5.74 == Wow hardware resources have become che (Score 1) 57

under 1 hour... so let's assume half an hour... that is still like $250 a day for a cluster like that could be built for under $10,000... break even is within 2 months of use including electricity, so really those prices are still pretty high, it's just that most people only need that kind of power for short bursts of time.

the great Google App Engine vs. Amazon Elastic Beanstalk wars are coming.

$10,000 barely gets you ONE modern well-equipped 20 core server system (I am thinking in particular of the Dell R820/R920 platforms) so no, while you could probably heap together 100 or so ARM cores for $10/core and get something to run on it, a supercomputer it is not.

Comment Re:This will hugely backfire... (Score 1) 422

You average GOP voter strongly values privacy and will not look kindly at this kind of targeted approach.

Your average [either party] voter is already mined and targeted at _every_ election, whether they know/like it or not. And somehow there hasn't been a revolt. The difference in this particular effort is really just the story's presence on Slashdot.

Comment Re:Trust but verify (Score 2) 211

If I were personally going to use one of Tesla's patents in my business, I'd want a signed zero-cost GPL-like license agreement with Tesla. For example, Musk's good will is nice, but what if someone else were to acquire Tesla's IP?

To that end, "good faith" doesn't have a history in patent law; he could take anyone who was using the patents to seriously compete or encroach on Tesla's existing market share as lacking it, and there would be no recourse.

Comment Re:common practice (Score 1) 120

This happens all the time amongst competitors. It doesn't mean they want to reverse engineer or violate patents; it is usually so you can educate yourself as to what your competitors are up to and make sure that you're staying competitive.

Rather, aside from maintaining competitive positioning, they are probably looking for anything novel that hasn't been patented yet, so they can copy it (and perhaps patent it themselves). Not every invention is patented or even patent worthy but it still could be valuable.

Comment Re:Twas Ever Thus (Score 2) 120

What about pre-release/beta products that aren't commercially available and haven't started shipping yet?

Even better! Really if that's true then the VAR was clearly given too much trust in who it decides to sell pre-release products to. They should go to established customers with a good history of cooperation, not just anyone who asks. All I can say about this story is "and I bet Juniper is doing the same thing".

Comment Re:Competition Sucks (Score 1) 507

That's not the case with commercial car sharing because they only get to tag along. I would not go to their destination if I wasn't going there anyway.

That's an assertion so dubious it's hard to know where to start. I suppose that it would be fair for lawmakers to mandate a lie detector feature in your car when you are driving for Uber, to ascertain if you are really driving of your own direct will, or acting based on the guy in the back seat who just agreed to pay you by the minute.

Comment You had me going there (Score 1) 120

ACM seems like a reputable publication so I was going in to it thinking I was about to read some interesting stuff, and then this happened:

Even the time of day can be exploited. In 2013 a network attack known as NTP Amplification used Network Time Protocol servers across the Internet in a distributed denial-of-service attack. By spoofing the IP address of a requester, an ever-larger stream of packets could be aimed at a target, swamping the target's ability to respond to TCP/IP requests.

lolwut. The time of day was not exploited, not even a little. The boneheaded "Feature" of having a command to recall a large chunk of data via unauthenticated UDP was exploited. They go on to explain a basic denial of service attack and finish it off by misusing a term as basic as TCP/IP (it doesn't matter what protocol you are using when you are the target of a DDOS, your pipe is blocked period). I will go ahead and stop reading now.

Comment Re:Android phones are also more secure. (Score 1) 711

Nah. An app could ask for your firstborn and plenty of people will still click through install it. Nigerian 419 scams don't work for no reason.

You are _still_ missing the point. This has nothing to do with user behavior. The apps are being designed, by the software developers, to touch fewer pieces of "sensitive data". Presumably (though there is no hard evidence to support it) this is done because developers prefer to have a cleaner permissions sheet, since in Android it is seen by every user at install time. So given two equally oblivious users, one with an iOS device and one with an Android device, if they fire up the same app the Android user is less likely to leak sensitive information in some way because the app itself is better behaved. Of course there are plenty of other vectors for it to happen (on both platforms) but in the context of the study in question, this is a data-supported fact.

