Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Go for it (Score 2, Informative) 1065

I'm going to go all terminology-pedant on you, because I've been hearing the wingnut teabaggers misuse "communist", "socialist", and "fascist" for a while now as fear words.

Communism is a *socioeconomic* philosophy, where property is held in common, particularly means of production, with common access to means of consumption. It has nothing to do with quantity or quality of government regulation.

Totalitarianism is a *political* philosophy where the state recognizes no bounds to its power to control the actions and lives of its citizens/subjects.

Many Communist countries also had Totalitarian governments, because unless you have a very small, commonly-aligned populace, everyone must be forced to participate in a communist system for it to function as intended. However, you can have one without the other.

You say "communist", you mean "totalitarian."

Submission + - NTP Sues Over Wireless Email Patents (prnewswire.com)

rgraham writes: NTP, the same company that sued and eventually settled with RIM for $612.5 million over an IP dispute has now sued Apple, Google, HTC, LG, Microsoft and Motorola for infringement of wireless email patents. From the newswire:

Donald E. Stout, NTP's co-founder, said, "Use of NTP's intellectual property without a license is just plain unfair to NTP and its licensees. Unfortunately, litigation is our only means of ensuring the inventor of the fundamental technology on which wireless email is based, Tom Campana, and NTP shareholders are recognized, and are fairly and reasonably compensated for their innovative work and investment. We took the necessary action to protect our intellectual property."

Comment Re:Didn't Produce Transistors? Oh Come On! (Score 2, Informative) 170

The link you provide speaks to the problems of bit-packing on the symbol states, and the solution of Trellis Modulation, which I mentioned. Trellis coding allowed for packing more than 4 bits to each symbol without increasing the error rate, leading to the development of the v.32bis standard and 14.4Kbps modems. Which is what I said - it wasn't high baud rates, but better bit packing that realized faster speeds.

And you're still saying "baud" when you mean "bits per second".

Comment Re:Didn't Produce Transistors? Oh Come On! (Score 5, Informative) 170

I think you're just misunderstanding the problem.

The "baud rate" of telephone lines is pretty slow. Baud rate is the number of symbol transitions per second the media can support. Baud rate and bits/second have not been equivalent since Bell103a/V.21 frequency-shift-keyed modems, where 300 baud meant 300 bps, each state transition being a discrete tone that indicated a "mark" or "space" (0/1). From then on, Bell 212a/V.22 used phase-shift keying to get 1200 bps out of a 600 BAUD symbol rate, encoding two bits of information per symbol.

POTS lines are pretty pokey - the practical maximum BAUD rate is less than 3500 symbols/sec. Where speed advancements were made in later evolutions of POTS modems were in the number of bits that could be encoded per symbol, using QAM and Trellis Modulation. A 33.6 kbps modem is encoding 10 bits per symbol onto a 3429 baud carrier.

So, when you kept hearing "phone lines max out at less than 4800 baud", that was correct. The engineers kept wringing higher bit rates out of narrow-band POTS by putting more information on each of the symbols transmitted.

Then, with V.70 and V.90, the modulation schemes took advantage of certain characteristics of non-muxed POTS lines to use PCM digital encoding instead of an analog audio carrier. Unfortunately, if you were serviced through a SLC-96 ("Slick") muxed subscriber loop, which multiplexed the signal from your subscriber line to the central office, you could only connect with older analog modulation schemes such as v.32/v.32bis/v.34.

Comment Re:Do I get at least a pair of rubber gloves? (Score 1) 135

Don't want to reduce your smug, but we're doing just this - restart services from the failed component, service the failed resource on a non-critical timeframe. The small shop with a half-dozen server boxes doesn't give a damn about cooling costs or this level of service, for the most part. If they do, they're likely going to someone else to satisfy that requirement, not doing it in house.

I've got stack of servers in my datacenter that are allocatable on demand. Any unused server blade is a potential spare. If a production blade tips over with a CPU fault, memory error, or similar crash, its personality (FC WWN's, MAC's, boot and data volumes, etc.) are moved to another blade and powered on through an automated process. Since the OS and apps live on the SAN, both VMs and dedicated server hardware can be abstracted away from the actual services they provide.

