Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Harder: self-stabilizing parachute, or balance (Score 1) 496

But it does require extra fuel. I'd have expected that fuel to be more than the weight of a parachute system, though perhaps not: it would be lowering a mostly-empty tin can.

I imagine that it's a bonus to be able to have that kind of precision on your rocket engines: if you can get them down, then it may provide advantages in going up. Certainly it's nice that you've proven that kind of control.

Comment In particular, NO redundancy. Reliability drops. (Score 5, Informative) 226

Losing data goes with the territory if you're going to use RAID 0.

In particular, RAID 0 combines disks with no redundancy. It's JUST about capacity and speed, striping the data across several drives on several controllers, so it comes at you faster when you read it and gets shoved out faster when you write it. RAID 0 doesn't even have a parity disk to allow you to recover from failure of one drive or loss of one sector.

That means the failure rate is WORSE than that of an individual disk. If any of the combined disks fails, the total array fails.

(Of course it's still worse if a software bug injects additional failures. B-b But don't assume, because "there's a RAID 0 corruption bug", that there is ANY problem with the similarly-named, but utterly distinct, higher-level RAID configurations which are directed toward reliability, rather than ONLY raw speed and capacity.)

Submission + - Rand Paul wraps up NSA "filibuster" after 10 hours (cbsnews.com)

mpicpp writes: After standing on the Senate floor for more than 10 hours in protest of the National Security Agency's sweeping surveillance programs, Sen. Rand Paul, R-Kentucky, wrapped up his so-called "filibuster" just after Midnight on Thursday morning.

NSA illegal spying and data collection of innocent Americans must end. Thank you all for standing with me. #StandwithRand

— Dr. Rand Paul (@RandPaul) May 21, 2015
The senator and 2016 presidential candidate staged the talkathon ahead of the Senate's consideration of legislation to extend the NSA's authority to collect phone records in bulk. The controversial surveillance program — which has been deemed illegal by one federal court — is supposedly authorized by Section 215 of the Patriot Act. That section of the law is set to expire on June 1, giving Congress little time to renew it.

Paul started his "filibuster" against an extension of the Patriot Act on Wednesday afternoon, even though the Senate was actually in the middle of debate time on an entirely different issue — trade authority. Paul's efforts likely slowed down Senate business — lawmakers are trying to finish a few important bills before taking off for a weeklong recess — but the Senate is still expected to take up legislation to deal with the expiring NSA program.

Submission + - Gravitational anomalies beneath mountains point to isostasy of Earth's crust

StartsWithABang writes: Imagine you wanted to know what your acceleration was anywhere on Earth; imagine that simply saying “9.81 m/s^2" wasn’t good enough. What would you need to account for? Sure, there are the obvious things: the Earth’s rotation and its various altitudes and different points. Surely, the farther away you are from Earth’s center, the less your acceleration’s going to be. But what might come as a surprise is that if you went up to the peak of the highest mountains, not only would the acceleration due to gravity be its lowest, but there’d also be less mass beneath your feet than at any other location.

Comment Re:Only Two Futures? (Score 1) 609

I have recently come across a book that I begin to think everybody with an interest in - or even just an opinion about - politics should read: "Economics: The User's Guide". It isn't politically neutral, but it does present a very good and understandable overview of the essentials of economics - here's a wikipedia page about the author, Ha-Joon Chang:

http://en.wikipedia.org/wiki/H...

His view (among other things), and he argues it very well, is that libertarianism and the modern loathing against politicians and the state are largely the product of the influence of especially the massively expanding financial industry and other large industries, whose interest it is to get deregulation. He also points out that contrary to common belief, the economy has historically tended to grow under strong government regulation that aimed to level out inequality, whereas deregulation has normally introduced instability and stagnation. Read the book and use you own judgement; I think you will be less convinced about libertarianism afterwards.

Why do I suddenly jump this sort of thing here, you might reasonably ask. The thing is, people with a strong interest in technology are often people who at least aspire to cultivating a scientific outlook; ie. they are not religiously blinded to any alternative viewpoint and will not be afraid of changing their opinion, if the evidence is good. This book presents an overview of economics without all the pretensions of most of the theorists and makes it feel like something you might understand with a bit of common sense, and that understanding will help anybody form a considered opinion about politics, as opposed to what is really just a form of quasi-religious clap-trap.

Comment Incorrect (Score 5, Interesting) 175

It is easier with something simpler, not something smaller. When you start doing extreme optimization for size, as in this case, you are going to do it at the expense of many things, checks being one of them. If you want to have good security, particularly for something that can be hit with completely arbitrary and hostile input like something on the network, you want to do good data checking and sanitization. Well guess what? That takes code, takes memory, takes cycles. You start stripping everything down to basics, stuff like that may go away.

What's more, with really tiny code sizes, particularly for complex items like an OS, what you are often doing is using assembly, or at best C, which means that you'd better be really careful, but there is a lot of room to fuck up. You mess up one pointer and you can have a major vulnerability. Now you go and use a managed language or the like and the size goes up drastically... but of course that management framework can deal with a lot of issues.

Comment Well, perhaps you should look at features (Score 1) 175

And also other tradeoffs. It is fashionable for some geeks to cry about the amount of disk space that stuff takes, but it always seems devoid of context and consideration, as though you could have the exact same performance/setup in a tiny amount of space if only programmers "tried harder" or something. However you do some research, and it turns out to all be tradeoffs, and often times the tradeoff to use more system resources is a good one. Never mind just capabilities/features, but there can be reasons to have abstractions, managed environments, and so on.