Comment Re:So that you don't have to RTFA (Score 1) 286

There's a fire. The firepeople can park in the middle of the street and run a hose past your car.

I'm guessing its because they won't be able to **see** the fire hydrant rather than be able to physically get to it. We have "H" fire hydrant signs on the pavement (US: sidewalk) in highly visible locations to indicate hydrants which are usually accessed via flat metal panels in the ground.

A fair compromise would be an understanding that if there is a fire, the firefighters can run the hose *over* your car to get where they need to be. Seriously, have you seen a 6" fire hose in use? It's not like they get a real choice in which direction it goes: under pressure you can't make cute little S turns to get around vehicles, you lay it as straight as possible from the hydrant to the fire.

Comment Re:So that you don't have to RTFA (Score 1) 286

In US cities you can only park where there is a parking space explicitly drawn

Well, this isn't really true, it varies by state and city but a lot of times parking spaces are not drawn (it seems to me they are usually only drawn if there are parking meters, but that is convention, not law).

The most important rules are to look at the curb color; if it is painted red, or yellow then you can't park there for example; then make sure you aren't parking in front of a driveway, because then you won't just get a ticket, the owner will have your car towed; then another important rule is never park next to a fire hydrant. That is so if there's a fire, the firemen can get to it.

Next, if you have picked a spot to park that isn't explicitly allowed (via a meter) scan up and down the street for any signs with arrows on them. They probably contain fine print about specific parking restrictions (standing but no parking, no stopping certain times/days, etc) and then look for "permit parking only" or better yet eye any other cars for identical hanging tags or stickers to see if you have found yourself in a permit area. Yes, inner city parking (in just about every city of any appreciable size) is such a nightmare that it's really no wonder anyone with a little bit of money flees to the suburbs.

Comment Re:So that you don't have to RTFA (Score 1) 286

I thought all hydrants were dry-barrel. The firemen remove the side caps and connect hoses, then open the valve using the large nut on top of the hydrant. The valve itself is below ground at the water main, connected by a shaft to the nut.

The reason crashing into the hydrant causes the geyser is because the valve is either broken by the impact at the top of its shaft, or the shaft is sheared off and the stopper in the valve is pushed out by water pressure.

That's how it was explained to me anyway. Maybe other systems are different.

If the valve is not on OR under the hydrant, but under a main shutoff cover (as described) then the issue of hitting the hydrant is nonexistent; you can rip it clean out of the ground if you want and water will still not come out unless you rip out the main shutoff too.

Comment Re:So that you don't have to RTFA (Score 1) 286

I do find the whole fire hydrant thing in the US a bit odd - we have hydrant points here in the UK, but they are below ground with a small manhole cover over it, and are also positioned so they cannot be trivially blocked (either in the road, or on the pavement). We don't seem to have any major issues with inaccessibility, so why the US?

It's not a question of the hookup being completely inaccessible, it's a question of it being accessible enough to quickly service both sides of the street (as hydrants are generally only installed on one side). So, no parking next to them, and firefighters have a decent chance at getting hoses hooked to pump trucks or run across the street to fight a fire.

Comment Re:Android phones are also more secure. (Score 1) 711

Hand-balling security to the end user, when 90% of end users are muppets will not work, as demonstrated by the malware success on the Windows platform. Android is the Windows XP of smartphones. The rest of the world has tried that approach for the past 30 years, seen that it is not viable, and moved on. End users are not, and will not ever be, or care to be security experts. Apple gets that. Microsoft is beginning to get that. Android fans who say that leaving security stuff to the end user do not get that. Yet. It will come.

Except, the article he quoted said nothing of putting an actual security requirement on the user. Instead, the mere notion that the app will present all of its permissions at install time seems to be pushing the developers to limit what they ask for in the first place. Security by design is a Good Thing. Cyanogenmod, for those who really want to bite off a big piece of the pie, is an entirely different conversation.

Slashdot Top Deals

Work continues in this area. -- DEC's SPR-Answering-Automaton

Working...