Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Also, this means... (Score 2) 274

The summary is correct about reduced pain. It's backwards about stress level:

Further testing showed that the rodents exposed to male odors were actually feeling less pain, rather than simply hiding the pain they were in. The male aroma ramped up their stress levels, which deadened the hurt. “It’s really astounding that such a robust effect could have been missed for so many years,” Mogil says.

vs.

The rodents are also less stressed out.

Comment Re:2 1/2 D (Score 1) 127

Note a depth mapping technique for each pixel isn't Doom-style restrictions unless the camera is in an unusual orientation.

You can have tables, etc. Every pixel has a distance from the camera to the object estimated. Since the camera is probably in a horizontal location this works. What you -can't- know about are objects behind other objects from the camera's standpoint, or stuff behind the camera. This is mostly OK for faking depth of field.

Comment Re:Fuck the FAA (Score 5, Informative) 218

Yah, that's not a great move vs. a civil regulator like the FAA or FCC.

He has a pilot certificate that they can revoke; they can impose civil (not criminal) fines of tens of thousands of dollars before an administrative law judge, where there's no standard of proof beyond a reasonable doubt (only preponderance of the evidence).

Comment Re:sell is the key word. Cogent not paying Verizon (Score 1) 289

Shortest exit path routing.

It's pretty much what everyone's expected to do and makes technical sense: you don't know the topology of the other guy's network, so if you have a packet for one of his customers, you should hand it over to that network at the closest possible point, rather than hauling it over your backbone and possibly having the other guy haul it back if your assumptions about costs are wrong..

But this means people that are "push" heavy use a lot less backbone resources than the provider that is receiving the traffic. Historically that has resulted in payments when peering connections have significantly asymmetric traffic flows.

Comment Re:It is just data! (Score 5, Informative) 376

Name one thing you know firsthand is connected to the Internet and could result in casualties if attacked. Sure banks computers could crash, sure amazon could go down, but ICBMs are not going to launch and the power grid wont go down. If anything that could actually cause casualties is connected to the Internet then it shouldn't be.

http://www.devicesworld.net/

SCADA (Supervisory Control and Data Acquisition) technology provides the means to monitor and control distributed systems from a central location. They are used widely in the telecommunications, power distribution, oil & gas and transportation industries. SCADA systems are typically deployed with dedicated communication infrastructure, proprietary software and hardware.

iSCADA, on the other hand is an Internet-based SCADA solution that utilizes the public Internet infrastructure as the data communication medium. It uniquely combines traditional SCADA technology with the open data communication protocols, services and data formats of the public Internet to deliver cost-effective and easy-to-use SCADA solutions. With iSCADA, it is now feasible to monitor and control virtually anything from anywhere in the world.

This kind of stuff is getting deployed more and more.

Comment Re:Summary Fail (Score 2) 429

Yes. For instance, under California law:

Any person who willfully threatens to commit a crime which
will result in death or great bodily injury to another person, with
the specific intent that the statement, made verbally, in writing, or
by means of an electronic communication device, is to be taken as a
threat, even if there is no intent of actually carrying it out,
which, on its face and under the circumstances in which it is made,
is so unequivocal, unconditional, immediate, and specific as to
convey to the person threatened, a gravity of purpose and an
immediate prospect of execution of the threat, and thereby causes
that person reasonably to be in sustained fear for his or her own
safety or for his or her immediate family's safety, shall be punished
by imprisonment in the county jail not to exceed one year, or by
imprisonment in the state prison.

or (c) Any person who maliciously informs any other person that a
bomb or other explosive has been or will be placed or secreted in any
public or private place, knowing that the information is false, is
guilty of a crime punishable by imprisonment in the state prison, or
imprisonment in the county jail not to exceed one year.

Or there are many other choices of statute depending on specific circumstances. Note that both of these require malice. If you were going to legally set off a bomb as part of a demonstration when you had a pyrotechnics license, neither of these would apply.

Comment Re:Wow (Score 4, Interesting) 222

The short answer is, CA/CP/AP on a transaction-by-transaction basis depending on application requirements. Also of note: network delay is effectively a special "partition", requiring an engine that can have massive workloads in flight and reconcile/order non-commutative changesets in a distributed fashion.

Comment Re:you're doing something wrong (Score 3, Informative) 222

And that's what Translattice does, actually: for the database part of the system, we transparently shard large tables behind the scenes, and figure out how to store it to the computing resources available taking into account historical usage patterns and administrators' policies on how data must be stored (for redundancy and compliance purposes). A different population of nodes is used to store each shard and the redundancy is effectively loosely coupled, so when a failure or partition occurs, the work involved in re-establishing redundancy is fairly shared over all nodes. This provides linear scalability for many workloads and better redundancy properties, and can also as a side benefit position data closer to where it's consumed.

When it comes time to access the data, the query planner in our database figures out how to efficiently dispatch the query to the minimal necessary population of nodes, introducing map and reduce steps to provide for data reduction and efficient execution.

All of the table storage is directly attached to the nodes, eliminating much of the need for a storage area network and scaling beyond where shared-disk database clusters can go.

Comment Wow (Score 5, Informative) 222

I didn't expect we'd be on Slashdot just yet. I'm Michael Lyle, CTO and cofounder of Translattice.

With regards to the original submitter's question, we'd love to talk to him. How much we can help, of course, depends on the specific scenario he's hitting.

What we've built is an application platform constituted from identical nodes, each containing a geographically decentralized relational database, a distributed (J2EE compatible) application container, and distributed load balancing and management capabilities. Massive relational data is transparently sharded behind the scenes and assigned redundantly to the computing resources in the cluster, and a distributed consensus protocol keeps all of the transactions in flight coherent and provides ACID guarantees. In essence, we allow existing enterprise applications to scale out horizontally while keeping the benefits of the existing programming model for transactional applications, by letting computing resources from throughout an organization combine to run enterprise workloads.

Current stacks are really complicated, multi-vendor, and require extensive integration/custom engineering for each application install. We're striving to create a world where massively performing infrastructure can be built from identical pieces.

Databases

Horizontal Scaling of SQL Databases? 222

still_sick writes "I'm currently responsible for operations at a software-as-a-service startup, and we're increasingly hitting limitations in what we can do with relational databases. We've been looking at various NoSQL stores and I've been following Adrian Cockcroft's blog at Netflix which compares the various options. I was intrigued by the most recent entry, about Translattice, which purports to provide many of the same scaling advantages for SQL databases. Is this even possible given the CAP theorem? Is anyone using a system like this in production?"

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...