Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Slashdot Propaganda Machine (Score 2) 218

10 years ago, there were regularly 800-1000 comments on articles. Now, a highly commented article gets around 200.

It's a shame that the editors have stopped doing their jobs and post anything without checking it (at best!). But this isn't the first time I've seen it.

This submission is obviously false, and it needs to be pulled down or with the inflammatory and false sentence deleted. Since it's been up for hours, and there are numerous posts above that debunk the submission, it leads me to believe that Slashdot wants the clickbait and is leaving it up on purpose.

Do the right thing. Pull the article. Save what's left of your reputation, Slashdot.

Sci-Fi

Video Where are the Flying Cars? (Video; Part Two of Two) 66

Yesterday we ran Part One of this two-part video. This is part two. To recap yesterday's text introduction: Detroit recently hosted the North American Science Fiction Convention, drawing thousands of SF fans to see and hear a variety of talks on all sorts of topics. One of the biggest panels featured a discussion on perhaps the greatest technological disappointment of the past fifty years: Where are our d@%& flying cars? Panelists included author and database consultant Jonathan Stars, expert in Aeronautical Management and 20-year veteran of the Air Force Douglas Johnson, author and founder of the Artemis Project Ian Randal Strock, novelist Cindy A. Matthews, Fermilab physicist Bill Higgins, general manager of a nanotechnology company Dr. Charles Dezelah, and astrobiology expert Dr. Nicolle Zellner. As it turns out, the reality of situation is far less enticing than the dream -- but new technologies offer a glimmer of hope. (Alternate Video Link)

Comment Re:Locator/Identifier Separation Protocol (LISP) (Score 1) 248

Thanks for replying to my post instead of keeping the non-brilliance of my ideas to yourself. My biggest concern when writing that post was that I was talking to myself. I'll attempt to address your concerns one by one.

You're... welcome?

Just about all ISPs and backbone carriers carry full tables and many large organisations do as well for multihoming purposes.

Then I misunderstood you. I thought you were repeating what others have said earlier, claiming each router carries a complete copy of all the routes on the Internet, which of course isn't true.

Now that we have that cleared up, I'll snip out parts I don't need to reply to.

Your bitcoinesque solution for IPv6 allocation would make things worse.

It seemed like a technical solution to avoid the politics of Internet governance. I admit it wasn't well thought out, however I am curious how it would make things worse by allowing a small block of IPv6 addresses to be allocated in a decentralized way and adding cryptographic integrity along the way.

Plus, networks transit other networks all the time, meaning one network can advertise a prefix they don't own, legitimately.

I should have been more specific; I was suggesting originating advertisements would be signed as opposed to transient advertisements.

You are asking for DomainKeys but with routes. That is too computationally expensive right now and would require too many lookups and time. Perhaps somewhere down the line when the big iron routers catch up with CPU resources vs line speed.

Routers that speak BGP are on the ISP and backbone level,

Medium to large organisations also use BGP to advertise their address space to their ISP(s).

Not to your home router.

and are physically secured.

Originating BGP route advertisement signing is not intended to supplant physical security measures.

I'm aware of the difference between remote access, console access, and physical access, and hardware vs software.

Your home router doesn't speak BGP, and if it did, your ISP's router would ignore it.

None of this would really be necessary for a home user as their ISP would be doing all of this on their behalf.

That's what I just said...

To announce rogue routes, one needs to hack into the ISP and backbone peering routers -- which happened recently, but is rare.

To announce rogue routes, one only needs an ISP that doesn't filter incoming BGP advertisements properly. It seems apparent as the Internet grows there will be more and more BGP peerings and as a consequence of that not all of them will be competent or aboveboard with their implementations.

You're just restating what I said. I guess I wasn't clear, but I'm also assuming a best practice (or as near as possible) implementation, because there's no use talking about security if people are going to leave the front door open, right? It's not even a discussion at that point.

The Resource Public Key Infrastructure (RPKI) is a step in the right direction, however seems to be mainly for preventing mis-configurations from causing outages. Someone with malicious intent need only use AS path prepending to bypass this protection.

Again, anyone with access to the routers can do this right now. Any organization that doesn't shut its front door can have this happen. This can be solved through best practices. This isn't e-mail. Even if you got people on board for this, it would take a protocol revision AND all new hardware for everyone. It's not going to happen anytime soon.

Don't take it personally. Your offered solution for route signing (whether you wrote them or not) just isn't feasible right now.

Comment Re:Locator/Identifier Separation Protocol (LISP) (Score 1) 248

No one router has a "full table" of all the routes. The routing protocols and the engineers work to make sure the tables are as close to lean as possible.

Your offered solution isn't necessary.

Your bitcoinesque solution for IPv6 allocation would make things worse. Plus, networks transit other networks all the time, meaning one network can advertise a prefix they don't own, legitimately.

Routers that speak BGP are on the ISP and backbone level, and are physically secured. Your home router doesn't speak BGP, and if it did, your ISP's router would ignore it. To announce rogue routes, one needs to hack into the ISP and backbone peering routers -- which happened recently, but is rare.

