Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Re:Depends... (Score 1) 166

by jhantin (#48621183) Attached to: Verizon "End-to-End" Encrypted Calling Includes Law Enforcement Backdoor

Didn't say it was. It's the pattern of usage, though, not any real time constraints. Server-based games tend to be receive-heavy rather than symmetric; they're sending the user's actions but updating the entire environment around the user. Always on DRM is basically periodic license re-validation, relatively low frequency. UI remoting is again going to be extremely receive-heavy; keystrokes and coordinates take up much less space than graphics pushes.

You might have difficulty distinguishing one voice app from another within an encrypted tunnel, though.

Comment: Let's generalize that. (Score 1) 238

by jhantin (#48523697) Attached to: The Cost of the "S" In HTTPS

More generally, CDNs aren't "in-network services" in the same sense as middleboxes and thus aren't hampered by TLS. When properly deployed they don't sit between the page server and the browser, but rather the page server links to CDN URLs for images, scripts, and other referenced content. From that standpoint they are essentially just another farm of web servers specialized for static content.

The "in-network services" TFA talks about can only work because they can freely inspect, collect copies of, transform, redirect, and generally tamper with the data streams without the end user explicitly opting into them. Most of these I have encountered primarily add value for the network owner, and more often than not actually subtract value for the individual user forced to go through them.

Comment: Someone already makes a business of this (Score 1) 1

by jhantin (#48482251) Attached to: Oracle finally release Java MSI file.

... and that would be Ninite, whose Pro offering includes command line scriptable updates of all your favorite security holes from Adobe, Oracle and more, and can also automatically decline partner offers and disable updater popups.

The free edition no longer updates Flash, as a compromise with Adobe who appears to rely on bundled partner offers with every patch as a revenue stream from Flash Player home users. Ninite Pro has more software package options, over-the-network install/upgrade/uninstall, and a desktop UI instead of web-based.

No affiliation here, just a happy customer.

+ - Oracle finally release Java MSI file. 1

Submitted by nosfucious
nosfucious (157958) writes "Oracle Corporation, one of the largest software companies and leading supplier of database and enterprise software quietly started shipping a MSI version of their Java Runtime (https://www.java.com/en/download/help/msi_install.xml). Java is the worlds leading software security vulnerability and keeping up with the frequent patches of nearly a job in itself. Added to this is the very corporate (read: Window on a large scale) unfriendly EXE packaging of the Java RTE. Sysadmins around the world should be rejoicing. However, nothing from Oracle is free. MSI versions of Java are only available to those with Java SE Advanced (and other similar products). Given that urgency and frequency of Java updates, what can be done to force Oracle release MSI versions publicly (and thereby reduce impact of their own bugs and improve Sysadmin sanity)."

Comment: Dry cells really zinc that way. (Score 1) 97

by jhantin (#48133825) Attached to: Smart Battery Tells You When It's About To Explode

The potassium hydroxide electrolyte used in typical alkaline batteries will dissolve its way through the zinc canister over time even when not under load. The other common electrolytes, zinc chloride and ammonium chloride, will do the same. Zinc will corrode if exposed to acid, alkali, or sometimes if you just look at it cross-eyed, but the ease with which it gives up electrons makes it an effective primary cell anode.

One workaround is to swap positions of the electrodes: make the canister out of carbon and use a zinc center electrode shaped to give it as much surface area as a canister would have. I imagine you'd have problems with the carbon breaking easily from rough handling, though, and it might cost more to make. Maybe powdered carbon with a plastic binder instead?

Comment: Re:illogical captain (Score 1) 937

by jhantin (#47904267) Attached to: Why Atheists Need Captain Kirk

Now lets say some well meaning and compassionate politicians decided to take care of them and built high rise apartments for all of them who were having trouble paying their rent to live in. Sounds good and compassionate right?

By Hanlon's razor as modified by Clark's law, this is more likely a simple backfire of what was intended to be a helpful act rather than some sort of evil plot; nothing deliberately planned would have gone so horribly right.

Comment: Re: illogical captain (Score 1) 937

by jhantin (#47904199) Attached to: Why Atheists Need Captain Kirk

Starting with an assumption is not an action that is compatible with science.

Wait, what? At its core, to apply the scientific method is to create a hypothesis and attempt to falsify it. Creating a relevant hypothesis usually requires some sort of initial assumption, though one must be open to the possibility the process will demonstrate that said initial assumption is incorrect.

Comment: Re:More accuratly "self preservation" (Score 1) 419

by jhantin (#47794189) Attached to: Microsoft Defies Court Order, Will Not Give Emails To US Government

The technical solution would be to design their storage in such a way that it is _impossible_ for the company to read a customer's data.

"Impossible to read a customer's data" is not a strong enough condition. For example, if a provider uses a convergent encryption scheme, they clearly cannot read their customers' data, yet it becomes possible to deduplicate encrypted data — and consequently to identify everyone who has copies of a given plaintext, or perhaps to guess at a password embedded in a configuration file.

* * * * * THIS TERMINAL IS IN USE * * * * *

Working...