Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:You can't do what you want to do (Score 1) 180

I imagine the way sharedband works is that it's a VPN endpoint. If you use VPNs (essentially creating another IP layer on top of the existing one), you *can* aggregate multiple connections and even get faster single-session transfer speeds.

Absolutely. See my post below:

http://ask.slashdot.org/comments.pl?sid=1406513&cid=29766837

Mod parent up!

Comment Re:www.sharedband.com (Score 1) 180

www.sharedband.com Bonds both Up and Down stream. Layer 3 so you don't have to bother your ISP. I have seen people bond FiOSS with DSL and Cable modems. Sold directly or through your ISP if they offer the service. Reliable and very cost effective.

The best thing (technology wise) with Sharedband is the ability to utilize around 95% of each line speed, even if they're widely mismatched.

I'm far from a sales person for the product (although I do know a lot about it), but it really is quite a cool solution. Upstream packets are redirected to an "aggregation server" (like an endpoint for your VPN) and distributed across 2 or more lines based on individual line weightings - not round-robin (MLPPP fails here).

From the aggregation server the packet headers are rewriten again, changing the source address to the service IP and peer'ed to the Internet, then downstream goes follows the return route back to the aggregation server for distribution across the customer lines again.

Sharedband weights lines separately on both their upstream and downstream - targeting >95% utilization of each line's available up and down bandwidth.

For a site-to-site situation, Sharedband itself immediately provides assistance - upstream and downstream bandwidth is immediately increased (and to an large extent, reliability too). In the situtation that both sites A and B use Sharedband aggregator C (i.e. hosted by some other company), traffic will flow from A to C (being aggregated on the upstream), and straight from C to B (being aggregated on the downstream). Vice versa in the opposite direction.

Of course there's the possibility of you hosting your own aggregation server (purchasing a software license from Sharedband themselves), which would let you host the aggregator in your own datacentre.

A final (and I believe unique) feature of Sharedband is packet resequencing - on the downstream, packets are ensured to arrive in order (as recevied at the aggregator). This lowers TCP retransmission requests etc, and further improves performance against other solutions.

Then again, right tool for the right job. You need to weigh up all the pros and cons!

For those who are geeks - email your questions to support@sharedband.com - they're good guys and they know what they're talking about.

Microsoft

Submission + - Top 25 hottest open-source projects at Microsoft (com.com)

willdavid writes: "By Matt Asay (CNETNews Blogs): Bayarsaikhan has posted the top 25 most active open-source projects on Microsoft's Codeplex site. Codeplex is interesting to me for several reasons, but primarily because it demonstrates something that I've argued for many years now: open source on the Windows platform is a huge opportunity for Microsoft. It is something for the company to embrace, not despise. http://news.com.com/8301-10784_3-9761998-7.html?ta g=head"
Security

Submission + - SmoothWall team release version 3 RC 1 (smoothwall.org)

wallyhall writes: "As the phrase goes ... "As we know, there are no known knowns. There are things we know we know. We also know there are known unknowns. That is to say we know there are some things we do not know. But there are also unknown unknowns, the ones we don't know we don't know."

The GPL Smoothwall project has released version 3 RC1 (codename "Sammy"), and for the first time it's available in both "user" and "developer" editions, for both 32 and 64bit architectures."

Security

Submission + - MI5 terrorist threat "critical" (mi5.gov.uk)

wallyhall writes: "Today MI5's terrorist threat assessment level was moved to "critical" (MI5.gov.uk), the highest it can be. The BBC (news.bbc.co.uk) also has the story.
The level changed from "severe" after 2 attempted car bombings yesterday and a burning car driven into Glasgow airport today. Several people were arrested in connection to the attacks. Those living in Britain are told to be vigilant."

Feed Exploding iPod dies gruesome death (engadget.com)

Filed under: Portable Audio


Oh dear, just when we thought we'd had our fill of exploding Apple devices, along comes an Australian forum member named eeno who saw his first generation iPod nano go up in flames, and has some snuff-esque pics of the aftermath. As is usually the case with these things, eeno's iPod was charging when it happened. He says the force of the battery's explosion sent the iPod off his PC onto the floor, where it continued to smoke and spark until he unplugged the USB charging cable from the back of his computer. Since his iPod is out of warranty, the local computer repair shop didn't do him much good, but they did take a few pics to send to Apple. Hopefully this iPod was just an anomaly, and we won't be seeing a whole wave of these explosions as 1G nanos exit their warranties and head towards retirement -- but somehow we fear the worse.

[Thanks, Kip HT]

Read | Permalink | Email this | Comments

BOLD MOVES: THE FUTURE OF FORD A new documentary series. Be part of the transformation as it happens in real-time

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


Feed Microsoft confirms Vista OEM hack (com.com)

Hack may allow users to bypass antipiracy feature, but no action is planned yet, according to a post on the Windows Genuine Advantage blog.
Data Storage

A Review of the Top Four External Hard Drives 180

Lucas123 writes "There's a really good, detailed review at the Computerworld site on the top four external hard drives with more than 500GB of capacity. The story reveals some big flaws in the external drives, like malfunctioning one-touch backup buttons, USB 2.0 ports that don't recognize the drives, and drives coming out of the boxes unformatted. It's also an eye opener with regard to actual backup speeds. 'Broadband connections, peer-to-peer networks and larger media files coupled with new regulations that require diligence in backing up files have clearly affected the external hard drive market as drive capacities expand to 1TB and beyond. Meanwhile, the prices of those drives continue to drop, making them ever more attractive, particularly with the ease of deployment -- literally a two-minute installation, and you're ready to go. We put four of the leading external hard drives to the test. Our criteria were simple: The drives had to have multiple connection technologies (USB 2.0 plus FireWire 400 or FireWire 800 or both), include backup software and have a capacity of at least 500GB.'"
Security

Submission + - Big Virus Outbreak Today - 60 Times Normal Levels

An anonymous reader writes: Postini which processes more than 2 billion messages a day, is tracking a massive virus outbreak today that is set to be the largest attack on email in more than a year. Initial reports from Postini's global data centers indicate that today's attacks have driven virus levels 60 times higher than average daily levels on the Internet. Today's attack includes two variants. Emails with "love" related subject lines and an executable attachment that contains a Trojan virus, and emails with Worm Alert! in the headline containing an attached .zip file with an infected payload. Earlier in the week a similar attack took place with the subject lines focused on "missile attacks" starting World War III. These attacks are all variations of the same malware family as the "Storm Worm" attacks that plagued Email users around the world earlier in the year. When a user clicks on the attached executable, a rootkit is installed that attempts to hide its presence from virus scans as well as disable existing anti-virus applications. Then it will connect to a peer-to-peer network where it can upload data including personal information from the infected computer as well as download additional malware. The infected computer then becomes a bot-net zombie that can be used to send spam and issue other attacks. At the same time that it is connecting to the P2P network, the virus will search the computer's hard drive for email addresses and begin replicating itself by sending emails to the addresses that it finds. These attacks make this the most active week for Internet email attacks in more than a year.

Slashdot Top Deals

"Given the choice between accomplishing something and just lying around, I'd rather lie around. No contest." -- Eric Clapton

Working...