Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Drone It (Score 1) 843

In an ideal world they'd probably be building a new version of the A-10. Something has to have advanced in the field of aircraft design since my Mom's 21st birthday. The F-16, AC-130, were also all designed well before Mom hit the big-21.

What's the age got to do with anything? We have working airframes; working designs that are proven to be exceptional at their respective jobs. We could spend a whole bunch of time, money, and lives (test pilots mostly, and some regular ones too during initial roll-out) on new designs, but we'll get maybe slightly better (or possibly slightly worse) performance out of them and in the end we'll net out behind.

Fire up the plants and start rolling new A-10s and F-16s off the assembly line (alone with F-22s). Streamline the manufacturing so they're produced as inexpensively as possible. If we find how to do their jobs better in 20 years, we'll have wasted only some minor resources in manufacturing, so the risk is minimal. They're a fantastic investment. Own the skies with the F-22, the ground defenses with the B-2, and everything else with cheap, effective aircraft.

I know our government doesn't like that because it isn't porked up all to shit, but it's the right way to move forward militarily.

Comment Re:Religion is a choice! (Score 2) 270

Some might claim that's true of sexual preference as well, so do we lump homophobia with racism or religious-intolerance?

FWIW I know language is mutable and maybe I'm just behind the curve, but does "troll" now officially mean "anyone who says anything I don't like on the internet"?

It used to be a far more subtle definition, of someone who would post something (occasionally hurtful yes, but frequently the better trolls would use a sort of straw-man sympathic post) *specifically* to draw out a reaction, thus the use of the word 'trolling' as in the fishing technique of not sitting in one place but instead dragging your line behind a moving boat, hoping to provoke an aggressive fish to react just out of the motion-action of your lure.

Comment Re:Drone It (Score 1) 843

So for $1 Trillion, we can maybe step up part of the now-more-limited capability (loss of A-10 capability, smaller number of aircraft requiring longer maintenance intervals between sorties) air campaign? Maybe? And we're doing this because our elected officials have constructed a system of perverse incentives that discourages efficiency and competence and encourages ludicrous waste?

(None of this being news to me, just confirming we're on the same page; in which case we're talking about two different things. I'm speaking of what ought to happen in a sane, sensible world and you're speaking of what will actually happen because unrestricted representative democracy has yielded idiocy, incompetence, and impotence at the top.)

Comment Re:Drone It (Score 2) 843

a) None of those are stealth.

The F-22 is (in fact it has better stealth than the JSF) and so is the B-2 (also has better stealth than the JSF, but you called it out in your other reply so we'll let that one slide).

The others don't need stealth to fulfill their respective roles.

b) None of those can fulfill the roles of any of the others.

Correct. The F-22 is extremely stealthy and will clear our whatever aircraft the enemy puts in the skies. It also has limited ground strike capability, but that's a real waste. The B-2 (also extremely stealthy, possibly more than the F-22) is then clear to come in and start really pounding ground defenses. You take out all the stationary radar, SAM sites, AAA, C&C, etc with that while the F-22 provides protection. You don't risk lucky shots against your B-2s by sending them after less heavily defended targets; you just use them to clear a path for your remaining forces so they don't face anti-air defenses.

Once all appreciable anti-air has been destroyed and the enemy can't put a plane in the sky without F-22s dropping it, you're free to send in your non-stealth aircraft. F-16s bomb the Hell out of stationary targets and can provide some target-of-opportunity strike capability. A-10s take out mobile infantry, supply convoys, etc. AC-130s and A-10s provide your close-in air support for whatever ground missions you need to complete your objectives. Each has its own distinct role to play; one thing it's great at doing. Used together, you get the best of all worlds.

c) They're all old designs that don't look good on a budget request.

Depends on what you mean by "doesn't look good on a budget request". As a taxpayer, they sure as Hell look good to me. They're much cheaper than JSFs and each is much more capable at the specific job it's intended to do. Those "old designs" have all the bugs worked out of them and are reliable as can be. And when one does break down, it costs peanuts to repair or replace it. If the folks in charge of the budget don't think that looks good, we need to fire them immediately.

d) Particularly a $1 Trillion request.

We could buy so many of those things for $1 Trillion that we wouldn't have pilots to fly them all. So we'd buy a few less than that and train enough pilots to fly them. The result would be a force so large that we could run dozens of simultaneous sorties 24/7/365 and overwhelm anyone anywhere with omnipresent force.

So we'll have a very expensive plane that does nothing particularly well, but we'll have a lot of them, and against almost any opponent we're likely to face it will be literally invincible because getting through stealth (even the Gen 1 Stealth of the F-117) is a lot harder then it looks in a Navy white paper.

Actually, getting through stealth isn't that bad when using low-frequency ground based radar. Getting through it in the air is a challenge. That's why the advanced stealth of the F-22 and the B-2 are a much better fit for early combat: they'll have vastly better survivability than the JSF. For later in the campaign - when the enemy no longer has effective anti-air defenses - there's no reason to fly significant amounts of costly aircraft sorties. At that point, you want to fly legions of cheap, effective aircraft in and pin down the enemy so they can't so much as glance out from under the rocks they're hiding under without JDAMs raining down on them from all directions.

Comment Systemd, pass II (Score 1) 187

Sure, no problem. If you dislike systemd that much, it certainly makes sense to move to a different software platform.

I don't particularly dislike systemd per se. I do observe the controversy around it, and the image of it and its project, painted by its opponents (some of whom have enough creds that it's unlikely that they're talking through their hats), indicates that the claimed issues are likely to be real problems, and this may be a tipping point for Linux adoption and user choice among distributions or OSes.

