Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:What a reason to sue (Score 4, Informative) 148

Having met her, spoken with her, and knowing people that know her well, that's not a fair assessment. She genuinely cares about the material. She was the editor for it all, and she knows it better than anyone other than perhaps Jim's assistant Maria. Saying she's just his wife / widow is very unfair, and saying that she's unhelpful is just untrue. That said, the ebook delay was inconvenient to many of my friends, but there's just something about holding hard bound epic fantasy that enthralls me, and makes me not care for the ebooks.

Comment: Re: Welcome to the U.S. of A. (Score 4, Informative) 148

They're doing it to prevent her from reclaiming the film and television rights, and selling them to someone else. It's always been about the money for them, for the last 7 years. It's a damn shame that people ever believed that they were fans that intended on doing something worthwhile with the rights.

Comment: Re:Not enough (Score 1) 258

I know it might be hard to believe, but some people run servers that aren't in their broom closet, close at hand. In fact, many run some internationally, and it's a lot more than 10 minutes to go swap a disk. It's a few hundred dollars each time to pay remote hands to swap it.

Comment: Re:6 years of hacking with the same malware? (Score 2) 63

by halltk1983 (#48269009) Attached to: Security Companies Team Up, Take Down Chinese Hacking Group
Do you keep track of every outbound connection from your computer to make sure that every request is made by authorized software? Or do you rely on a malware suite to report known threats? Most people are in the second boat, and if none of the providers find it, then malware can be resident for a really long time without being caught. Especially if you're good at avoiding honeypots.

Comment: Re:Federal govt + cloud computing (Score 2) 120

by halltk1983 (#48196185) Attached to: Safercar.gov Overwhelmed By Recall For Deadly Airbags
Or you could be completely wrong about your entire post.. You don't need to build at scale, you need to build it to be able to scale. Meaning that you have separate write and read points for your DB. The read points should be an array, so you can add servers on the fly. The front end should have no dynamic data on it, just hooks to pull from the back end. Means you can independently scale front end for more users viewing, and the back end for more users interacting. When the load goes down, you delete the instances, and remove the IPs from the load balancers and arrays. It's not actually all that hard and it same literally millions of dollars a year for some of the enterprises I've worked with.

Just because you don't know how to do something doesn't mean it can't be done. Just because you'd make a bad design choice doesn't mean that everyone will.

Comment: Re:Eh (Score 3, Insightful) 200

by halltk1983 (#48185343) Attached to: The Woman Who Should Have Been the First Female Astronaut
Tea Party are not libertarians. They're closer to traditional Republicans which only want the government involved in what *they* want the government involved in. Libertarians want the government to behave as though it's controlled by the Constitution, and only to get involved when people directly infringe on others' rights.

Comment: Re:Just do it (Score 2) 279

http://routerboard.com/RB951G-... That's what I use. It routes to 5 separate ports, meaning you can have a second WAP for guests on a completely firewalled / routed port, even on a different IP address. It's able to act as a VPN endpoint. Used to do all the sysadmin / netadmin stuff for an ISP, running completely on mikrotik stuff. It worked well, even in really rough conditions. I highly recommend it.

It is much easier to suggest solutions when you know nothing about the problem.

Working...