Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Overturn States' Rights? (Score 2) 132

So, when will a California resident be able to purchase a non CARB compliant motor vehicle?

Hopefully, approximately the same time it becomes OK for me to crap on your lawn. Your encrypted messages to your wife don't harm me or the state. Your high-pollution vehicles make it harder for me to breathe.

Comment Re:Sorry Assholes (Score 1) 366

I disagree. If he came in and took over a low UID for the sake of appearances, I'd personally write off a lot of his messages as PR attempts. But to join in through the same route as everyone else to earn his rep by participating, not by owning a low UID*? I respect that.

* But don't underestimate the importance of that. They give you a Ferrari each year on your anniversary.

Comment Re:So what should we do? (Score 1) 518

Also, the (possibly trained) driver isn't going to be the only person to ever sit behind the wheel. Valets, mechanics, and friends will all take turns driving over the years. Is Joe Driver going to remember that the pattern he's learned and committed to muscle memory over months of driving is unexpected, and to warn everyone he gives the keys to? This is bad UI, pure and simple.

Comment Re:Why? (Score 2) 65

Sorry, but I just don't understand what the purpose is, and it isn't stated in the thread linked -- other than a few ... (maybe) benchmarks that don't cover many real-world use cases.

With CFQ, an high disk-IO task will block every other process on the system from getting any time. This can be a big file cp, but I see it most often when writing to slow USB thumb drives... Queue up a copy/rsync/etc. of a few GBytes of data to a slow thumb drive, and after your RAM/buffer cache is filled, your system will be almost completely unresponsive.

Change your scheduler from CFQ to deadline and your system will spring back to life. I don't specifically know that BFQ does any better, but it couldn't possibly be worse... CFQ is crap.

Comment Re:Just 5 billions for 200 MW?? (Score 2) 182

We are going to need portable fusion if we ever want to do serious interstellar travel.

Fission (which we've had for decades) is a perfectly workable and acceptable energy source for "serious interstellar travel".

From battleships to trains to large aircraft to small aircraft: they have a use at many scales where high energy density (production) is required or preferred.

Fission works nicely for aircraft carriers, already. Trains are better accommodated by electrification via overhead power lines.

It's completely crazy to claim "small aircraft" would be a suitable use-case for a fusion power plant... A bit like saying a massive turbine could "have a use" in your leaf-blower.

Comment It comes down to VPN settings and tuning effort (Score 5, Informative) 261

If you don't want to root your device and don't want to tunnel all your traffic to a VPN server (adds latency) , you can use one of the Android "NoRoot" firewalls that routes app traffic through a local VPN for inspection and filtering. This uses more CPU and battery, but all protection is done within your mobile device. It takes a lot of manual effort to build a policy that blocks undesirable traffic and still lets apps work.

You can tunnel your traffic to a commercial VPN provider, but now you are trusting them to maintain performance and not invade your privacy, and they won't have any visibility to the contents of traffic that is inside SSL/TLS encryption, for better or for worse (e.g. cannot inspect Android apps downloaded as APKs from SSL websites).

Better yet, you can root the device and add your own Certificate Authority and firewall settings. Now you can use your own VPN to ensure all traffic from all applications goes to a remote VPN headend for inspection/modification, even traffic the device thinks is encrypted with SSL. If you have many users going through the same VPN, you can do things with packets and headers to make it difficult for CDNs and ad networks to identify individual users who are all behind the same gateway.

If you have more time than money, you can build up a VPN headend with open source tools (e.g. Squid+SSLbump)., and write policy to block traffic that doesn't meet your security policy, and to log what your device tries to send. You can use header modification to strip out identifying information and cookies.

If you are a business or otherwise have more money than time, the expensive approach is to use a commercial firewall appliance that has a client VPN and URL filtering service (e.g. Checkpoint, Palo Alto, Juniper, F5, etc). You set up the VPN to send all your mobile device traffic through the firewall, and use firewall policy to decrypt SSL, inspect APKs, and block ads. This solution is very effective at blocking ads and undesirable network traffic, and can often detect or block malicious APKs and other attacks.

Comment Re:Prohibited (Score 1) 336

Brilliant, exchange a cheap hard to track device for an expensive device that transmits continuously,

Low-end smart phones are just as cheap as the least expensive unlicensed 2-way radios. You can quite easily and 100% reliably shut-off the cellular radio, while still using WiFi. They are certainly no easier to track than an unencrypted 2-way radio.

Comment Re:Remember the NASA Wind Turbines? (Score 1) 182

Current blades are trucked in one piece (per blade) which is impressive to see. Three of them were parked on I-5 outside of Patterson, California a few months ago. There are a lot of net videos and photos which convey the scale.

Even at the current size they can't get through many highway interchanges and local intersections. The larger ones won't be able to ship in one piece at all.

Slashdot Top Deals

Computers are unreliable, but humans are even more unreliable. Any system which depends on human reliability is unreliable. -- Gilb