Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:This is your run of the mill CDN (Score 1) 138

Absolutely not. You don't need to differentiate packet based on content, source or destination to provide CDN services.

You just need to build a CDN, i.e., caches, mechanisms for content replication close to its destinations etc etc.

Akamai does not need Telcos to differentiate packets for its CDN to work. Similarly Telco CDNs do not imply that Telcos differentiate packets.

If I am still not understood, here is the wikipedia definition to make it easier for you.

"A content delivery network or content distribution network (CDN) is a system of computers containing copies of data, placed at various points in a network so as to maximize bandwidth for access to the data from clients throughout the network. A client accesses a copy of the data near to the client, as opposed to all clients accessing the same central server, so as to avoid bottlenecks near that server."

Comment This is your run of the mill CDN (Score 5, Interesting) 138

Similar to those deployed by Akamai and Limelight for their customers, and by Google and Microsoft for themselves.

A typical case of a Telco moving into an additional market.
Arguably, it does allow BT to offer multi-tier services. But it is not packet-level differentiation
in the network, which is the issue at the heart of the net-neutrality debate.

If Content Distribution Networks violate net neutrality and the /. crowd thinks so, then
we should be blasting Akamai and Google long time before we started blasting the Telcos.

Space

Buckyballs Detected In Space 117

Rhodin writes "Fullerenes, also known as buckminsterfullerenes or 'buckyballs,' were detected about 6,500 light years from Earth in the cosmic dust of Tc 1 (PDF; abstract), an object known as a planetary nebula. 'We found what are now the largest molecules known to exist in space,' said astronomer Jan Cami of the University of Western Ontario, Canada, and the SETI Institute in Mountain View, Calif. 'We are particularly excited because they have unique properties that make them important players for all sorts of physical and chemical processes going on in space.'" (More, below.)

Submission + - Are 89% of BitTorrent files illegal? (delimiter.com.au)

An anonymous reader writes: A university in Australia has come up with some interesting research. After looking at more than a million BitTorrent files, they've come to the conclusion that 89% percent of the files infringe copyright on one level or another. However, it looks like people are mainly downloading a small core of content — just 15,000 torrents (4 percent or so) were responsible for 90 percent of seeders. The full report is available online for downloading, and contains a lot of interesting insights about the BitTorrent universe. It looks like they mainly analysed files through the Torrentz.com meta-search engine, which can search a bunch of different BitTorrent sites.
Robotics

Armed Robot Drones To Join UK Police Force 311

Lanxon writes "British criminals should soon prepare to be shot at from unmanned airborne police robots. Last month it was revealed that modified military aircraft drones will carry out surveillance on everyone from British protesters and antisocial motorists to fly-tippers. But these drones could be armed with tasers, non-lethal projectiles and ultra-powerful disorienting strobe lighting apparatus, reports Wired. The flying robot fleet will range from miniature tactical craft such as the miniature AirRobot being tested by one police force, to BAE System's new 12m-wide armed HERTI drone as flown in Afghanistan."
Programming

How Do You Accurately Estimate Programming Time? 483

itwbennett writes "It can take a fairly stable team of programmers as long as six months to get to a point where they're estimating programming time fairly close to actuals, says Suvro Upadhyaya, a Senior Software Engineer at Oracle. Accurately estimating programming time is a process of defining limitations, he says. The programmers' experience, domain knowledge, and speed vs. quality all come into play, and it is highly dependent upon the culture of the team/organization. Upadhyaya uses Scrum to estimate programming time. How do you do it?"

Comment Re:Are we mature enough as a species for this ? (Score 1) 295

"You wonder if our technology is developing faster than our enlightenment? We already have enough weapons to kill everybody on the planet 100 times over, and our top priority is watching "Jersey Shore"... does that answer your question?"

Slightly off topic, but according to this article your "100 times over" assertion is incorrect: http://www.johnstonsarchive.net/nuclear/nuclearwar1.html

Television

Nielsen Ratings To Count Online TV Viewing 178

cashman73 writes "Several sources are reporting that Nielsen is finally going to start measuring online TV viewing. You would think that this is a good idea, since many people are now watching TV programs on the Internet. However, there's a catch: Nielsen's new service will only count viewings of a program with the same number of advertisements as the network TV model. So, this immediately eliminates Hulu, as well as any shows watched via the network's own websites. As a matter of fact, it would currently only include Comcast's XFinity TV service, and TV Everywhere (which, so far, appears to be the equivalent of Duke Nukem Forever for television). So either, (a) everyone will rush out to watch their online TV on Comcast XFinity, so that their viewing counts in the ratings (unlikely), or (b) Hulu and everyone else starts to put more advertisements on their shows (more likely, but would also probably mean the death of Hulu)."

Comment Because ISPs in EU sell secured router/modems (Score 1) 274

It is very simple really. ISPs in the densely populated EU quickly figured out that if they don't restrict internet
access to the paying customers, many other users from the nearby apartments/townhouses will free-ride.

So, they simply sell the model and the wireless router as one package, with a passcode that is setup by the ISP
and printed on the back of the router.

It is not that European users or ISPs are more aware of security. It is because ISPs want to make sure people
do not free-ride on their services, and that the users do not have to set up themselves the security of their wireless router.

Music

Music While Programming? 1019

BubbaDoom writes "In our cubicle-ville, we have programmers intermixed with accounting, customer support and marketing. As programmers, it is our habit to put on our headphones and listen to our portable music players to drown out all of the noise from everyone else. The boss recently sent an email just to the programmers demanding that we do not use our music players at work because he thinks it distracts us from our jobs and causes us to make mistakes. Of course, we've explained to him that prattle from the other people is much, much more distracting, but he insists his policy is the right one. What is the Slashdot community's experience with music at work for programmers?"

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...