Your Snowden argument isn't particularly applicable in this instance, as you have access to the full source code for systemd. If you're not comfortable looking through C code, then any init system would be a problem for you. ... If you think that porting your laptop, home servers and desktops to a completely different operating system is less effort than learning how systemd works, then I can only conclude you haven't tried to learn how systemd works. Or you've severely underestimated the work involved in moving to another OS.

I did my first Linux drivers (a PROM burner and a Selectric-with-selonoids printer) on my personal Altos ACS 68000 running System III, wrote a driver for a block-structured tape drive for AUX - working from my own decompilation of their SCSI disk driver (since the sources weren't available to me initially), ported and augmented a mainframe RAID controller from SvR3 to SvR4, and so on, for nearly three decades, through hacking DeviceTree on my current project. I don't think C has many problems left for me, nor does moving to yet another UNIX environment - especially to one that is still organized in the old, familiar, fashion. B-)

As for trying to learn how systemd works, that's not the proper question. Instead, I ask what is so great about it that I should spend the time to do so, distracting me from my other work, and how doing this would meet my goals (especially the undertand-the-security-issues goal), as compared to moving to a well-supported, time-proven, high-reliability, security-conscious alternative (which is also under a license that is less of a sell to the PHBs when building it into a shippable product.)

Snowden's revealations show that the NSA, and others like them are adept, at taking advantage of problems in obscure corners of systems and using that obscurity to avoid detection. The defence against this is simplicity and clarity, avoiding the complexity that creates subtle bugs and hides them by burying them in distractions. Bigger haystacks hide more needles.

The configuration for systemd isn't buried. It's there for all to see and change, in plain text. Logging in binary form is _optional_. You can choose to direct logged messages to syslog, or use both syslog and binary, to have the "best of both worlds", albeit with the best of disk usage.

Unfortunately, I don't get to make that choice myself. It's made by the distribution maintainers. My choice is to accept it, open the can of worms and redo the work of entire teams (and hope their software updates don't break things faster than I fix them), or pick another distribution or OS.

Again, why should I put myself on such a treadmill of unending extra work? If I could trust the maintainers to mostly make the right choices I could go along - with no more than an audit and perhaps an occasional tweak. But if they were making what I consider the right choices, I wouldn't expect to see such a debacle.

Entangling diverse processes into an interlocking mass is what operating systems are all about! ;)

No, it's not. The job of an operating system is to KEEP them from becoming an interlocking mass, while letting them become an interacting system to only the extent appropriate. It isolates them in their own boxes, protects them from each other, and facilitates their access to resources and ONLY their LEGITIMATE interaction wherever appropriate and/or necessary. The job is to Keep It Simple while letting it work.

Your phrasing, and making a joke of this issue, is symptomatic of what is alleged to be wrong with systemd and the engineering behind it.

Comment Re:Routing around (Score 2) 198

At a large scale, the internet was designed to route around individual problems such as this.
Can't this same principle be applied on a smaller scale?

Yes, it can. Just dig a whole bunch MORE trenches around the country at enormous cost.

The SONET fiber networks were designed to be primarily intersecting rings. Most sites have fiber going in opposite directions (with a few having more than two fibers going off in more than two directions so it's not just ONE big, convoluted, ring.) This is built right into the signaling architecture: Bandwitdth slots are pre-assigned in both directions around the ring. Cut ONE fiber run and the signals that would have crossed the break are folded back at the boxes at each end of the break, run around the ring the other way, and get to where they're going after taking the long route. The switching is automatic and takes place in miliseconds. The ring approach means that the expensive cable runs are about a short and as separated as it's possible to make them.

But cut the ring in TWO places and it partitions into two, unconnected, networks. To get from one to the other you have to hope there's another run between the two pieces, and there's enough switching where they join to reroute the traffic.

IP WANs have, in some portions, also adopted the ring topology as they move to fiber, rather than sticking to the historic "network of intersecting trees" approach everywhere. That's partly because much of the long haul is done on formerly "dark fiber" laid down in bundles with the SONET rings from the great fiber buildout (or is carried in assigned bandwidth slots on the SONET networks themselves), partly because the same economics of achieving redundancy while minimizing costly digging apply to high-bandwidth networking regardless of the format of the traffic, and partly because routers that KNOW they're on a ring can reroute everything quickly when a fiber run fails, rather than rediscovering what's still alive and recomputing all the routing tables.

= = = = =

Personal note: Back when Pacific Bell was stringing its fibers around the San Francisco Bay Area, I was living in Palo Alto. They did their backbone as two rings. There was only one section, perhaps a mile long, where BOTH rings ran along the same route. It happened to go right past my house, with the big, many-manhole repeater vault right next to the house. (I used to daydream of running my own fiber the few feet into the vault. B-) The best I had available, in those pre-DSL days, were dialup with Telebit PEP modems (18-23 k half-duplex) and base-rate (128k) ISDN.)

Comment Have to do this all the time. (Score 2) 251

In ham radio command and control over remote digital ground stations all have clear text passwords because it's against the law to encrypt on ham radio bands. So every password is a single use.

Today, if I connect to the digipeater that is near me I will use the password S4tA12fDg
and it will work once and only for a certain window for that single login to happen.

Any company worth anything would do the same. Here is your link, here is your one time use password, you had better get the file in the next 20 minutes or that password will not work.

Perfectly secure for simple crap that really has zero value like a school transcript.

Slashdot Top Deals

If all else fails, lower your standards.

Working...