Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:What if I get hungry? (Score 2) 394

If you've got a better way to toast a cheese sandwich while watching tv, I'd like to hear it.

If it doesn't involve lasers, flamethrowers or nuclear reactors, it's not a good was to toast a cheese sandwich.

Didn't you read the stub? Four nuclear reactors!

Speaking of which, I think that means cable boxes are carbon neutral, since they are apparently powered by four giant nuclear reactors. So, I can finally stop buying carbon credits for my cable box carbon footprint! Hooray.

Comment Re:Kind of see their point... (Score 2) 207

Site uses the Ikea logo and colors and contains no disclaimer. I can see how people could mistake it for an "official" site.

There's a right way and a wrong way to do this. Sounds like they have chosen the wrong way.

Because a C&D is somehow damaging to the "IkeaHackers.net" brand beyond the obviously untenable position regarding their name? If IkeaHackers is serious about operating in good faith they will choose a similar but un-infringing name and go on with their lives. The wrong way would be a C&D followed the next day by a court order and the day after by a subpoena and lawsuit.

Comment Re:What happens if (Score 1) 281

Unless there is some sort of "yeah, it's just DSL speeds, but we do something really clever upstream to make it as hard to DDOS as a connection a million times as fast" service, that might actually be how Amazon, Azure, or any other web-services-oriented rental service could manipulate the bitcoin scene:
 

I believe (but am not an expert) that the mining pool concept is what accounts for this. The pool (one main server assigning jobs) runs on a nice fat, multi-homed system with plenty of bandwidth in every direction. Then, the ASIC-based miners sign on to the pool and do the crunching for it. This has the effect of both allowing the pool to maintain constant operations, and to hide the ASIC miners from public view.

Comment Re:What happens if (Score 1) 281

I wonder what happens if someone with more than enough CPU power to get 99% of the mining jumps in one night. What kind of Damage could they do in a short interval before people notice? What if their goals were not to steal bitcoins but rather to snatch all the coins from, say, Kim Jong Un, or Al Queda. E.g. for example the NSA or Samsung or Saudi arabia. They would not care about the loss of value in their stolen coins, the point is to deprive an adversaries use of them.

Does the Amazon or Azure networks have enough rentable time to pull this off?

Custom made ASICs are so much more powerful than GP CPUs that no, I doubt all the rentable cloud capacity currently in existence (if you could manage to muster it) would compare to the mining capacity in use via ASICs.

Comment Re:This is what we've warned you about (Score 1) 281

Mining pools and custom hardware do make it possible for a large enough group to get over 50%, especially as the need for mining hardware crowds CPU and GPU miners out of the game. We'll see whether they decide it's more useful to stay over 50% and cheat, stay over 50% and not cheat, or split the pool into two or more pieces to keep the value of their Bitcoins higher than they would be if the market abandons Bitcoin because of perceptions of cheating.

Postulate 3 (split the pool up) raises a very interesting question: if the operators are anonymous, can the pool ever be split in such a way that we are sure the same group doesn't control both pools? With clandestine collaboration, two pools totalling over 50% of the total could perform the same treachery that a single pool would. Since we don't know who controls it, how do we know who *doesn't* control it, or does it matter?

Comment Re: $5.74 == Wow hardware resources have become ch (Score 1) 57

I can get 8 core systems sub $1k. It depends on the type of hardware really which it doesn't specify; 20+ cores in a single machine has been available since at least the turn of the century they always cost an arm and a leg though because of the complexities of integrating that many CPUs in a single machine. A combination of boxes amounting to the same amount of CPU, RAM etc has always been cheaper but also larger and harder to use.

The less you spend per core (by having them less concentrated) the more you will spend on interconnecting them in a way befitting a supercomputer (i.e. massive parallelism). A pile of machines totaling 600 cores on a gigabit switch is of very little use compared to a few mega-core machines on a better, smaller network. And you don't want to know how much all the fabric would cost to properly integrate all of those 8 core systems.

Comment Re:$5.74 == Wow hardware resources have become che (Score 1) 57

under 1 hour... so let's assume half an hour... that is still like $250 a day for a cluster like that could be built for under $10,000... break even is within 2 months of use including electricity, so really those prices are still pretty high, it's just that most people only need that kind of power for short bursts of time.

the great Google App Engine vs. Amazon Elastic Beanstalk wars are coming.

$10,000 barely gets you ONE modern well-equipped 20 core server system (I am thinking in particular of the Dell R820/R920 platforms) so no, while you could probably heap together 100 or so ARM cores for $10/core and get something to run on it, a supercomputer it is not.

Comment Re:This will hugely backfire... (Score 1) 422

You average GOP voter strongly values privacy and will not look kindly at this kind of targeted approach.

Your average [either party] voter is already mined and targeted at _every_ election, whether they know/like it or not. And somehow there hasn't been a revolt. The difference in this particular effort is really just the story's presence on Slashdot.

Comment Re:Trust but verify (Score 2) 211

If I were personally going to use one of Tesla's patents in my business, I'd want a signed zero-cost GPL-like license agreement with Tesla. For example, Musk's good will is nice, but what if someone else were to acquire Tesla's IP?

To that end, "good faith" doesn't have a history in patent law; he could take anyone who was using the patents to seriously compete or encroach on Tesla's existing market share as lacking it, and there would be no recourse.

Comment Re:common practice (Score 1) 120

This happens all the time amongst competitors. It doesn't mean they want to reverse engineer or violate patents; it is usually so you can educate yourself as to what your competitors are up to and make sure that you're staying competitive.

Rather, aside from maintaining competitive positioning, they are probably looking for anything novel that hasn't been patented yet, so they can copy it (and perhaps patent it themselves). Not every invention is patented or even patent worthy but it still could be valuable.

Comment Re:Twas Ever Thus (Score 2) 120

What about pre-release/beta products that aren't commercially available and haven't started shipping yet?

Even better! Really if that's true then the VAR was clearly given too much trust in who it decides to sell pre-release products to. They should go to established customers with a good history of cooperation, not just anyone who asks. All I can say about this story is "and I bet Juniper is doing the same thing".

Comment Re:Competition Sucks (Score 1) 507

That's not the case with commercial car sharing because they only get to tag along. I would not go to their destination if I wasn't going there anyway.

That's an assertion so dubious it's hard to know where to start. I suppose that it would be fair for lawmakers to mandate a lie detector feature in your car when you are driving for Uber, to ascertain if you are really driving of your own direct will, or acting based on the guy in the back seat who just agreed to pay you by the minute.

Comment You had me going there (Score 1) 120

ACM seems like a reputable publication so I was going in to it thinking I was about to read some interesting stuff, and then this happened:

Even the time of day can be exploited. In 2013 a network attack known as NTP Amplification used Network Time Protocol servers across the Internet in a distributed denial-of-service attack. By spoofing the IP address of a requester, an ever-larger stream of packets could be aimed at a target, swamping the target's ability to respond to TCP/IP requests.

lolwut. The time of day was not exploited, not even a little. The boneheaded "Feature" of having a command to recall a large chunk of data via unauthenticated UDP was exploited. They go on to explain a basic denial of service attack and finish it off by misusing a term as basic as TCP/IP (it doesn't matter what protocol you are using when you are the target of a DDOS, your pipe is blocked period). I will go ahead and stop reading now.

Slashdot Top Deals

Only God can make random selections.

Working...