Comment NetUSB=proprietary. Is there an open replacement? (Score 2) 70

It happens I could use remote USB port functionality.

(Right now I want to run, on my laptop, a device that requires a Windows driver and Windows-only software. I have remote access to a Windows platform with the software and driver installed. If I could export a laptop USB port to the Windows machine, it would solve my problem.)

So NetUSB is vulnerable. Is there an open source replacement for it? (Doesn't need to be interworking if there are both a Linux port server and a Windows client-pseudodriver available.)

Comment Opportunity to detect MITM attacks? (Score 4, Interesting) 71

I skimmed the start of the paper. If I have this right:

  - Essentially all the currently-deployed web servers and modern browsers have the new, much better, encryption.
  - Many current web servers and modern browsers support talking to legacy counterparts that only have the older, "export-grade", crypto, which this attack breaks handily.
  - Such a server/browser pair can be convinced, by a man-in-the-middle who can modify traffic (or perhaps an eavesdropper-in-the-middle who can also inject forged packets) to agree to use the broken crypto - each being fooled into thinking the broken legacy method is the best that's available.
  - When this happens, the browser doesn't mention it - and indicates the connection is secure.

Then they go on to comment that the characteristics of the NSA programs leaked by Snowden look like the NSA already had the paper's crack, or an equivalent, and have been using it regularly for years.

But, with a browser and a web server capable of better encryption technologies, forcing them down to export-grade LEAKS INFORMATION TO THEM that they're being monitored.

So IMHO, rather than JUST disabling the weak crypto, a nice browser feature would be the option for it to pretend it is unpatched and fooled, but put up a BIG, OBVIOUS, indication (like a watermark overlay) that the attack is happening (or it connected to an ancient, vulnerable, server):
  - If only a handful of web sites trip the alarm, either they're using obsolete servers that need upgrading, or their traffic is being monitored by NSA or other spooks.
  - If essentially ALL web sites trip the alarm, the browser user is being monitored by the NSA or other spooks.

The "tap detector" of fictional spy adventures becomes real, at least against this attack.

With this feature, a user under surveillance - by his country's spooks or internal security apparatus, other countries' spooks, identity thieves, corporate espionage operations, or what-have-you, could know he's being monitored, keep quiet about it, lie low for a while and/or find other channels for communication, appear to be squeaky-clean, and waste the tapper's time and resources for months.

Meanwhile, the NSA, or any other spy operation with this capability, would risk exposure to the surveilled time it uses it. A "silent alarm" when this capability is used could do more to rein in improper general surveillance than any amount of legislation and court decisions.

With open source browsers it should be possible to write a plugin to do this. So we need not wait for the browser maintainers to "fix the problem", and government interference with browser providers will fail. This can be done by ANYBODY with the tech savvy to build such a plugin. (Then, if they distribute it, we get into another spy-vs-spy game of "is this plugin really that function, or a sucker trap that does tapping while it purports to detect tapping?" Oops! The source is open...)

Comment Re:Arbitrary appendages? (Score 2) 50

Well that was my point about having very plastic brains. I'm not a neuroscientist, and I don't know how much details like (I have specifically four major appendages to control; two arms, two legs) are baked into the brain from day 0, vs. being just one of the configurations to which a very young brain can adapt.

You missed the point, I think.

The bionic foot in the article doesn't receive signals directly from the brain. It receives signals as they arrive at existing muscles. So we're talking about a brain that has already been wired naturally to control normally-grown muscles, and hijacking that message to also actuate motors. To use this process for additional limbs, you'd have to have a person who had grown those limbs to begin with.

Comment If the headline is posed as a question, the answer (Score 4, Insightful) 384

... is no.

The thing you propose sounds fine. But do they really want to upgrade all of the pumps at once? Sounds like a great way to brick an entire facility.

The only "improvement" I could think of would be to set up some kind of cheap router that can do MAC address filtering, that way you can set up the router to allow only one of each pump to show up as that one silly IP address at a time on a switched network. But then you'll still be able to only do one at a time.

The "right" way to do this is just throw money at the problem and attach a real computer to each pump, with a separate interface to talk to the static IP. Maybe something as small as http://www.fit-pc.com/web/prod... or just some generic mini-ITX board in a telecom chassis or whatever.

Comment Re:Why did they ditch the TV? (Score 2) 244

The crux, as I see it, is that an add-on box is clunky compared to a TV. It's a thing that has to be installed. That's not vastly hard, but it's a power cord and a data cable, and it just kinda hangs off of your TV. That's not elegant. (Note: I don't have an Apple TV, but I don't get the impression that they have any better solution than my Roku does.)

They can certainly make the software better, but I can see why they would want to sell you an entire television to make the entire user experience just right. It's kinda too bad that it just doesn't add enough value to a TV to make it worth the trouble. Apple has always succeeded best when they could make their solutions elegant, in ways that seem obvious yet nobody had done them until Apple did.

I do like your idea for improving the iPod, though perhaps an audio indicator ("You have ten minutes of play time remaining") would be easier, since it's just a software update. I suspect that they won't be refreshing that line very often. I, for one, have switched to using my phone, finally putting my much-beloved fourth-generation Nano to bed. (It was the last one before it became an iOS device, which meant that it was perfectly optimized for playing music and nothing else. But my phone does a better job, especially since it has wi-fi built in, and I am going to be carrying it around anyway.)

Slashdot Top Deals

"I say we take off; nuke the site from orbit. It's the only way to be sure." - Corporal Hicks, in "Aliens"

Working...