Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Intel

Submission + - Intel announces a BIOS Implementation Test Suite (lwn.net)

Josh Triplett writes: Intel announced the release of a BIOS Implementation Test Suite (BITS), a bootable pre-OS environment based on GNU GRUB2 that tests how well (or how badly) your BIOS has configured your platform hardware. BITS also includes Intel's official power management reference code, so you can override your BIOS's initialization with a known-good configuration. "In addition to those changes to GRUB2 itself, BITS includes configuration files which build a menu exposing the various BITS functionality, including the test suites, hardware configuration, and exploratory tools. These scripts detect your system's CPU, and provide menu entries for all the available functionality on your hardware platform. You can also access all of the new commands we've added directly via the command line."

Comment Re:H.264 (Score 1) 399

Back in the days when browsers were starting to embed images, were gif and jpeg royalty free? Or did we just live in a simpler time before patent trolls.

GIF required royalties to write, but not to read. Hence the existence of libungif: "a specially modified version of giflib which is free of the Unisys LZW patent. It can read all GIFs, but only write uncompressed GIFs."

Comment So much focus on the protest, none on the topic (Score 5, Informative) 167

The linked story talks about the reasons for the protest in Cairo (namely, wanting the current president of 29 years out, and wanting the 29-year "state of emergency" and corresponding suspension of rights to stop). The summary here just talks about the actions taken against the protesters, and the blocking of Twitter.

Comment Re:contrast with pirateBay (Score 2) 198

RapidShare hosts content themselves, and takes down content when requested to. Atari sued them because they didn't want to keep sending takedown notices, and would prefer that RapidShare do their job for them, like YouTube currently does for copyright holders ("here, tell us what files you don't like look like, and we'll handle it automatically"). The courts sensibly said that RapidShare doesn't have to offer any more help to Atari than they already do.

PirateBay doesn't host content themselves, infringing or otherwise, which means they very sensibly don't respond to takedown notices. That then confuses and annoys both copyright holders and courts, who can't quite figure out that PirateBay has done nothing wrong, because naturally they *must* be doing something wrong if they're not responding to takedown notices.

Books

Submission + - Linux hacker announces Parallel Programming book (livejournal.com)

Josh Triplett writes: Linux kernel hacker and parallel programming guru Paul McKenney announced his book-in-progress, Is Parallel Programming Hard, And, If So, What Can You Do About It?. It currently has a good combination of "documentation nobody else ever bothered to write" on many forms of synchronization and concurrency, from the simple to the cutting edge, with a bit of a peek beyond. It has a ways to go before it could become a publishable book, but by the standards of software documentation it represents one of the best references I've seen.

Comment Re:C++ programming cultists? (Score 1) 191

I'm aware of that; just taking the opportunity to point out that C++ files on UNIX systems can use extensions other than those you mentioned, and in particular that the one bit of C++ in the Linux kernel repository uses the .cc extension.

Actually, you are only just now taking that opportunity. I appreciate the correction and additional information. In fact, that is exactly why I said I wanted to challenge the assertion, rather than saying there definitely isn't any.

Fair enough; I should know better than to post command executions or code snippets as comments without further explanation of their significance. Thanks for calling me on it. :)

Comment Re:C++ programming cultists? (Score 1) 191

I'm aware of that; just taking the opportunity to point out that C++ files on UNIX systems can use extensions other than those you mentioned, and in particular that the one bit of C++ in the Linux kernel repository uses the .cc extension. You also didn't cover the .C extension, though that one doesn't see much use due to incompatibility with case-insensitive systems.

Comment Re:But... (Score 1) 276

There's no such thing as an "entrance node" in Tor; the first hop is encrypted, and at most the first node you contact can say "the system talking to me uses Tor". While that may cause you some problems in environments that prohibit use of Tor entirely, Tor doesn't have that as a security goal; Tor just ensures that nobody can figure out both endpoints, and it does that quite well as long as no one entity can control a significant fraction of the nodes on the paths you use.

As for trust, you generally have to trust *someone* in a system, but you want to reduce the number of trusted entities to the minimum. For instance, when talking to example.org, you ideally only want to trust example.org to provide the content you expect; you shouldn't also have to trust "org" and the root to not take over the site.

That doesn't mean you want naming by consensus, either; that could have the "everyone on the Internet is lying to you" problem you described.

DNS (perhaps with DNSSEC) might even remain a reasonable protocol to use on individual domains, such as to allow "example.org" to provide "www.example.org" and "planet.example.org". However, having a central "org" registry with control over "example.org" puts control in the wrong place, and allows abuse.

Comment Re:Decentralized naming is hard (Score 1) 276

There's no reason for DNS resolution to go through any centralised server. Use a distributed hash table to publish and retrieve records and sign them. Of course you'd still need a central authority to issue and sign certificates.

That decentralizes the boring bit of the problem. You still have to trust the central authority to not abuse their power, and that doesn't work.

Comment Re:Decentralized naming is hard (Score 1) 276

Using public keys as addresses would be pretty sweet, but how do you route traffic through a network with randomly distributed addresses? Ad-hoc routing can work on small scales, but there'd be serious issues making a global network like that.

That's actually an easier problem, known as "location-independent identifiers". Most ad-hoc routing protocols tend to flood-fill the network, either when calculating routes or when routing packets. However, ad-hoc routing protocols do exist that avoid flooding, and those protocols can scale.

Virtual Ring Routing can handle Internet-scale networks by treating them like small-world networks, using the same mechanism distributed hash tables use: treat the addresses as a ring, and use a combination of your physical neighbors and your "virtual" neighbors on the ring to cross long distances. A later paper on VRR showed that it scaled quite well with the size of the network, both in the expected length of the routing path and the expected number of routing table entries needed on each node.

We got a team of students to develop an implementation of VRR for Linux, and Microsoft Research has an implementation for Windows.

So yes, we can solve the routing problem easily enough. We just need some way to handle naming that the general public will put up with.

Comment Re:Decentralized naming is hard (Score 1) 276

Why continue with the concept of name ownership at all? It should be technically impossible to own a name, in the same way that it should be impossible to monopolize ideas.

Let people and entities use whatever name they want; the remaining problem is to verify that you are talking to the right host, but you should need to do that anyway. Invariably, any sort of central authority can and will be subverted. What is necessary is some other means of conveying trust, wether that is a web of trust, or some other out of band option.

I'd gladly use a system like that. You can trivially "name" systems using their public key fingerprints, which then just means you need to *find* those sites. Right now, people find those sites three ways: they use a search engine like Google and get a link (not a problem), they follow a link from another site (not a problem), or they type in an address (problem). To handle that last one, note that the address has to come from somewhere; that source could always provide things like QR codes or other mechanisms to identify a particular address without having to enter the whole thing.

Good luck migrating from the existing system, though.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...