Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Sort of.. (Score 2) 86

We aren't talking about a rack full of dell/hp knock-off "servers". OCP hardware is rows of racks full of stripped down, barebones systems. If your "mission critical" app fails, it's because you or your data center are a bunch of fools. Resilience comes from redundancy. If you fail to provide the redundant hardware, or capacity to spin up your crapplication on other systems, then that's your damn fault. (just as much as choosing to build your own rack full of budget trash.)

OCP hardware is cheap, so you can afford a lot of it. But it's cheap, and thus, prone to higher failure rates. This equals, in enterprise definitions, an "unreliable infrastructure". In the end, it'll work out to roughly the same total cost, but with one all the money is spent up front to fill a room no one visits, vs. the other spending very little to fill the same room but has people in there regularly replacing failed components. (Banks prefer the former, Google, the latter.)

Comment Re:MITM or unencrypted (Score 1) 104

My guess is they don't handle them securely because they don't see them as that sensitive. They are, after all, numbers humans have to have to get the right containers. At some point, they will be in a format that can be stolen -- i.e. on the waybill handed to the driver. You're basically trying to secure a phone number -- randomly generated and rotating, but still something more than one person necessarily knows.

How securely do you handle your Fedex or UPS tracking numbers? (granted, you cannot show up at the warehouse, read off a number, and get any package. If you have the, you-weren't-home waybill, however, they'll hand over whatever it is. USPS is the same, btw -- never been asked for ID)My guess is they don't handle them securely because they don't see them as that sensitive. They are, after all, numbers humans have to have to get the right containers. At some point, they will be in a format that can be stolen -- i.e. on the waybill handed to the driver. You're basically trying to secure a phone number -- randomly generated and rotating, but still something more than one person

Comment Re:Idiotic Question! Answer: Price, Range, and .. (Score 1) 688

Hybrids don't have a range problem, and they also aren't the subject of the article... LOTS of people have hybrids today; you don't notice them as much because they look just like their non-hybrid models. Pure EVs aren't selling well because they cost (a lot) more (in some cases 2x), have crap range (100-200mi vs 500-700mi), and take forever to recharge (hrs vs. mins.)

For the record, I make numerous 200+mi trips per year: 223mi 3-4x, 209mi 2x, 536mi 1x. Last year included a trip to Sebring FL (752mi)

Comment Re:Its because she refused to censor a question (Score 1) 385

You've clearly never worked in any admin position. When someone is being fired, only those required to make the firing decision (management, HR, etc.) will be in-the-know. At the time of firing, only those necessary to effect the dismissal (i.e. IT, security, etc.) will be told about it; and they won't be told shit as to why.

The mods are a bunch of stupid children. If they aren't happy with the way things are being run, they can work within the system tty to change it, or they can quit. Paid or not has nothing to do with it; unprofessional childish bullshit is just that. Trashing the site is what a 5yo would do.

Comment Re:802.11 is unlicensed... set up a noise generato (Score 1) 268

Cellphones operate in licensed bands. Thus, jammers are illegal.

Drones (RC crap) operate in unlicensed bands and must accept any interference that may exist. Jamming them is not, technically, illegal. However, jamming them would not be in anyone's best interest -- or really worth the effort. (how many jammers would it take to cover a mountain?)

Arming the DC10 is, of course, the correct answer. :-)

Comment Re:Using Linux would prevent these Cisco mishaps! (Score 2) 112

There are lots of switches running linux. Of course, linux isn't the thing doing the switching.

The question to ask is can you get to the OS and/or ssh configuration to remove whatever the vendor may have installed? (i.e. remove whatever ssh backdoor keys they left there.) In most cases, the answer is "Hell. No."

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...