This is a product my company's selling to the market at large right now, and that I designed. Any of our IaaS customers can take advantage of the redundancy and fault tolerance built into the system. Even the six-server small IT shop.

Even then, a small IT organization can easily virtualize and provide some level of HA services in hypervisor clusters now. It's just not that hard anymore. Take the handful of servers you're running on now, replace them with an equal number of nodes in a VMM cluster, and go to town. Any of those systems fails, shift the load to the other nodes and effect repairs.

Comment Re:SOX HIPPA etc (Score 1, Insightful) 157

"Cloud computing," while it has very nearly achieved meaningless buzzword status, is an attempt by the business and marketing types to get their heads around what is a very real evolutionary transformation occurring in IT. The drivers are the drying up of CapEx budgets, the need to reduce service delivery time, and the requirement to purchase and pay for only what an organization needs to fulfill their business requirements.

Capital expenditures are coming under increased scrutiny, and are under constant budgetary pressure. "Cloud" based, on demand services allow IT service procurers to shift from a CapEx based model of owning the infrastructure to an OpEx model. Operational expenditures are typically larger chunks of budget than capital purchases, and moving IT services there can allow them to get "lost in the noise". Less red tape, less stringent approval processes, etc.

Time to deliver service is a labor cost, and if a procurer can shift that operational expense from internal overhead required to deploy an IT architecture to acquiring those same services from a cloud provider, it's perceived as a big win. The provider gets to deal with the headaches of capacity management, infrastructure design and integration, and delivering IT resources. The purchaser gets the luxury of simply specifying how much they want, for how long, and letting the provider leverage its economies of scale and automated processes to deliver the resources within the terms of the provider's SLA. The tradeoff is that the consumer of cloud services loses the ability to specify the platform and all its parameters in exchange for rapid delivery of a standardized service.

IT organizations are also under increased pressure to abandon the concept of designing and purchasing for peak capacity. Cloud providers are specifically addressing these needs by allowing their customers to pay only for what they use, not the spare capacity. Since the "cloud" capacity is shared, reused, and managed by the provider, the customer is afforded the ability to scale their environment dynamically to meet the needs of the business and its budget.

Now, how this ties into Web Services is important. Web Services, for a long time, was a solution in search of a well-defined problem. Now, with the "cloud" becoming a workable construct, Web Services come to the forefront as the way that stateless platforms can interact without intimate knowledge of the underlying infrastructure. Web Services will become more and more important as IT services are increasingly abstracted away from the hardware and OS platform. As I've worked for the past two years as a design architect for an infrastructure-as-a-service type platform, I can say with some authority that they're are an integral part of how we're going to need to deal with virtualized environments and stateless service contexts as they become pervasive elements of IT solutions.

Government

Secret EU Open Source Migration Study Leaked 311

Elektroschock writes "For 4 years MEP Marco Cappato tried to get access to the EU Council's 2005 open source migration study because he is a member of a responsible IT oversight committee in the European Parliament. His repeated requests for access were denied. Now they have finally been answered because the Council's study has escaped into the wild (PDF in French and English). Here is a quick look. It is embarrassing! Gartner, when asked if there were any mature public Linux installations in Europe, claimed that there were none. Michael Silver said, 'I have not spoken to any sizable deployments of Linux on the desktop and only one or two StarOffice deployments.' Gartner spread patent and TCO FUD. Also, the European Patent Office participated in the project, although it is not an EU institution."
Data Storage

New York Times Wipes Journalist's Online Corpus 94

thefickler writes "Reading about Peter Wayner and his problems with book piracy reminded me of another writer, Thomas Crampton, who has the opposite problem — a lot of his work has been wiped from the Internet. Thomas Crampton has worked for the New York Times (NYT) and the International Herald Tribune (IHT) for about a decade, but when the websites of the two newspapers were merged two months ago, a lot of Crampton's work disappeared into the ether. Links to the old stories are simply hitting generic pages. Crampton wrote a letter to Arthur Sulzberger, the publisher of the NYT, pleading for his work to be put back online. The hilarious part: according to one analysis, the NYT is throwing away at least $100,000 for every month that the links remain broken."
The Courts

