Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Big Data (Score 5, Interesting) 181

So?

I used to run a big adult site. We wanted servers closer to the customers for speed. We made enough that we didn't really care about the connection costs. We'd put up server farms around the world where it suited our customers best.

We owned every piece of equipment in our cabinet or cage (depending on the location). The provider equipment ended at the fiber they dropped to us, and the power outlets.

Netflix was hosted with Amazon for a while. A couple years ago, they claimed to have started their own CDN.

Their own CDN site talks about putting Netflix gear out for free. So they are basically saying they want the free ride. No one gets rack space, power, and connections for free. The right thing to do would be to lease the space like everyone else does.

But hey, they're loving to cry about being treated unfairly. They are the loudest ones about it. Honestly, other than speed complaints that are usually a fault, not a conspiracy, I don't know of anyone else talking about the same thing.

It is possible that the world is ganging up on Netflix. It happened to Cogent, more than once. That was mostly they refused to pay on their contractual obligations.

Comment VPNs don't solve this on their own (Score 4, Interesting) 111

Disclosure: I'm a professional Penetration Tester

We find plenty of this sort of setups at our customers. Customers set up VPNs, have a password policy and a virus scanner. They have firewalls and keep user policies restricted. Then we come and we trojan someone, or find a weak WiFi password or whatever we use to get a foothold inside their network all it takes is one little mistake and we're "in". Once we get there, we log keyboards, get password hashes from network or system memory and start to pivot all over the place. Usually, our software will trigger virus alerts, but staff doesn't react to those "in a timely fashion" and we get to keep going even though alarms are going off on several computers. We could cloak our malware and sometimes we do, but usually it's too much trouble and we get domain admin passwords within a few days and rule the network in such a way that admins wouldn't be able to get rid of us if we would rootkit and backdoor properly.

It takes more than some policies and a VPN these days. You need IDS, proper procedures, layered security and skilled, motivated staff that knows how to deal with security incidents. You need properly trained and aware users that aren't afraid to admit they messed up and that have no problem reporting others doing wrong either. Don't trust on a single technical measure, but implement them all and make sure you test and train on a regular basis. Get a data classification policy and protect data according to that policy. That means that stuff like SSNs and anything that can be used for identity theft should get extra layers of protection and alerting implemented. If you don't do all this, a serious intruder will usually get what they want.

Comment Re:Wasting (Score 2) 62

As described, after looking at their materials, I don't see an advantage to the radial design over a grid design. There is nothing to that which would improve airflow, and it leaves huge underutilized areas.

On the other hand, a traditional grid design optimizes the space, and it would still allow for the same airflow.

It's not a matter of being round, or having dead space, it's simple things we teach children. Square boxes don't fit through round holes. Round objects don't stack optimally.

One of the Equinix datacenters in Los Angeles (previously Pihana Pacific) has all of it's cooling on one side of the room, and returns on the other side. Each row is basically a wind tunnel. There is no appreciable temperature difference between the two sides. Both the front and back of the cabinets have the same airflow, and maintain roughly the same temperature.

As far as the total power load, they could keep the load the same, and have almost half of the building for just storage.

Of course, a square building that the industry uses as a standard for this kind of work, would not make the news. No one would be talking about it.

I guess if they have money to burn and real estate to waste, it doesn't matter what shape they make it or how much space is underutilized.

Comment Re:Security (Score 1) 62

Did you notice that he talked about the doors to the warm side? Controlled and logged access. And just a couple seconds later he says the top of the pods are all open to the common upper area. I'd hope they'll have something in the way, but I doubt it would be anything that bolt cutters (or just tin snips) and a few minutes would have a problem with.

Comment Re:Moisture? (Score 3, Informative) 62

You can take a look at their official page. http://www.ohsu.edu/xd/about/initiatives/data-center-west.cfm

The tour video and text talk about plants outside filtering. The video around 3 minutes, shows additional filtering inside.

I suspect prevailing winds will really screw with the site cooling.

The "Virtual tour" has more details than the rest. Nothing about humidity.

Their security seems odd. They talk about the security being very strict. The video shows the inside of each "pod" to be open to the common hot air area in the upper part of the roof. So they have security, but you can get around it by not going through the doors. {sigh}

I never got the idea of sticking square boxes in a round hole. They're wasting a lot of good real estate by leaving all that extra space between the servers.

It seems like it was drawn up with an ideal world in mind, which usually doesn't translate well to the real world.

Comment Re:What trolls (Score 2) 382

Exactly and literally. Smokey and the Bandit was still in or just coming out of theaters when I was 14. And yes, we were trolls (not on CB though). We did real world trolling. Smoke bombs, bottle rockets, bb guns, sling shots, chunking wax balls from those stupid wax sippy candy at cars (no damage, in case you got busted) etc. We used to do all kinds of crap that would have gotten our asses kicked if we didn't know the alleys and yards you could jump fences in without a dog biting you. Trolling on the internet is for pussies. We were bored, but we got a good work out, without inflicting TOO much damage. I don't recommend what I did, but kids that think that they are breaking the rules, trolling, from behind a laptop that mummy and daddy bought them aren't exactly rebels. They are just cowards.

Comment Re:Fuck people! (Score 3, Funny) 239


echo "chaotic_evil" > /proc/morality

That's why it hasn't been working for you.

There's also a kernel patch on evil.org to change the default setting. With the standard kernel, it is set to "lawful_neutral". In that mode, it will honk and swerve for a little old lady crossing the street.

lawful_good would stop, and offer her a ride.

chaotic_evil will run her over, back up and do it again, and the lower loot collection hook will deploy to take her purse.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...