Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment A random freebie with comparison program (Score 1) 258

That is, if you already own app A that does (x) then you can sign up to randomly get a random app B that also does x.

If you agree to rate and compare both of them, then at the end of one week, you can if you desire, trade in app A for app B for free if A costs more than B (or the price differential if B costs more than A.)

When buying apps, these ratings would be shown next to the regular ones, and be sortable.

The app creators (and the app store) would have to agree to this program, giving up their products for free in exchange for this rating system.

Comment Re:Dark? (Score 4, Informative) 119

It's not just the visible spectrum, it's all radiations levels.

Different amounts of mass result in different star types which give up different types of light. non-star objects - dust, planets, etc. block light and radiate out the energy they absorb as heat.

So by looking at any point, we can tell how much mass it has by the amount and type of light it gives off, including the non-visible spectrum, i.e. heat.

There are a few assumptions made, but it makes a lot of sense, mathematically.

None of it would have been possible before we understood the formulas behind fusion.

Comment Trusted network zones (Score 4, Informative) 348

If your database is in a trusted network zone, it's fine.

If you have a bunch of assets outside the corporate firewall, you're doing it wrong. These belong behind a DMZ firewall, blocking any ports not strictly necessary, possibly with PNAT and coalescence (i.e. an FTP, Web, and Mail server, natted to the same address, ports 80, 443, 25, 21, and FTP PASV going to different addresses behind that).

Within that DMZ, servers provide whatever services they're going to. MySQL on port 3306 will provide MySQL on port 3306; if you add a local firewall, you will have a firewall that blocks all non-listening ports and leaves port 3306 open, so no difference. If you're worried about ssh, use an IP console card (DRAC, etc.) on a separate subnet, or put the database servers behind another firewall. It is, in fact, common to create trust zones for front-end, application, and database, such that i.e. your Web servers connect through WSGI to a CherryPy application, which connects back to a Database, through a firewall in each step. You can do this with vlans and broken-down subnets, one switch, and one firewall.

You have to consider everything when you design secure network architecture.

Comment So it's like all other information? (Score 5, Insightful) 189

Take a look at Snopes once, huh?

Every time somebody says something, it passes through the public mind. Sometimes it gets down five people and dies; others, it becomes an ever-growing ball of horse shit, and people start claiming that it takes 8 pounds of honey to build a honey comb that holds 1 pound of honey when, in reality, beeswax is pretty cheap in terms of hive storage economy.

There are so many untrue things on Wikipedia just by way of almost everyone believing them--things that are printed in earnest in College textbooks and technical manuals, repeated by experts in field, and yet readily testable as not-true. These are just like Aristotle claiming heavier objects fall faster--and, 3000 years later, Galileo drops a grape and an iron brick at the same time, and both hit the ground simultaneously; did nobody think to check something other than a rock versus a feather? Today, we have the same.

To make matters worse, anyone can purchase a domain name, set up a Web host or lease hosting, and publish anything they want with nobody able to edit it or mark it as suspect or inaccurate. Between word-of-mouth, books printed by whoever the hell wants to, Web sites with no validating authority, and forums where inaccurate posts aren't edited by moderators or community and are often supported by a circle jerk of clueless idiots, where do you expect to get any authoritative information?

Wikipedia has the public access problem in a different scale: anyone can post anything on the Internet or in books or private magazines without contradiction; but, on Wikipedia, you get only as much contradiction as attention, amplified inverse to plausibility. That is to say: if what you post is not obviously wrong and not on a high-traffic article, it will probably fall through; if what you post is ridiculous or is on a high-traffic article, someone will notice the inaccuracy.

Comment Re:Heh, nice poll (Score 1) 152

Percentage is the worst one. It is at heart a simple mathematical concept that way too many people don't understand. X percent of Y - Divide Y into 100s, and the number of hundred's you are talking about is X.

Sometimes I think that should be the one question every job interview above minimum wage should ask. If you fail, you shouldn't be allowed to be paid anything more than minimum wage.

If they complain, tell them they will get a 100% pay raise in one year automatically, but there might be a 50% pay cut across the board after that.

Comment It's a Trap! (Score 2) 176

Given that the executive branch, that being the POTUS, has never seen a surveillance law it didn't like, I seriously doubt this law would actually impede the government's lust for any and all information on the People.

Besides, the actual implmentation of any law is always the exact opposite of the bill name. My guess, "The USA Freedom Act" means "freedom for the government to do whatever the fuck they want."

Comment Re:Oe noes! A compiler bug! (Score 1) 739

It's just that saying C++ is more complex than Java has little bearing on C. C++ is an immensely complex language: loading and using C++ programs is slow. The overhead of using C++ is immense. It's incredible. Name mangling causes tons of comparisons in initialization and during lazy look-up; while classes require constant indirect look-ups through the virtual method table as a matter of course.

In C, you have none of that. memcpy() is just memcpy(), and it's in the PLT. A call to memcpy() doesn't invoke a look-up through the virtual method table to determine which pointer to use for a call %register,$pointer; it's just stuffed into the PLT, and a call to it causes a hard-coded call %register,$offset.

There are no template functions in C because of no name mangling.

Comment Re:Hilarious (Score 3, Insightful) 160

Property Rights? Trespass to Chattels? No abuse of state powers for private gain? How easily the mask slips when a few cold pounds are involved.

But the people I feel really sorry for are the victims of crime in London, whose cases go unsolved due to precious police resources being wasted on internet nonsense like this.

Comment Re:When I was born... (Score 1) 114

You are correct about the specifics. I did make a bad comparison. (Note we are budgeted for 11 carriers active at any time - the 11th is the new Ford class, Electric powered catapult sitting in Newport, expected to be finished next year. ) That said, we do spend far more money on maintaining our military than we do on scientific research.

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...