Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Comment What if there is a bug? (Score 4, Interesting) 426

If the default is "on" , what if a bug in the code resets the setting or ignores the setting. Are there any indicators that this information is going out? Can there be any indicators? What is the amount of encrypted traffic going out from the system to microsoft? Any way to look at what is being sent at any point in time? Does it ever log what was sent? Can it?

Comment The machines may need to be heterogeneous (Score 1) 150

You may need a (screamin) front-end machine that splits up the work and hands it off to multiple multi-core machines. These multi-core machines may only be available at lower clock-speeds.

Dont just "look at your application". But look at what parts of your application are subject to parallelism and what parts must stay single threaded. You may need a special single-thread machine that can keep the other ones fed.

Comment Why run the browser behind the firewall at all? (Score 1) 267

If we are rightly scared of browser-borne infections and intrusions, then why are we still running browsers on our machines? Why not designate a machine, outside the firewall / in the DMZ, that runs ALL the browsers. The user logs into that machine, and the browser display events are sent back to the client machine. The safe client machine never runs a single snippet of plugin, or gobbles a single byte of untrusted network traffic. The client machine does not even -know- how to get to the internet.

Sending receiving files can be locked down and logged. Or prevented.

The sound device would be a pain, and might require a new protocol, but this would solve many problems. I think it might make SSL better too (no proxy bs).

Perhaps a specialized (corporate) browser nexus product could be offered...with sound and optimized for the browser.

The client machine never talks to the internet. It just sees pictures of it.

Comment Everyone keeps saying GPS (Score 1) 294

Trains don't really wander around randomly. So its not necessary to use the GPS system. Fixed point emitters over the tracks using simple technology would exactly position the train and insure reception no matter what the conditions. Even inside a tunnel.

I understand that putting new hardware into the trains is hard, expensive and difficult to clear for safety. But putting new hardware into the operators hands is not. Put a friggin electronic helmet on his head with a siren that goes off if the train is too fast for its registered weight / vs the track he is on. Tell him he fired if the siren goes off.
Heck, put a tens unit on it.

Comment Setup a machine for instant re-installation (Score 1) 334

Setup a hard drive or usb key with a re-installation image so that if they do experience trouble, they can just re-image their machine. All updates and software they need already installed.

Or you could have the system dual boot. Normal windows boot, but you can have them grub boot into linux and that will give you a pristine platform to log-in and save files/re-image their machine remotely via partition image. You have them boot into linux, and then you can operate on a comatose window partition without interference via ssh.

Comment I was simply disagreeing with the term "tool" (Score 1) 600

I was not disagreeing with gun ownership. I just think a gun is a weapon, not a tool. If you call a gun a tool, then what is a sword? An ad-hoc non-elective surgical instrument? Overgrown Cutlery? Guns are not tools. They are weapons. I have no objection to the ownership of weapons...within reason. I just think calling them a tool seems like an attempt to shroud their importance by mingling them with other more benign implements like screwdrivers.

All Finagle Laws may be bypassed by learning the simple art of doing without thinking.