Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Image

Dad Delivers Baby Using Wiki Screenshot-sm 249

sonamchauhan writes "A Londoner helped his wife deliver their baby by Googling 'how to deliver a baby' on his mobile phone. From the article: 'Today proud Mr Smith said: "The midwife had checked Emma earlier in the day but contractions started up again at about 8pm so we called the midwife to come back. But then everything happened so quickly I realized Emma was going to give birth. I wasn't sure what I was going to do so I just looked up the instructions on the internet using my BlackBerry."'"

Comment Re:Atom 330 Desktop/Server - second this (Score 1) 697

I use a few of these in different place. It won't get you to the 10 watt range of the reflashed routers, but you save much time in wrestling fringe distributions in to working the way you want them to. (I have wrtsl54gs boxes running OpenWRT too, Atoms are more convenient.)

Do replace the motherboard fan if you get the intel motherboard. It will probably fail soon and cause your CPU to start thermal throttling. I just took it off and placed a full sized fan on the case vents over the motherboard blowing down. It runs cooler, quieter, and longer.

Comment There is no chip. (Score 5, Informative) 227

They have made a material which could if you designed a suitable chip and associated circuitry, and figured out how to manufacture it at large scale, would let you store a terabyte of data on a fingernail sized chip.

The whoever wrote the article title should be embarrassed, as should timothy for propagating it.

Comment Re:I don't get it (Score 1) 270

No, but Adobe is. They have a long history of doing stupid things, then waiting until the actual consumer release to "discover" that their product has a problem and not fixing it until the next major release thereby preventing their users from upgrading OS.

In this case CS3 may actually work, they just aren't going to promise it so people will pay to upgrade and Adobe doesn't have to do any support on CS3.

Comment Workaround is disaster for laptops (Score 5, Insightful) 421

The workaround (flushing everything to disk before the rename) is a disaster for laptops or anything else which might wish to spin down a disk drive.

The write-replace idiom is used when a program is updating a file and can tolerate the update being lost in a crash, but wants either the old or the new to be intact and uncorrupted. The proposed sync solution accomplishes this, but at the cost of spinning up the drive and writing the blocks at each write-replace. How often does your browser update a file while you surf? Every cache entry? Every history entry? What about your music player? Desktop manager? All of these will be spin up your disk drive.

Hiding behind POSIX is not the solution. There needs to be a solution that supports write-replace without spinning up the disk drive.

The ext4 people have kindly illuminated the problem. Now it is time to define a solution. Maybe it will be some sort of barrier logic, maybe a new kind of sync syscall. But it needs to be done.

Communications

IPv4 Address Use In 2008 258

An anonymous reader writes "The world used 197 million new IPv4 addresses in 2008, leaving 926 million addresses still available. The US remains the biggest user of new addresses, but China is catching up quickly. Quoting Ars Technica: 'A possible explanation could be that the big player(s) in some countries are executing a "run on the bank" and trying to get IPv4 addresses while the getting is good, while those in other countries are working on more NAT (Network Address Translation) and other address conservation techniques in anticipation of the depletion of the IPv4 address reserves a few years from now. In both cases, adding some IPv6 to the mix would be helpful. Even though last year the number of IPv6 addresses given out increased by almost a factor eight over 2007, the total amount of IPv6 address space in use is just 0.027 percent.'"

Comment Re:Who do you trust with a death ray? (Score 1) 275

Your numbers are likely off by several orders of magnitude. 100W/m2 is 1/10th the energy density of direct sunlight. i.e. you can do ten times better than that with a flat mirror, no concentration.

Who says it has to a be a centimeter wavelength? How about the 95GHz pain beam? (I haven't checked to see what the atmosphere does at that wavelength, I would suspect clouds block it at the very least, but given that light is shorter wavelength and it penetrates well, I'm fairly certain there will be something between cm and nm that also works well.)

Of course in normal operation your 1000 units would beam to 1000 different reception sites at a safe level, it is only when you want to destroy someone that you divert them all to your enemy.

Comment I don't think this applies to real HTTP passwords. (Score 0) 218

Reading the article, this doesn't seem to be about real HTTP authentication passwords, but rather about the interaction of form autofilling and fields that an application might consider to be a password. (Like slashdot uses.)

Granted, somewhere the HTTP standards committee failed the community making ad hoc form based passwords more common than real authentication. I suspect the lack of a "logout" concept has a lot to do with that, though designers' desire to spread their "look and feel" over all elements also contributes.

If you use HTTP authentication this does not apply. If you use <input type=password ...> then, yeah, autofillers may autofill.

Comment Go install fail2ban (Score 2, Informative) 167

fail2ban will watch your log files and when it sees probing will firewall ban the offender. It has virtually eliminated probing attacks on my networks of machines. Sure, a distributed botnet can still probe you, but I haven't seen that happening.

Do be careful though...

  • Have two different IPs you can come from. You will eventually ban yourself by being stupid. It took me a year, but I finally banned myself while working on some backup scripts.
  • It is written in python and uses 3M of RAM plus maybe 20M more virtual memory. Sure, you high end gamers have 100 times that in your video card alone, but if you are running on a 64M VPS or a 32M router it is something to think about.
  • You can have it watch much more than ssh if you wish.
  • If you forward the syslogs of all your machines to your firewall and run fail2ban out there you can protect all of your machines at the first transgression and only have to manage one copy of fail2ban.
  • If you are running virtual servers, consider running their syslogs out to the host box and running fail2ban there. Works well.
  • There should be a memory efficient alternative, maybe I'll have to write that.

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...