Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re: How about basic security? (Score 1) 390

Because it's not big enough to number all our hosts?
I can reach the hosts that have v4 over v4, but not the ones that don't.

You said it wasn't a big issue that you cannot contact v4 from a v6 address, because one can simply use v4 to connect to v4. Yet you also say we need v6 because we don't have enough v4 left.

See the issue now?

Comment Re:IPv6 has tons of useless changes and 1 useful o (Score 1) 390

Oh, did you mean "NAT as it existed before we ran out of IP addresses"? Well, that's why we need IPv6, now when we are talking about NAT, it includes carrier-grade NAT.

If you're behind a carrier grade NAT then fiddling with your own router config won't help much will it. That's the part I quoted and objected to.

Comment Re:IPv6 has tons of useless changes and 1 useful o (Score 1) 390

NAT mostly works, but it turns a lot of things that should 'just work' into a need to fiddle around with the router config.

I don't see how. Either you keep essentially all ports open to your public IP at all times (bad idea), or you need to open ports on demand.

The latter requires the same fiddling around with the router config as with NAT, assuming UPnP isn't used. If UPnP is enabled it's not an issue with NAT either and the whole point is moot.

Comment Good results (Score 1) 276

Without good results, it doesn't really matter about the bells and whistles. I use a search engine to find information, so it better do that extremely well. For example, I just couldn't stand using DuckDuckGo (aka Bing) because of this, and went back to Google. Bing consistently failed to find information the information I wanted, while Google had it on the first page.

So, after your engine returns as good or, ideally, better results than Google, you can start thinking about other features.

One feature I'd really like is to be able to tweak my result set. Something like if I search for "AC DC", I get a bunch of results about the band "AC/DC". That's not really a bad result given the input, but in this case I was after an explanation for the electrical terms.

So I'm thinking some ability to mark one or more of the results I don't want and say "not pages like this", and it would cull those talking about the band, in a weighted manner. Or some other way to help me find the information I want when I search for some ambiguous terms.

Comment Re:Wow. Just wow. (Score 1) 325

It's called false advertising and Pearson may be left holding the bag if the allegations are true and hold up in court.

That might well be. But it's also very poor project management of the school district not to do a pilot test before running off buying a billion iPads. The pilot test would identify the current problem and leave them with say 1200 iPads and not 120000.

Comment Re:Tin foil hat time (Score 4, Informative) 142

There's talk that they influenced the decision of some recommended constants for Elliptic Curve Cryptography.

You'll want to use constants that ensures the cryptographic strength of the algorithm, so picking them are non-trivial and hence a recommended set was published. This is the same for most algorithms. AES has constants and they are part of what makes the algorithm AES and not some other variant.

Anyway, here's what Bruce Schneier said about ECC:

I no longer trust the constants. I believe the NSA has manipulated them through their relationships with industry.

https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html#c1675929

And here's a nice background on ECC:
https://blog.cloudflare.com/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/

Comment Re:He did this to GNUstep as well.... (Score 1) 551

Meanwhile, all the other platforms for which LLVM would be the dominant platform and for which there aren't extant major backers are basically on the hook for whatever way LLVM wants to play it, including extinguishing support for their platform.

No, really, I mean it. Explain in detail how FreeBSD will become utterly unusable if LLVM went closed-source today and deleted any FreeBSD related code from their now-internal repository. Or AMD's OpenCL implementation. Or any other project using LLVM.

Sure, it's technically possible to start up a fork tomorrow. But, realistically, it's also just as possible to recreate MS Windows from scratch.

That comparison is utterly silly. You already have the entire source code for LLVM, and forking it is simply pushing it to another repository. That's the complete opposite of Windows, where you'd have to recreate it from scratch.

Well, either way, you're setting yourself up for the risk of the source going closed and you having to support development yourself.

Well yes, but all that does is put you in the same spot as if you had picked a closed-source component to begin with.

And don't think you're safe with GPL. Any GPL code can be re-licensed (and thus made closed-source) if the copyright holders agree. Of course, exactly as with BSD, the code already distributed under GPL/BSD will stay GPL/BSD.

Comment Re:He did this to GNUstep as well.... (Score 1) 551

Company A extends out project X until a lot of people depend on your variant. Company A close sources future development of project X or incorporate some patented technology without provisions for use in the open source community

But they can't retroactively close the source, so I don't see how the "extinguish" part comes in. If the LLVM guys closes the source tomorrow it does not affect AMD, who's using LLVM for their OpenCL implementation. If it does, please elaborate, because I'm not seeing how.

I'm ignoring patents because software patents are broken and doesn't apply where I live anyway (and hopefully it stays that way).

Comment Re:But... (Score 1) 288

OK, these guys are probably far smarter than I'll ever be, but... the universe clearly isn't staying at a finite size, and playing the universe's expansion in reverse would imply that it started at a single point. How do they account for this?

Various Quantum Gravity theories predict different things here. Some, like Loop Quantum Gravity (LQG), predict that over extremely short distances gravity is repulsive. Applied to cosmology (Loop Quantum Cosmology, LQC) this leads to a prediction of a "bounce", where a contracting phase flips into an expansion phase.

http://en.wikipedia.org/wiki/L...
http://en.wikipedia.org/wiki/B...

Comment Re:Extortion (Score 1) 619

You are ripping them off -- they get 0 benefit from you using their commercial service. That's theft.

That's just silly. There is absolutely nothing in the specs that require you to present all the elements in a web page.

Ads are the most dangerous thing on the internet these days. Last year the ad network of a fairly big Norwegian magazine got hacked and for several hours visitors got exposed to a drive-by-download specifically targeting the largest bank in Norway.

Users just had to have a slightly outdated Java version installed and enabled. No interaction by the user required besides simply visiting the site. And it just so happens the very same bank requires Java for it's login procedure...

As such I see ad blocking as my #1 anti-virus/malware tool.

There are a few sites I frequented which detect my ad blocker and prevents me from reading more than the blurb and I respect that. When I forget and try to access the article and get the "please pay or turn off ad blocker" page instead, I simply close the page and move on.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...