3D Realms Sued Over Failed Duke Nukem Forever Plans 180

Take-Two Interactive has now sued 3D Realms over the cancellation of Duke Nukem Forever . Take-Two did not provide continuous funding for the game, but they did pay $12 million for the publishing rights to the game. A Bloomberg report quotes Take-Two's complaint as saying that 3D Realms "continually delayed the completion date" and "repeatedly assured Take-Two and the video-gaming community that it was diligently working toward competing development of the PC Version" of the game. (The complaint refers to 3D Realms as part of Apogee Software, Ltd., not to be confused with Apogee Software, LLC, the publisher behind the still-forthcoming Duke Nukem Trilogy.)
Software

Computers With Opinions On Visual Aesthetics 125

photoenthusiast writes "Penn State researchers launched a new online photo-rating system, code named Acquine (Aesthetic Quality Inference Engine), for automatically determining the aesthetic value of a photo. Users can upload their own photographs for an instant Acquine rating, a score from zero to 100. The system learns to associate extracted visual characteristics with the way humans rate photos based on a lot of previously-rated photographs. It is designed for color natural photographic pictures. Technical publications reveal how Acquine works."
Games

On the Feasibility of Single-Server MMOs 316

GameSetWatch takes a look at the issues involved in creating an MMO that does not split its users among many different servers. They suggest that running a single "shard" is the next step in the evolution of MMOs, since it better allows player choices to have a meaningful impact on the game world; supporting different outcomes across multiple shards is a technical nightmare. They estimate, from the hip, that the cost to develop the technology required to support a massive amount of players (i.e. far more than EVE Online) on a single server to be roughly $100 million. Another recommendation is the strong reliance on procedural and user-generated content creation to fill a necessarily enormous game world.
Security

Hacker Destroys Avsim.com, Along With Its Backups 780

el americano writes "Flight Simulator community website Avsim has experienced a total data loss after both of their online servers were hacked. The site's founder, Tom Allensworth, explained why 13 years of community developed terrains, skins, and mods will not be restored from backups: 'Some have asked whether or not we had back ups. Yes, we dutifully backed up our servers every day. Unfortunately, we backed up the servers between our two servers. The hacker took out both servers, destroying our ability to use one or the other back up to remedy the situation.'"
Earth

GPS Accuracy Could Start Dropping In 2010 210

adamengst writes "A US Government Accountability Office report raises concerns about the Air Force's ability to modernize and maintain the constellation of satellites necessary to provide GPS services to military and civilian users. TidBITS looks at the situation and possible solutions."
Power

Submission + - Hydrogen turbines generate clean electricity

Roland Piquepaille writes: "The Lawrence Berkeley National Laboratory (LBL) has developed near-zero-emission gas turbines using pure hydrogen as a fuel. But because this LSI (low-swirl injector) technology also can use other fuels, it has the potential to help eliminate millions of tons of carbon dioxide and thousands of tons of nitrous oxides (NOx) from power plants each year. In fact, burners with the LSI emit 2 parts per million of NOx, more than five times less than conventional burners. The multi-patented technology is currently available for licensing. I sure hope that a utility company will be interested. But read more for many additional references and photographs comparing a high-swirl injector (HIS) and a low-swirl injector (LSI)."
Security

Submission + - Laptop Anti-theft Software Options for Linux

yourexhalekiss writes: "I'm going back to school this fall, and I run GNU/Linux on my laptop. With school being what it is, I want to keep my Kubuntu-powered System76 Darter Ultra as safe as it can be. Checking through SourceForge and Freshmeat, I can't find a single laptop theft-prevention or tracking program that works with GNU/Linux and has published code.

What do other people use to protect their non-Windows or Mac laptops, and how effective is it?"

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...