Forgot your password?

Comment: Re:Businessese Bingo and Telecom Workloads (Score 1) 38

No, the point of being a telecom company is to connect your customers together, move their data where they want it efficiently, and get them to pay you for it. Telecom workloads not only include digging ditches for your access line and running wavelength division multiplexors across them, they also include things like routing IPv4/IPv6, firewalls, load balancing, intrusion detection, preventing and mitigating DDOS, hosting CDNs, routing lots of private networks that all run RFC1918 addresses and maybe VLANs, MPLS, maintaining really large BGP tables, fast rerouting around failures, etc.

We're virtualizing that stuff instead of buying big expensive custom-built routers for the same reasons you're virtualizing your compute loads instead of stacking up lots of 1U machines. Internet-scale routers are blazingly expensive, and we want to use Moore's Law to do the compute-bound parts of the workload cheaply and efficiently and let us build new services quickly because we only have to upgrade the software, while using expensive custom hardware only for the things that really need it, plus a lot of that hardware is getting replaced by things like Openflow switches and SDN, which we'd like to take advantage of, and buying expensive dedicated-purpose hardware means you're often stuck overbuilding because the scale of your different types of workloads changes faster than you can redesign hardware.

Also, the transition of lots of enterprise corporate computing from traditional data center structures to clouds means that the communication patterns change a lot faster, and we need to keep up with them. This stuff does seem to be driven a lot more by the needs of the users (telecom and data center) than by the manufacturers of virtualization software or traditional hardware.

And yes, every bit of business buzzword bingo does flow across our desks.

Comment: Re:NEWS? (Score 2) 89

by unity (#48019259) Attached to: Facebook's Atlas: the Platform For Advertisers To Track Your Movements
"IE, well ... treat IE like the thing you use for work when all else fails. Because there's always another exploit around the corner."
Meh, I don't recall ever having much of a problem with IE. On the topic, there is a whole "tracking protection" section under IE accelerators. I block most all of it with these 4 easy to add addons:


Comment: Re:Devil's advocate here... (Score 1) 125

by Qzukk (#48016445) Attached to: FCC To Rule On "Paid Prioritization" Deals By Internet Service Providers

I had to use a certain brand of detergent or specific equipment in my imaginary dry cleaning business, or that I couldn't charge an extra 5.99 for express cleaning service or 2.99 delivery fee

Of course, of course. But you know, that $7.99 "throw that other guy's laundry in the trash so you can do yours right now" fee, that's over the top.

Comment: i met a guy that had been hit (Score 2) 187

by unity (#48012215) Attached to: The Odd Effects of Being Struck By Lightning
I was having a safety meeting with a guy when he told me how he had been hit by lightning once on a construction site. I said, "what'd you do?" He said, "I got up and ran! The only thing I could think of was that I didn't want to get hit again!"
He seemed like a normal enough guy, but he was adamant about not wanting to get struck again, that's for sure.

Comment: I wasn't fundamentally altered by it. (Score 5, Informative) 187

by billstewart (#48011455) Attached to: The Odd Effects of Being Struck By Lightning

The main change is that when I hear people say "You're more likely to get hit by lightning than to have X happen" I can say "I've already been hit by lightning."

Back around 2000, I was with a group of people at an observatory up in the mountains, which we'd reached by ski-lift-gondola, after some discussion about whether the weather was turning thundery and we should cancel it because we might get stuck there for the day which would mess up our schedule. The thunderstorm decided to show up, and I was outside the observatory looking at the mountains. A few raindrops started to fall, and a bolt of lightning bounced off the building and hit me on the head. The impact wasn't very hard, maybe like dropping a pen onto a hard floor from 5 feet. My wife yelled at me to get in out of the rain. And we did in fact get stuck up there for a few hours - the gondola system shut down when the lightning struck, leaving a gondola full of kids hanging about 100 feet from the observatory for a while before they could restart it, and once they had them safely unloaded they left it stopped until the storm was over.

The other effect was that I had to tell my wife about the previous time when the group I'd with had almost been hit by lightning, hiking at the top of Colorado mountains when the early-afternoon thunderstorm set in. We'd sat down in a low rock shelter, and some of the folks were having sparks from their fingers to the wet rocks, which were making a bit of a sizzling noise.

Comment: Wiretap Legality was Always a Loophole (Score 1) 353

by billstewart (#48011381) Attached to: FBI Chief: Apple, Google Phone Encryption Perilous

The original court decisions that allowed wiretaps did so on the basis that telephone companies were third parties in the cases (so they didn't have standing to make 5th Amendment refuse-to-incriminate-yourself complaints, because they wouldn't be incriminated), and were corporations (so the government has the power to audit their business records, and phone bills are business records.) It was basically a loophole that was allowed because it was new technology and the government's lawyers could make some plausible arguments.

That's totally different from any supposed obligation to continue to provide services in a way that makes wiretaps useful. If Apple and Google want to provide good secure end-to-end encryption, they're allowed to. If they want to provide encryption with backdoors in it, the police can subpoena information they collect through those backdoors (though the FTC may have opinions about whether they're making honest claims about security of their products.)

Nobody said computers were going to be polite.