Become a fan of Slashdot on Facebook


Forgot your password?
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Submission + - FCC Introduces Rules to Ban firmware modification for 5ghz Wifi devices->

Nyder writes: According to, the FCC has proposed to block firmware modification for U-NII band, the 5ghz WiFi. While apparently this is meant for just the radio, is this a step towards having to run default firmware on our devices, with all the state sponsored backdoors still intact?
Link to Original Source

Comment What does do business mean? (Score 1) 725

if Facebook wants to do business in Germany, then it must abide by German laws.

Does "do business" mean sell advertising or does it mean allowing citizens of Germany to access it's pages. I can see how Germany could legally control allowing foreign companies from doing business in Germany (selling advertising in this case), but I don't see how Germany could prevent its citizens from accessing the whole internet (Facebook in this case), unless it wants to try to be like China or North Korea. I can see trying to restrict the monetary flow in or out of a country, but trying to restrict the information flow seems both wrong and futile.

Comment Re:Now if only the memory pressure metric worked (Score 1) 231

My suspicion there is a feature which gets the machine hibernated while sleeping, to recover in the case of a power outage. The feature pretty much kills the usefulness of sleep, though, if every wake is a wake from hibernate.

Assuming your machine is configured properly: When you sleep, as you suspected, memory is written out to disk as insurance against power is lost. When you come out of sleep (assuming you didn't lose power), Windows resumes from sleep without reading everything back in from disk. If you did lose power, Windows resumes from hibernate and reads memory back in from disk.

Comment Re:Real numbers (Score 1) 105

Depends on where you are. Here in Oregon, there are additional subsidies - both state and non-governmental. With these subsidies, my break even point is between 6 and 7 years, so it is a much less risky proposition. Of course in Western Oregon, we don't get as much sun as other places and without the subsidies the break even point for me would have been about 40 years...

Comment Re:Signed XML (Score 1) 60

SOAP also supports signing and encrypting within the SOAP payload. Just because the outer connection isn't over SSL doesn't necessarily mean the transmission is not secure. You do have to turn on the encryption within SOAP and you have to verify certificates... I don't know if WSUS does this or not.

Comment Re:It's called "the Geek lottery"... (Score 1) 129

You are getting a salary like any other job, and you have the chance of becoming rich on top of that, without any more investment. Doesn't seem like a lie to me.

As long as you don't consider the the value of your stock options as part of your compensation, I would agree. If you are making as much in salary and other benefits that have current value (health care, retirement plans, working conditions, etc.) than you would at another job without options, then it is not a lie. If, on the other hand, you are forgoing some salary in exchange for a future possible value (stock options), then it is likely a lie (or at least a gamble with low odds).

Submission + - The Mystery of Acupuncture Explained in Rat Model-> 1

hackingbear writes: A biological mechanism explaining part of the mystery of the acupuncture has been pinpointed by scientists studying rats. The research showed that applying electroacupuncture to an especially powerful acupuncture point known as stomach meridian point 36 (St36) affected a complex interaction between hormones known as the hypothalamus pituitary adrenal (HPA) axis. In stressed rats exposed to unpleasant cold stimulation, HPA activity was reduced. The findings provide the strongest evidence yet that the ancient Chinese therapy has more than a placebo effect when used to treat chronic stress, it is claimed. “Some antidepressants and anti-anxiety drugs exert their therapeutic effects on these same mechanisms,” said lead investigator Dr Ladan Eshkevari, from Georgetown University medical centre in Washington DC.
Link to Original Source

Comment Re:Personally (Score 2) 227

I was hoping that the final quote at the end of my post would answer that question, but for those who can't browse to and don't recognize the quote, the movies were the 1968 movie "2001: A Space Odyssey" and the 1984 sequel titled "2010". The sequel reveals the conflict that caused the problems shown in the first movie. Of course the two movies are really about other things, the policy conflict I used as an example is just an (important) part of the back story driving the plot. Basically an artificial intelligence computer goes insane with dire consequences when it receives conflicting instructions.

Comment Re:Personally (Score 4, Interesting) 227

You ask why users break policies. I guess there can be many reasons but for me anytime a policy gets in the way of accomplishing a task, it gets broken.

Another way of saying this is polices are likely to be broken when policies conflict. While not using your smart phone may be a policy, getting your job done is also a policy. In this case people will generally choose to break the policy with the least personal risk. If I am more likely to be fired (or not paid my bonus) if I don't get my job done than if I use my cell phone, I am going to choose getting my job done and use the phone anyway.

