Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Does it run Beta? (Score 1) 163

No, you aren't. This was a key point in Liedtke's design for L4.

A "context switch" in a macrokernel OS (on Intel hardware; architectures which support tagged TLBs have a different tradeoff) is a single thing. In L4, the various parts of a context switch are decoupled and the kernel tries very hard to only do as much as it needs to. For commonly-accessed drivers, for example, an IPC round-trip requires only a selector switch (which a macrokernel OS does anyway when it enters and exits kernel mode) and avoids the address space switch completely.

Of course, none of this applies to Mach, which isn't a "micro"-kernel by modern standards.

On the P4, the expensive part was entering and exiting kernel mode; it even dominated address space switching and TLB reload for typical scenarios. I don't know about modern CPUs, but the key point remains: "extra context switching [...] kills performance" is a claim that's hard to prove.

Comment Re:Does it run Beta? (Score 1) 163

High frequency trading systems are not a typical example of anything, and should be held as a typical use case for any reasonable operating system. They do things like use custom network hardware which plays fast and loose with the standards, and could easily be compromised if they weren't on a fairly trusted network.

Submission + - Sophisticated Spy Tool 'The Mask' Rages Undetected for 7 Years (wired.com)

thomst writes: Kim Zetter of Wired's Threat Level reports that Kaspersky Labs discovered a Spanish-language spyware application that employs "uses techniques and code that surpass any nation-state spyware previously spotted in the wild." The malware, dubbed "The Mask" by Kaspersky's researchers, targeted targeted government agencies, diplomatic offices, embassies, companies in the oil, gas and energy industries, and research organizations and activists had been loose on the Internet since at least 2007, before it was shut down last month. It infected its targets via a malicious website that contained exploits — among which were the Adobe Flash player vulnerability CVE-2012-0773 — that affected both Windows and Linux machines. Users were directed to the site via spearphishing emails.

Comment Re:This entire system is so f-ed up (Score 3, Interesting) 67

OK, so they want to store everything passing across the lines that they deem suspicious,

No. Not really.
They really do want to store everything passing across the lines. Period. The "deeming suspicious" part only comes into play once they get a warrant to go look at the data they've already collected and stored.

The up-side to this idea is that the NSA isn't holding onto the data that they promise they're not looking at without a warrant. That's about it.

The down-side to this is that we SURE AS SHIT can't trust a third party to not look in the box. This third party is also implicitly alerted to who the NSA is investigating and when. That information alone is itself sensitive and not the sort of thing to be trusted to a third party.

Of course, you know, I guess I could extrapolate my answer and cut down your sentence even further:

OK, so they want to store everything

Comment Why even consider it? (Score 5, Insightful) 67

It's a bluff. A feint. A thinly veiled threat. It's not intended to actually come to pass. One of the things Obama proposed is to move the keys to the friggin kingdom from government controlled servers to nebulous "third parties". And in the very same damn speech he pointed out how this would be a ludicrously bad idea.

(Well, I mean, he also suggested that the telcom companies who move this data keep it until the NSA asks for it. That or third parties. I don't mean to harp on a stray comment or anything.)

But let me spell out the subtext here for anyone that can't read between the lines: If you try and keep the government from storing this data, we'll just go find someone else to hold it. And my, my, my, doesn't that sound just simply horrible? Be a REAL SHAME if someone were to try and enforce that 4th amendment 'round here.

Also, fuck beta. I have no way to tell if someone responded to me other than looking at that specific thread.

Comment Re:Illogical (Score 1) 401

Let's see if you feel the same way if and when you reach the age of 82.

My mother was treated for cancer in her '80's. The cancer was (temporarily) defeated, but she lost her quality of life. Afterward, the cancer treatment, she regretted opting for treatment instead of palliative care. When the cancer came back, she opted for palliative care.

My father (approaching 100) told me years ago that he felt that he had done everything that we wanted to do and did not fear death.

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...