Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:What could possibly go wrong? (Score 4, Interesting) 128 128

I have outstanding submissions anywhere from 6 months to a year right now. I just got one denied that was just over 6 months old.

Of course, they'll take graffiti on the side of a dumpster, but they won't take actual non-death-camp historic landmarks.

As I keep saying, their approval process is handled by a randomizer. No human can be as pathetic as their approve/deny decisions have been.

Hell, I tried to have a portal removed from my ex-wife's house. I went out to visit our daughter, and while I was trying to explain the game, I turned on the game and it was on the house. The picture was from a commercial property miles away. They refused to remove it.

Comment: Re: Surprise! (Score 1) 389 389

He lost because he didn't bother to respond to the charges.. I couldn't read the text of the complaint (they want money), but the article says he's been ignoring them for several years over these "performances".

I don't agree with the price tag, but it looks like he was fudging the truth to get free advertising out of this lawsuit.

Comment: Re:OpenVMS (Score 1) 257 257

You're actually just mad at the kernel that came with your distro. That's easily fixed, and instructions are abundant. Really, I spot checked and there is 35 year old hardware still supported, you just have to know what you're doing. If you're installing Linux on obscure hardware, you should already know how to do this.

I just grabbed the Linux 3.4.107 kernel (from kernel.org), which is still being supported. 3.6 dropped i386 support, so I'm going for the full support argument here. :)

I did this on a x64, so I needed to export the correct arch.

$ export ARCH=i386 ; make menuconfig


Processor type and features -> Processor family -> [386]

Bus options -> ISA support -> [checked]
Bus options -> PCI support -> [unchecked]
Bus options -> PCCard (PCMCIA/CardBus) support -> [unchecked]

Networking support -> Networking options -> [whatever other/old network types you want] ... IPX, Appletalk, CCITT x.25

Now you can support any antique ISA card on a i386 you want.


Device Drivers -> Network device support -> Ethernet driver support ->

All the old ISA cards that I can think of are supported. Here's a screen shot of the make config for network card drivers only, with just what I put above. I set them all to build, to expand out everything. In practice, only build the one you're using, and/or make modules so you can load them rather than building them.

http://imgur.com/QVnIN5u

Comment: Re:OpenVMS (Score 1) 257 257

I'm also not sure why you'd want to run gcc3 on a 15 year old piece of hardware,

That was the question of the original post. Except don't do it on 15 year old hardware, do it on something circa 1990. So something base don a 80386SX, Z80, 65C02, or 68000.

He doesn't realize that in 2017, the FUture Widget FUx5000 will be released, and in the following 3 years will become the dominant platform.

It's not like a major processor manufacturer hasn't tried this recently.

Comment: Re: Good. (Score 1) 286 286

Actually, the WTC would be a strategic military target. It could easily been included in infrastructure. There was a lot that happened through that building, therefore it was a valid target. It wasn't the best target, but it was a target.

The thing is, the group who attacked the WTC weren't a military. They weren't even paramiltiary. All things indicate a handful of people with boxcutters. There are better organized paramilitary organizations operating within the US daily that carry out widespread crime. They just go under reported because they aren't as important in the eyes of the casual news viewer as a couple big buildings and a bunch of people in suits in a one-time event.

Comment: Re:call me skeptical (Score 1) 190 190

He's the one that made the claims. He said he did it, and then went to the FBI to explain how he did it. Other than finding the tampered box lid, all the "evidence" is in his claims.

I could knock a panel loose and then claim I hacked the in-flight entertainment system and made an airplane into a sperm whale and then a potted plant. That doesn't make it real, even if I showed them a box containing an infinite improbability drive. Funny thing about that, when most people see it, they see an empty box. How improbable.

Comment: Asteriod redirection (Score 0) 150 150

NASA already has the answer. Glitter filled Super Balls are the best thing for the job. As we all know, they are infused with magic energy. A 10kg payload traveling at 11.2 km/s could deflect an object the size of the moon.

It does have risks though. Once set in motion, the Super Balls would be set loose on the universe, potentially disrupting entire galaxies.

For the sake of the universe, I hope we never have to deploy such a weapon.

Comment: Re:Battlefield Earth sucked (Score 1) 121 121

It depends on how the theoretical spaces work. You can have multiple things in the same space. Just where you're sitting, there is air, light, heat, radio waves, sound waves, gravity, probably a few neutrinos.

I just used "spaces" because I couldn't think of a more appropriate word.

+ - New MakerBot CEO Explains Layoffs, Store Closings and the Company's New Vision

merbs writes: MakerBot Industries is the public face of 3D printing. And whenever the public face of a nascent, closely-watched consumer technology undergoes a serious customer relations crisis, closes all of its retail stores, and lays off 20 percent of its staff, the impact is prone to ripple beyond the fate of a single company. Jonathan Jaglom, in other words, may be tasked not just with reversing the fortunes of MakerBot, where he’s just been appointed CEO, but an entire industry.

+ - Enterprise SSDs potentially lose data in a week->

Mal-2 writes: From IB Times:

The standards body for the microelectronics industry has found that Solid State Drives (SSD) can start to lose their data and become corrupted if they are left without power for as little as a week. According to a recent presentation (PDF) by Seagate's Alvin Cox, who is also chairman of the Joint Electron Device Engineering Council (JEDEC), the period of time that data will be retained on an SSD is halved for every 5 degrees Celsius (9 degrees Fahrenheit) rise in temperature in the area where the SSD is stored.


Link to Original Source

Comment: Re:Tiversa breached systems? (Score 4, Interesting) 65 65

That's probably the biggest reason to have good in-house security people. They don't have a financial interest to make breaches or lie about them. It's in their best interest to keep everything secure, and continue to look for new ways to attempt breaking into their own stuff.

I've never felt good about letting third parties in to do security testing. When someone above my rank decided to let a 3rd party do external tests, they'll pick anything and make it sound disastrous. One place was bitching about anything.

They complained that we had the current version of Bind running on the DNS servers. "But people can do DNS requests!" Yup.

They flagged the fact that we dropped unwanted traffic at the firewall. Yup. Get over it. They were upset it took forever to scan the network. Good.

They flagged us for having a web server providing static content. They were upset they couldn't find any way to exploit CGIs or do SQL injection. Yup. That was kind of the idea.

There were a whole bunch of other trivial things that they flagged us for. Then they were brought to the office, and got upset that we didn't provide wifi. Nope, that's a security risk. They wanted to plug their laptop into our network, so they were only given external access. Again, they bitched. But letting an unknown computer owned by an unauthorized party plug into our network is a security risk.

They eventually gave up trying to bully us into dropping our security precautions and gave us a pass.

I already habitually ran tests with privileged access to make sure even if all layers of protection failed, nothing really bad could happen.

Honestly, if they are given everything, they can find something. Give them administrative rights to everything, and credentials to everything, they can find something. Like, email accounts can be accessed with full admin rights. Funny how that works.

Comment: Re:At the same time (Score 2) 323 323

Yup, if it wasn't Microsoft, all kinds of other companies could have dominated the desktop market. IBM (OS/2), Quarterdeck (DESQview/X), Apple (Mac OS), NeXT (NeXT), any number of *nix companies (X11), and others.

Microsoft got big because they got the consumers interested, and questionable deals with vendors.

Plenty of people only know the tunnel-vision version of computer history and they believe Microsoft is it. They either don't remember (or are too young to have seen) software boxes (ahh, the good ol' days) had logos to indicate which OS they worked on so you could pick the right one.

OS/2 must die!

Working...