Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:What bright spark (Score 1) 48 48

nope. For all her faults - and there are many - this one is all about the true Master of Disaster at HP, the incredibly incompetent and massively overwhelmed Hasso Plattner, the one-trick-pony from SAP who sees everything as an accounting software house, and runs it accordingly. He could run anything that isn't SAP into the ground without breaking a sweat. Maybe he should take over Carly's campaign...

There's this thing called Google, and it is full of little facts like this one... everyone should try it!

Comment Re:Carriers (Score 1) 312 312

Not to sound like a shill, but this is exactly that: http://www.arbornetworks.com/products/arbor-cloud . Again, most ISPs worth their salt already implement PeakFlow in their backbone IP networks to catch and control large scale DDoS events, but at multi-gigabit levels - setting the threshold just low enough to ensure that DDoS attacks don't wipe-out their backbones, a level that is much higher than any single customer link bandwidth. Today, they (we) are beginning to offer these services (based on BGP, threat intelligence shared between ISPs and Security Consultancies, and "live" feedback from CPE-Probes like Pravail at customer sites) and they do work for the most part. The only downside (other than pricing - which is kinda steep) is the fact that it is a defensive mitigation approach - you BGP-blackhole the bad traffic in the customer-side ISP backbone, not the source. It's not going to eliminate the ever-growing and extremely long list of asshats (including sovereign state actor-asshats) that initiate these kinds of attacks, but it can and does, currently, mitigate the vast majority of them. So, yay-ish.

Comment Re:Carriers (Score 5, Informative) 312 312

I work for a carrier. Together with companies like Arbor Networks, we already have systems in place that can mitigate most volumetric attacks, and many more intelligent attacks. Unfortunately, it's not cheap. Customers have to be willing to implement (and pay for) the protection services that most serious ISPs already offer as options on their IP traffic products. Keywords for your search are Pravail and PeakFlow.

Comment Re:The world of Art (Score 1) 657 657

well, the entire population of visual artists excluding at least the dumbshit photographer who filed the case. I'm pretty sure he's quite happy with the ruling. Somebody needs to find a photo by this guy, and then find a previous photo from another photographer with "appropriate" stylistic and compositional similarities, and then convince the other photographer to sue. If we can manage to do this often enough, we will eliminate all culture and arts, and could at least in theory insure that the direct descendents of the cave painters of Chauvet-Pont-d'Arc Cave (or the Corporation that bought the rights) finally get the royalties they so desperately "deserve".

This is obviously the goal of big copyright.

Comment Probably already been said... (Score 1) 361 361

but:

video and music: redundant server storage with cifs/smb access and a front end like Media Portal (i use a windows home server box with about 12 TB on it and Media Portal on a nearly silent media pc connected to my tv via hdmi and my A/V Reciever and to the server via HomePlug networking- and yeah, i know xbmc will run on linux, but i find MP easier to use and keep working and aesthetically pleasing - XBMC is running as a toy on my classic xbox). Just for fun, I have StreamtoMe set up on my server to allow me to watch stuff on the go with my iPad or iPod, but this doesn't really help with the organization part too much.

comics: redundant server storage and ComicRack

Photos: redundant server storage and either Picasa, Adobe Photoshop Elements or Media Portal

and books i keep on my iTunes (ipod and ipad) or Kindle.

Use the stuff that a lot of people have already put a lot of thought into before you try to innovate, at least until you determine that their solutions are inadequate for your needs.

essentially what you need is some kind of fault tolerant network storage and a robust purpose built, database based front-end to handle the organization, access and presentation.

Easy-peasy. The hard part is finding all this stuff, and buying the necessary hardware... Google is your friend here.
Science

Laser Camera Can See Around Corners 97 97

Hugh Pickens writes "Researchers at MIT have developed a laser camera that can 'see' around corners and take pictures of a scene not in its direct line of sight. The camera system fires extremely short bursts of light that can reflect off one object, such as the open door of a room, and then off a second object inside the room before reflecting back to the first object and being captured by the camera, after which algorithms can use the information to reconstruct the hidden scene exploiting the fact that it is possible to capture light at extremely short time scales, about one quadrillionth of a second. By continuously gathering light and computing the time and distance that each pixel has traveled, the camera creates a '3D time-image' of the scene it can't directly see. 'It's like having X-ray vision without the X-rays,' says Professor Ramesh Raskar. 'We're going around the problem rather than going through it.'"
Education

Simple Virus For Teaching? 366 366

ed1023 writes "Currently I am teaching a 101 class on computers. It is more of a 'demystifying the black box' type of class. The current topic is computer viruses; I am looking for a virus with which I can infect the lab computers (only connected to local network, no outside network connection) that would be easy for the students to remove by hand. Can the Slashdot community point me in any directions? Is there an executable out there that would work, or do I try to write one myself, or is there one that is written that I can compile myself?"

"It's the best thing since professional golfers on 'ludes." -- Rick Obidiah

Working...