Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Treason (Score 1) 327

Bullshit.

If I sold something that knowingly was designed to kill solders, than yes. Selling something to the military with degraded quality and attempting to defraud someone?. .. uh... I don't think so.

Seriously, there are numerous military contractors out there that are "gaming the system" to provide to our troops overseas. We could start with Haliburt.... oh nevermind.

Assholes? Yes! Illegal.. Yes!

Treasonous? Sorry, I don't think so.

Comment Code Review? (Score 1) 298

So, who is going to review the code in this closed process? The judge? :) Hehehe... I can see him now powering up is new Mac Book pro, reviewing the source code and exclaiming "There it is... the smoking gun!"

In all seriousness, how would they manage this process? Would the plaintiff and defendant hire expert programmers to comb through the code looking for evidence? Would it then be presented to the judge and he would decide? Would he even know how to decide?

I can see it now - "Your honor, you can clearly see here where Apple overloaded the xxYY class with functions that are clearly..... " Watching the judge's eyes glass over, you would have to wonder how something like this would actually come to a "successful" conclusion for either side.

Comment Power Fail Often (Score 2, Interesting) 100

Frankly, if data centers are going to proclaim their redundancy, they should test by power failing the entire data center once every two weeks at a minimum. A data center that goes down twice in a month would get ahead of any issue pretty fast. Lessons learned from the staff and the management are very valuable.

The marketing messaging:

"We power fail our data center every two weeks to ensure our backups work..."

Sound scary? Just think about the data center that has never been through this process. at that point, the wet paper bag you tried to market your way out of dried rather quickly and you are now faced with the prospect of slapping around inside of a zip-lock.

Comment Government problem solution... commercial sector. (Score 1) 210

It sounds to me like a cry for help directed to the public sector, from the US Government.

Imagine a subscription/license service for a geo-location broadcast platform from space that is unrestricted to users and as accurate as science knows how to make such things "accurate." How much do you think that license would be worth?

Scary? Absolutely.

Possible? More Absolutely!

There is serious money in geo-location today. Not just to target nuclear warhead.. if you call that a business.

Comment Re:Wow (Score 4, Informative) 359

Come on folks, this is a serious news article :-)

I've spent a tremendous amount of time listening to these bootleggers on the FLTSATCOM satellites. It is rather easy for them (the Brazilians and others) to modify a amateur radio or other transmitters to use these satellites.

Basically, these satellites work by listening on one frequency (an uplink), and rebroadcasting what they hear over a specified frequency bandwidth to listeners (a downlink). The uplink and downlink frequencies are well known and published across many mediums - including Mil-Std documents which specify how terminals should interact with these satellites.

I published a spectrum analysis article on this very topic here (shameless plus):

http://radioreference.blogspot.com/2008/10/vhfuhf-spectrum-analysis-using-rf-space.html

This method of communication is actually very secure for the US Military - since they rarely use clear voice on these transponders - meaning, they encrypt all transmissions to and from.

Now, an open repeater, in Geospacial orbit, provides a set of repeaters for anyone to use... either the US military (which they still actively use) - or others who have equipment that can transmit to, and reiceve from.

For those that are dismayed by this approach, understand that when this technology was developed, security by obscurity was a common approach even for military agencies. It wasn't feasible even 10 years ago to "authenticate" use access to open satellite transponders.

Security

Submission + - Brazilian Pirates Hijack US MIlitary Satellites (radioreference.com)

blantonl writes: "This article in Wired explains how Brazilians all over the country are using modified amateur radio equipment to communicate with each other using US Military communications satellites — effectively creating their own CB radio network on the backs of the US Military. Recent efforts to crack down have resulted in arrests of some of the users, however the behavior still continues today."

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...