Transportation

California May Waive Environmental Rules For Tesla 327

cartechboy writes: We all know Tesla is working on its Gigafactory, and it has yet to announce officially where it will be. But the automaker did announce a shortlist of possible locations, and California wasn't on it. The state has quickly been trying to lure Tesla to get back into contention. Now the state may waive environmental rules which would normally make construction of such a large manufacturing facility more difficult. Apparently, Governor Jerry Brown's office is currently negotiating an incentive package for Tesla that would waive certain parts of the nearly half-century-old California Environmental Quality Act. Not only that, but state officials are reportedly considering letting Tesla begin construction and perform damage mitigation later, along with limiting lawsuits that could slow down the project. Let's not forget some massive tax breaks, to the tune of $500 million. Is California stepping out of bounds here?
Bitcoin

Inside BitFury's 20 Megawatt Bitcoin Mine 195

1sockchuck (826398) writes Bitcoin hardware vendor BitFury has opened a 20-megawatt data center to expand its cloud mining operations. The hashing center in the Republic of Georgia is filled with long rows of racks packed with specialized Bitcoin mining rigs powered by ASICs. It's the latest example of the Bitcoin industry's development of high-density, low-budget mining facilities optimized for rapid changes in hardware and economics. It also illustrates how ASIC makers are now expanding their focus from retail sales to their in-house operations as Bitcoin mining becomes industrialized.
Networking

Multipath TCP Introduces Security Blind Spot 60

msm1267 (2804139) writes If multipath TCP is the next big thing to bring resilience and efficiency to networking, then there are some serious security issues to address before it goes mainstream. An expert at next week's Black Hat conference is expected to explain how the TCP extension leaves network security gear blind to traffic moving over multiple network streams. Today's IDS and IPS, for example, cannot correlate and re-assemble traffic as it's split over multiple paths. While such attacks are not entirely practical today, as multipath TCP becomes a fixture on popular networking gear and mobile devices, the risks will escalate. "[Multipath TCP] solves big problems we have today in an elegant fashion," said Catherine Pearce, security consultant and one of the presenters, along with Patrick Thomas. "You don't have to replace hardware or software; it handles all that stuff behind the scenes. But security tools are naïve [to MPTCP], and make assumptions that are no longer valid that were valid in the past."
Displays

New Display Technology Corrects For Vision Defects 28

rtoz (2530056) writes Researchers at the MIT Media Lab have developed a new display technology that automatically corrects for vision defects without requiring glasses or contact lenses. This technique could lead to dashboard-mounted GPS displays that farsighted drivers can consult without putting their glasses on, or electronic readers that eliminate the need for reading glasses. The display is a variation on a glasses-free 3-D technology: a 3-D display projects slightly different images to the viewer's left and right eyes. Similarly, this vision-correcting display projects slightly different images to different parts of the viewer's pupil.
Bug

Passport Database Outage Leaves Thousands Stranded 162

linuxwrangler (582055) writes Job interviews missed, work and wedding plans disrupted, children unable to fly home with their adoptive parents. All this disruption is due to a outage involving the passport and visa processing database at the U.S. State Department. The problems have been ongoing since July 19 and the best estimate for repair is "soon." The system "crashed shortly after maintenance."
Businesses

Why TiVo's Founders Crashed and Burned With Qplay 50

Velcroman1 (1667895) writes "Michael Ramsay and Jim Barton created a revolution with TiVo, a device that challenged the notion that we had to watch TV shows when they aired. And they hoped to do it again with Qplay, a device that challenged the notion that short-form videos had to be consumed one at a time, like snacks instead of meals. Qplay streamed curated queues of short-form Internet video to your TV using a small, simple box controlled by an iPad app. So what went wrong? Unlike TiVo, the Qplay box was difficult to justify owning, and thevalue of the service itself is questionable. And as of last week, Qplay is closed."
Programming

Video Peter Hoddie Talks About His Internet of Things Construction Kit (Video) 53

You remember Peter Hoddie, right? He was one of the original QuickTime developers at Apple. He left in 2002 to help found a startup called Kinoma, which started life developing multimedia players and browsers for mobile devices. Kinoma was acquired in 2011 by Marvell Semiconductor, whose management kept it as a separate entity.

The latest creation from Peter and his crew is the 'Kinoma Create,' AKA the 'JavaScript-Powered Internet of Things Construction Kit.' With it, they say, you can 'quickly and easily create personal projects, consumer electronics, and Internet of Things prototypes.' EE Times mentioned it in March, and they're not the only ones to notice this product. Quite a few developers and companies are jumping on the 'Internet of Things' bandwagon, so there may be a decent -- and growing -- market for something like this. (Alternate Video Link)
Businesses

Ask Slashdot: When Is It Better To Modify the ERP vs. Interfacing It? 209

New submitter yeshuawatso writes I work for one of the largest HVAC manufacturers in the world. We've currently spent millions of dollars investing in an ERP system from Oracle (via a third-party implementor and distributor) that handles most of our global operations, but it's been a great ordeal getting the thing to work for us across SBUs and even departments without having to constantly go back to the third-party, whom have their hands out asking for more money. What we've also discovered is that the ERP system is being used for inputting and retrieving data but not for managing the data. Managing the data is being handled by systems of spreadsheets and access databases wrought with macros to turn them into functional applications. I'm asking you wise and experienced readers on your take if it's a better idea to continue to hire our third-party to convert these applications into the ERP system or hire internal developers to convert these applications to more scalable and practical applications that interface with the ERP (via API of choice)? We have a ton of spare capacity in data centers that formerly housed mainframes and local servers that now mostly run local Exchange and domain servers. We've consolidated these data centers into our co-location in Atlanta but the old data centers are still running, just empty. We definitely have the space to run commodity servers for an OpenStack, Eucalyptus, or some other private/hybrid cloud solution, but would this be counter productive to the goal of standardizing processes. Our CIO wants to dump everything into the ERP (creating a single point of failure to me) but our accountants are having a tough time chewing the additional costs of re-doing every departmental application. What are your experiences with such implementations?

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...