Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:It's been 24 years (Score 1, Informative) 151

It has been fixed in the kernel, but many programs and libraries still use (sometimes accidentally casting into) 32 bit ints, and even parts of the Linux Kernel, such as file systems. Databases also use 32 bit timestamps. So deployment of a Linux kernel with 64bit time_t will not automatically heal everything.

Some links:
http://2038bug.com/index.php/a...
I like this one: "What's the worst that could happen?" :) http://y2038.com/#q5
https://en.wikipedia.org/wiki/...

Comment Open source command interface? (Score 1) 98

Is there any open-source voice command interface? Something simple, which runs commands?

I would even be happy if I could record some commands and define what to run when I say that. Or if it had some learning interface where I can define "oh I meant that existing command, next time you know this pronounciation variant".

Comment Re:Like the DragonFly BSD approach? (Score 1) 131

I can't find it now, but somewhere on the NameSys website they had an interesting piece on what made them so successful in writing a fast filesystem.

Essentially, and I am quoting from memory now, classical file system codes start with a grand idea of what *should* be a fast architecture (e.g. B/B+/dancing trees, etc.), then code that in all at once until perfection, and finally benchmark the finished product.
In contrast, they would try an implementation of a feature, then quickly benchmark it on several file systems for performance, then try another implementation. Because they had a quite flexible code base, they could do this write-test-rewrite cycle very quickly, and converge on the best solutions through experiments. That was their secret sauce. Perhaps all FS code has to become more playable for key advances.

Then also they developed this plugin architecture with which you can activate and exchange various features of the FS. Well, Linux developers really didn't like that because it looks complex and is unlike any other FS in Linux.

Comment Re:What did you expect to happen? (Score 4, Interesting) 103

It is not really a security flaw, it is a choice of design, and the extension showed what the consequences are -- namely that you can find out the habits and travels of a person, remotely.
This is similar to the mobile phone metadata, from which you can learn everything* about a person

Netherlands: https://www.bof.nl/2014/07/30/...
Germany: http://www.businessinsider.com...

*You put in some assumptions too, and being very confident about the conclusions of that person may have low validity, but that hasn't stopped the NSA.

Comment Re:Puzzling (Score 4, Informative) 46

The relative velocities are quite low, because there is very little gravity. So their plan was not to make a jet system that reduces the landing velocity (you may be thinking of the moon landing), but instead to use a cold-gas jet to press the lander onto the surface. That system, unfortunately did not fire. Secondly (and perhaps related?), the trigger that should launch harpoons to anchor the lander did not execute. That is why it did not land, but bounce off again.

Comment Re:Barking at the wrong tree (Score 2) 114

People share links on Facebook, and re-tweeting is one of the core features of Twitter (culture), which always lets you retrace the original poster.

I think this is more about meme-sites, where pictures (and cartoons, infographics, etc.) are *copied* rather than linked to the original website, often stripping away the original author. Therefore you have websites that do not produce their own content, but bundles (and earns money with advertisement). When the original authors claim their copyright, the site complies, but the stream (and people's attention) has moved on, so it does not matter and they get away with it.

Comment Re:Narrowminded Fools (Score 3, Insightful) 313

Wow, what a load of rubbish.

Your post can be summarized in 3 sentences:
1) Legitimate militaries will not follow/trust the treaty
2) Uncontrolled individuals/groups will ignore the treaty
3) Something like this has never existed, there is no centrally controlling authority and/or treaties can not work.

You are wrong on all three. I just need to mention the treaty on landmines (Ottawa Treaty). It works. You can control the market and the militaries, at least the bulk of it. Also for chemical weapons there is a treaty, and it works. Even for chemical weapons (Chemical Weapons Convention) the number of incidents from uncontrolled individuals/groups is low.

Some of your points are also rubbish, like:
(X) Requires immediate total cooperation from everybody at once
(X) I don't want the government limiting my arsenal

This is not fantasy, banning weapon technology world-wide has been done before. Countries joined voluntarily, one by one, and are controlled by each other.

Comment Re:OpenBSD? (Score 1) 66

You can achieve the same level of security with Hardened Gentoo Linux (PaX, Grsecurity2, which is Gentoo with different flags) https://wiki.gentoo.org/wiki/H... .
The only small difference is that strcpy is still allowed (applications should move to strlcpy/strpcpy instead).

Then again, I don't use hardened Gentoo, because last time I tried (couple of years back), it was hard to maintain on a simple desktop.

Other distributions that use PaX: https://en.wikipedia.org/wiki/...

Comment How does that compare to desktops? (Score 4, Informative) 195

Similar statements could be made for desktops, where tray icon pop-ups for updates, email and chat notifications distract and interrupt workflows.

Maybe both for desktops and cars, this problem can be solved by detecting whether the user is currently focussed (on the road or a task) or relaxed/idle, and may be interrupted. Mylyn is a very impressive demo of thinking in this direction, I would like to see more of it.

Comment Re:Weird (Score 1) 146

There are some very nasty pieces of work on that list, rapists and murderers who presumably managed to get a removal order from within prison

Do you have any reasons for your presumption, or are you just babbeling? Maybe they were falsely convicted as rapists and murderers, the ruling overturned and they do not want to be called rapists and murderers every time someone types their name into Google, for the rest of their lives. The fraction of falsely accused rapists is somewhere between 10-40%, and that stigma does not go away.

There are three kinds of people: men, women, and unix.

Working...