Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:So Let Me Get This Straight (Score 1) 133

Tons of interesting stuff in that link, totally off topic, but details about rewriting win32 kernel with full unicode support as a realtime OS for Windows CE:

I do in fact know a little about Windows CE! from what I remember, it's a much simpler, cleaner design. its Win32 is a rewrite of a subset (for one: Unicode only, no ANSI), and the kernel is a hard realtime microkernel with some cool, unique features: for example, inter-process calls temporarily moved the calling thread to the server process, no roundtrips, no memory copies. this could only work because Windows CE had a single address space shared by all processes. this limited Windows CE to 4 GB of physical memory, but it was a necessity because it had to work on machines without a MMU. the fixed address space also limited Windows CE to 15 processes, don't know why so few (not threads though, you could create as many threads as would fit in memory, and you had 256 priority levels to choose from instead of Windows NT's meager 15)

this was until Windows CE 5. Windows CE 6 is a much more boring kernel, with separate address spaces and drivers running in kernel mode

Comment Re:fast growth (Score 1) 190

Yeah nearly one in five employees works in sales. Probably another one in five works in management in some capacity, and another one in five works in support roles, leaving you with perhaps 200 engineers? That's still a lot of engineers, but at 4 engineers per team that's 50 products or product segments they can focus on.

Comment Re: Summaries, how do they work? (Score 1) 72

If you're using something like CoreOS with systemd, you can spin up the database in a cluster of nodes, and something like fleetctl will spin up the database again on another node if you lose that node. If you write your database container correctly, then it will look for existing db containers in the node cluster and spin itself up as a secondary database, attaching to the primary and allowing you to spin up and down database capacity as needed, sort of your own ec2 system that can adjust itself based on load.

Comment Re:Summaries, how do they work? (Score 2) 72

Docker is Cloud 2.0 and is the biggest generational/watershed/great leap for IT since VMs.
Even Microsoft offers docker compatibility with their new NanoServer images.
This is The One Way Forward.
There's one guy working on a project called Atom/Atomic/Atome or something, which is basically your app compiled in to an OS container, instead of being built on top of an OS container, but still responding similar to a docker container.
In the mean time there are Linux Distros like RancherOS that let you basically run and build a server installing containers like apps. Your other option at the moment is Dokku which is sort of a Docker implementation of Heroku.
Docker is a Big Fucking Deal in Silicon Valley right now and while everyone is experimenting with Docker containers in 2016, everyone who is Anyone will be deploying their product at least in some channels using Docker in 2017.

Comment Re: This is why (Score 1) 225

taking advantage of the fact that binary data can be encoded into something that looks like a photo to software

Not just to software; the encoding looks like a photo to humans, too. It may not be a stunning landscape or an entrancing self-portrait, but even a photo of pure noise is still a photo.

Comment Re:Seems reasonable (Score 1) 173

So if the utility wants to deter bitcoin miners from moving in to their area (or at least charge them more to make up for the risk) they need to work with the local government to draw a line in the sand somewhere. That line needs to be drawn in a way that non-technical lawyers, judges and politicans can understand and that can be enforced using information the utility has access to.

I don't disagree with any of that, but whatever "line in the sand" they pick ought to have some relationship to the risks they're trying to mitigate. Power density is simply too arbitrary, and thus discriminatory. Do your bitcoin mining in a traditional data center drawing 220 MW and you pay an extra $3M/month. Colocate your mining operation at a low-energy farm operation spanning a few hundred acres, using the same amount of power, and you pay the normal rates. The risks haven't changed at all, but the power density is much lower.

They should just require a multi-year transferable contract with an early termination fee for any new commercial-grade service, backed by an insurance policy. Established industries with low churn would be able to get low premiums, since their risk would be low. Riskier industries would pay higher premiums. This would deal with the real issue while getting the utility out of the business of discriminating against specific customers.

Comment Strikethrough tag support. (Score 1) 1822

I would really like support for the [s] strikethrough tag [/s]. I sent off an email to almost four years ago to the day:

Are you guys ever going to implement strikeout ( [s] strikeout [/s] ) HTML tag support for slashdot? Or [strike] tag? As the average age of slashdot continues to hover around 22 (I think?) the old say somethin^H^H^H^H joke is going over more and more people's heads. Many online sites now support the [s] strikeout tag, tag. I realize it's technically depreciated in the 4.0 spec, but all the major browsers support it.

And two days later imagine my suprise when I got back this reply(!) from Vladyslav K. at

Hi [hadlock],

Thanks for reaching out to us, I just checked the specs and don't see why we should not support it, it's redefined but still probably in proper context.

I created a ticket for this to be addressed.



So... A) did that ticket ever get created? and B) will you please implement it?
Thank you!

Comment Re:Seems reasonable (Score 1) 173

To keep entire proposed 220 MW addition under the 250kW/ft^2 threshold you only need to add 880 square feet, which would be far less expensive than paying the 2c/kWh surcharge, over $3M per month for 220 MW.