If am using my phone against policy, I may also do things that are detrimental to the business while I am trying to hide my phone usage. At a minimum I am wasting time and brain cycles thinking about how to deal with the policy conflict.

There was this movie that among other things was about unintended consequences that can happen if you have conflicting policies / instructions. "Open the pod bay doors, HAL".

Comment Re: How much you got? (Score 4, Insightful) 184

Do you think gmail would have become the most popular email service if it would have used ACID? ACID is *not* the only option. It's the *old* option. It's the expensive and slow option.

Maybe ACID doesn't mean what you think it means. It is not a technology that is "old" or "new", it is a way to think about the requirements of your system. Each of the four letters in ACID stands for a particular property of a database system and these properties (in various combinations) may or may not be needed by the system being built.

If your system is processing something where the integrity of the data is important (like financial systems), you are very likely going to need all four properties. If you are moving money from one place to another, you want to guarantee that that the the money is completely moved or not. You don't want the money partially moved, you don't want money to be lost, and you don't want money to be created out of thin air. ACID (as a concept) guarantees this.

If your solution requires ACID, you don't have to use a database that supports all of the properties of ACID, you could instead implement ACID in your application layer. However if you do this, you have to guarantee that that your application layer implements it properly and that there is no possible way to get to the underlying data store without going through the application layer. You also have to guarantee that no changes, updates, upgrades, or bugs in your application layer every break the ACID guarantee at any time. Making all of these guarantees in your application layer is VERY HARD, which is why people use ACID complaint databases instead to solve this particular problem set.

If your requirements don't need the properties described by ACID, than there isn't anything wrong with using a non ACID database. If may be acceptable for your data to "eventually" become consistent, to be inconsistent, or maybe even lost.

In the gmail example, you don't really need all the ACID properties, so you don't need to use that sort of database to hold the information. Email is not transactional end to end; when you send an email you are not guaranteed that it will get there. Email is also not order guaranteed; if you send multiple emails there is not a guarantee (or need) for them to arrive in the destination mailbox in order. If you are bulk moving messages from one mailbox to another, and only some of them get moved, it is okay and you can just move the remaining messages later.

As always, it is important to chose the right technology to solve the problem you need to solve. ACID compliant databases solve a lot of important problems (usually involving money), and if you have one of those problems, there is nothing "old" about ACID.

Submission + - Samsung Releases First 2TB Consumer SSD for Laptops->

Lucas123 writes: Samsung has released what it is calling the world's first 2.5-in consumer-grade, multi-terabyte SSD, and it's issuing the new drive a 10-year warranty. With up to 2TB of capacity, the new 850 Pro and 850 EVO SSDs double the maximum capacity of their predecessors. As with the previous 840 Pro and EVO models, Samsung used its 3D V-NAND technology, which stacks 32 layers of NAND atop one another in a microscopic skyscraper that offers vastly greater flash memory density. Additionally, the drives take advantage of multi-level cell (MLC) and triple-level cell (TLC) (2- and 3-bit per cell) technology for even greater density. The 850 Pro, Samsung said, is designed for power users that may need higher performance with up to 550MBps sequential read and 520MBps sequential write rates and up to 100,000 random I/Os per second (IOPS). The 850 EVO SSD has slightly lower performance with 540MBps and 520MBps sequential read/write rates and up to 90,000 random IOPS. The SSDs will range in capacity from 120GB to 2TB and in price from $99 to $999.
Link to Original Source

Comment File versioning and backup flags (Score 5, Informative) 484

VMS supports very elegant file versioning, which I found a very useful feature. By default, every time you open a file for write (and you modify the file) you get a new version of the file (kind of like copy on write at the file level). When you list the files in a directory, you can see all the versions of the file with the version number being an actual part of the file name(file.text;1, file.text;2). On a per file basis you can set how many versions you want to keep around and the file system will automatically purge the old versions as new ones are created. When opening a file you can specify any version you want, or if you don't specify a version you just get the latest.

The file system also supports specific backup related attributes that integrate with the backup system. This lets you specify that a file should be excluded from backup and if I recall, tracks if the file has been modified since the last backup.

"Bond reflected that good Americans were fine people and that most of them seemed to come from Texas." - Ian Fleming, "Casino Royale"