Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Obligatory BOFH reference (Score 1) 257

http://www.marginart.com/misc/bofh/13may98.html

"Managers are stack-based," I explain. "Rule one is that they have, at most, a two-item stack limit. Mention a technical term and they'll push it onto their mental stack. Mention another, they push that up there as well. Mention yet another and they stack overload and reboot. That is, they think about what they're going to do after work, how sore their bum is, whether the marketing assistant knows her blouse is almost see-through, and so forth."

Simplifying Search For a Younger Audience 72

An article in the NY Times discusses how kids interact with search engines, which are primarily designed for adult users who are familiar with basic internet concepts. From the article: "When considering children, search engines had long focused on filtering out explicit material from results. But now, because increasing numbers of children are using search as a starting point for homework, exploration or entertainment, more engineers are looking to children for guidance on how to improve their tools. ... Stefan Weitz, director of Bing, said that for certain types of tasks, like finding a list of American presidents, people found answers 28 percent faster with a search of images rather than of text. He said that because Bing used more imagery than other search engines, it attracted more children. ... Children also tend to want to ask questions like 'Who is the president?' rather than type in a keyword. Scott Kim, chief technology officer at Ask.com, said that because as many as a third of search queries were entered as questions (up to 43 percent on Ask Kids, a variant designed for children), it had enlarged search boxes on both sites by almost 30 percent."

Comment Re:Seems reasonable... (Score 2, Funny) 520

I don't know why you all are so confused. The contract is pretty unambiguous to me:

> megabytes sent or received
> using Mobile Web (including
> advertising) will be aggregated each month, rounded up to the next
> megabyte, and billed at
> $1.99/MB.
> Rates are rounded to the nearest whole megabyte. One megabyte is equal
> to 1024 kilobytes.

This would imply a charge of $0 in your case. It would also charge you $2 when rounding up to the whole megabyte.

Using my verizon math skills, I can see that adding these two charges together gives us $2 + 0 = $20.
It would appear that you managed to save a whole 18 cents.

Comment Re:Structured Stream Transport (Score 2, Interesting) 230

I definitely agree with you. In fact byte streams being a fundamental part of POSIX is one thing I love and make use of every day, for example piping output between programs/sockets. My post was not very clear, but I was trying to say that users developing application protocols should not be using BSD sockets directly any more--people usually write or use libraries for that sort of thing.

As far as new protocols go, you can build basically anything using UDP (and UDP is far less likely to be firewalled than any custom IP-level protocol you make up). I think such a protocol could only ever be practically implemented user-space library anyway

I would be curious what the article thinks is so fundamentally wrong with the sockets paradigm.

Comment Re:Structured Stream Transport (Score 1) 230

I honestly had never heard of SCTP before, and I'm surprised that it is not used more widely since it has been around since 2000. It looks to be more complicated than what I was talking about since it covers more issues (talking to multiple hosts). Do you happen to know of any uses of this protocol in real applications?

BSD Sockets themselves are very flexible, I suppose I was complaining about the read/write semantics in stream sockets. Either way, it is possible to layer protocols even at the application level so it's not a big deal. Sadly I didn't get a chance to read the article before acm.org died.

Comment Structured Stream Transport (Score 5, Informative) 230

BSD sockets have a limitation of only a single stream at a time (for example, if you are loading a website over HTTP and you get stuck loading a huge image, you have no choice but to open up another socket connection or else wait). They are also stuck around the paradigm of only supporting byte streams, which means that users are always forced to write the same code over and over to create packet headers or delimited messages.

I would highly recommend checking out Structured Stream Transport. I'm not from MIT and I wasn't entirely satisfied with their sample implementation, but the paper is really insightful and explains how you can develop basically a smarter version of TCP that is both more efficient and also more flexible. And I'm sure there are other systems being developed with similar ideas in mind.

We definitely need to keep bsd sockets, if not just because I'm a regular user of netcat :-p, and also because they are what allow the creation of more advanced protocols, but I don't think most applications should still be using such low-level protocols today.

The Internet

ARIN Letter Says Two More Years of IPv4 266

dew4au writes "A reader over at SANS Internet Storm Center pointed out a certified letter his organization received from ARIN. The letter notes that all IPv4 space will be depleted within two years and outlines new requirements for address applications. New submissions will require an attestation of accuracy from an organizational officer. It also advises organizations to start addressing publicly accessible assets with IPv6. Is ARIN hoping to scare companies into action with the specter of scarce resources? This may be what's needed to spur adoption since there appears to be no business case for IPv6 deployment."

Comment Re:sure it is (Score 1) 1079

3. I am seeking the issuance of a warrant to search for the following property (describe the property to be searched as particularly as possible):

"All objects capable of storing digital data in any form, including but not limited to central processing units, optical scanners, digital cameras, modems, routers, memory sticks, thumb or usb drives, firewalls, tapes, zip drive disks, digital video disks, printers, operating systems, application program disks, software, hardware, CD-ROMs, computer access codes, passwords and/or protocols, all manuals, books, brochures, all evidence of ownership"

Central Processing Units? Firewalls? Scanners? "Computer access codes"? Protocols? Brochures? Books (doesn't say even computer-related)??? They might as well take this guy's whole bloody house! I mean, what's to say that my toaster can't store digital data, or my oven, right?

Aside from "All objects capable of storing digital data in any form" not being very "particular", how can they even justify stealing half that stuff.

If I'm accused of using Linux, how can they have a right to take all books I own? To rip the CPUs off my computer motherboards? To boot up my computer to search for iptables rules? Are there no laws that specify when a search warrant is legal, and what is allowed to be searched?

How can Detective Kevin M. Christopher get away with signing this? I would hope that he's going to have to justify his motives in court.

Another funny, if not so sad line:

has also recently been the victim of a mass e-mailing to theBoston College community in which he is reported to be gay and coming out of the closet.

And that breaks which law exactly?

Comment Flash mail server (Score 4, Informative) 357

I had a 4GB FAT32 flash drive that I used as storage for a mail server attached to an OpenWRT router. It required renaming and deleting files all the time (every time it got an e-mail)--so I think it wore down pretty quickly.

One day, the storage for the flash drive stopped working (from one hour to the next, without being touched, the computer acted like I had just yanked the drive out)--it would be recognized but report a "no media in drive" error when you tried to access it, like an empty CD drive. In fact I think Windows would say "Insert CD" or "No disc in drive F"

Comment Re:Boring... (Score 2, Funny) 425

That's why they made GeNToo!

Finally you can get the best of both worlds! The Win32 subsystem is such a mess, the Linux kernel is a mess. Once you have the GNU tools on the NT kernel, you get a very solid OS that even rivals Solaris 10 in many respects.

It's only been compiling for just a bit over 4 years, so I'm hopeful. It's not like it has crashed or anything... no that wouldn't make any sense...

Comment Re:What the fuck? (Score 1) 222

At least in most sane Apache configs that I have used, the web root is one directory above the htdocs folder, so you can store php scripts and read/write to one directory above what is publicly accessible. (for example /www/mydomain.com/htdocs or /home/username/public_html).

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...