Never mind that; the summary just got the units completely wrong, and consequently was off by four orders of magnitude. The actual threshold from the linked slides is 250 kWh/ft^2/year, which is a long-winded way of saying 28.5 W/ft^2. Ergo, 220 MW would need a bit over 7.7 million square feet of operating space, or about 177 acres, to stay below the threshold, which makes the rule a bit harder to game. (Partner with a local farming operation, perhaps?)

Power density is still a stupid way to decide electric rates. The size of a client's operating space has no bearing whatsoever on cost or risk to the electric company.

Comment Re:Seems reasonable (Score 1) 173

They are not targeting miners specifically. They are targeting "high density users (more than 250kW per square foot)".

Yeah, right. The rule may not say "bitcoin mining" in so many words, but even the utility company itself said that this was targeted at miners.

The real issue is that kW per square foot is a arbitrary and meaningless metric. It has nothing at all to do with the cost of delivering the electricity or the risks associated with building out new infrastructure. It's not unreasonable that the utility wants some compensation in exchange for the risk of building out expensive distribution infrastructure, especially for the sake of what they see as a risky industry, but they need to come up with a more equitable basis for sharing the risks than "power density".

If nothing else, the metric is too easily gamed: just rent a larger facility. To keep entire proposed 220 MW addition under the 250kW/ft^2 threshold you only need to add 880 square feet, which would be far less expensive than paying the 2c/kWh surcharge, over $3M per month for 220 MW. Minimal expense to the miners—all of which goes to real estate and construction, not the utility—and the utility remains stuck with exactly the same expenses and risks as before.

Comment Re:One word (Score 1) 171

To give only representation to people or groups and not people in different geographies is called taxation without representation, since, then the geographies with low populations are not getting a vote comparable to the vote that larger communities get in the process.

Nonsense. It's people that are taxed, not geographies. Representation by land-mass is perhaps the least equitable way of voting on taxation. That just ensures that the more populous areas suffer from tax burdens far in excess of their representation.

(The most equitable arrangement, of course, would be proportional representation based on how much taxes the individual pays—counting as tax any loss of value due to restrictions imposed on the use of one's property.)

Comment Re:SSL hides malware added by WordPress etc hack (Score 1) 216

And if you're buying internet service from a rogue ISP that alters web pages, you need a new ISP, not a red X.

Big-name ISPs like AT&T, Verizon, and Comcast have been caught tampering with HTTP traffic to insert their own tracking headers and ads—including scripts in some cases—and not everyone has a great deal of choice in ISPs in their area. This is hardly a theoretical concern, and HTTPS is the most direct and effective way to prevent such tampering.

Your own reputation is at stake, along with users' security. Do you want to get blamed for inappropriate content that some random ISP injected into your page? It may technically be the ISP's fault, or even the user's for choosing that ISP, but you made the tampering possible by failing to take reasonable and customary steps to ensure the integrity of the data delivered from your server.

A security-conscious company, head of household, or even ISP can largely protect users against malware that's been added to sites by detecting it at the firewall, as it enters the network. Unless of course it's https, in which case you can't detect the content at all.

If users want that sort of protection they can manually configure a proxy, thus consenting to allow their traffic to be inspected. We do need better proxy protocols for HTTPS which permit inspection but not tampering, and avoid bypassing the browser's built-in certificate validation. This could be accomplished by making the proxy a simple passive conduit while sharing the client's symmetric encryption key and IV with the proxy. This would let the proxy decrypt the traffic as it's forwarded and cut off the connection in the event of a problem, but tampering would still be detectable since the proxy would not possess the HMAC secret.

Companies and households could force all traffic to pass through the proxy simply by blocking direct connections. ISPs would have a harder time getting away with that, which is as it should be. ISP-level malware protection should be an optional benefit, not a mandatory requirement.

Comment Re:Not Sure What the HTTPS Hooplah is all about (Score 1) 216

HTTPS encrypts the data transfer, and provides for VERIFICATION that a third party CA believes the site is who it says it is. No authentication involved.

On the contrary, the HTTPS server is forced to authenticate itself as the holder of the private key signed by a CA. Verification is between the server and its CA, not between the client and the server, and serves as a preliminary to obtaining a CA's signature for the server's key.

TLS can also be used to authenticate the client using a client certificate or a password (TLS-SRP), but this is much less common.

Comment Re:Why do I need SSL? (Score 1) 216

So my simple web server, serving up some basic info - like maybe my most recent cat photos.. Are you saying that I *must* use SSL to do this?

If you don't use SSL then you're putting your users at risk, not because someone might find out that they're looking at cat pictures, but because someone can tamper with the unprotected connection and inject malware which appears to come from you.

And to make SSL work I have to pay to get a certificate (cuz I don't really trust the freebie options yet).

That's your problem. The free certificates work just fine, so there's no need to pay unless you run a big enough operation to warrant an EV certificate.

Slashdot Top Deals

To downgrade the human mind is bad theology. - C. K. Chesterton