Forgot your password?

Comment: Re:2 1/2 D (Score 1) 115

by mlyle (#46796911) Attached to: Google's New Camera App Simulates Shallow Depth of Field

Note a depth mapping technique for each pixel isn't Doom-style restrictions unless the camera is in an unusual orientation.

You can have tables, etc. Every pixel has a distance from the camera to the object estimated. Since the camera is probably in a horizontal location this works. What you -can't- know about are objects behind other objects from the camera's standpoint, or stuff behind the camera. This is mostly OK for faking depth of field.

Comment: Re:Fuck the FAA (Score 5, Informative) 217

by mlyle (#46734659) Attached to: FAA Shuts Down Search-and-Rescue Drones

Yah, that's not a great move vs. a civil regulator like the FAA or FCC.

He has a pilot certificate that they can revoke; they can impose civil (not criminal) fines of tens of thousands of dollars before an administrative law judge, where there's no standard of proof beyond a reasonable doubt (only preponderance of the evidence).

Comment: Re:sell is the key word. Cogent not paying Verizon (Score 1) 289

by mlyle (#46309597) Attached to: ISP Fights Causing Netflix Packet Drops

Shortest exit path routing.

It's pretty much what everyone's expected to do and makes technical sense: you don't know the topology of the other guy's network, so if you have a packet for one of his customers, you should hand it over to that network at the closest possible point, rather than hauling it over your backbone and possibly having the other guy haul it back if your assumptions about costs are wrong..

But this means people that are "push" heavy use a lot less backbone resources than the provider that is receiving the traffic. Historically that has resulted in payments when peering connections have significantly asymmetric traffic flows.

Comment: Re:It is just data! (Score 5, Informative) 376

by mlyle (#35046240) Attached to: Internet Kill Switch Back On the US Legislative Agenda

Name one thing you know firsthand is connected to the Internet and could result in casualties if attacked. Sure banks computers could crash, sure amazon could go down, but ICBMs are not going to launch and the power grid wont go down. If anything that could actually cause casualties is connected to the Internet then it shouldn't be.

SCADA (Supervisory Control and Data Acquisition) technology provides the means to monitor and control distributed systems from a central location. They are used widely in the telecommunications, power distribution, oil & gas and transportation industries. SCADA systems are typically deployed with dedicated communication infrastructure, proprietary software and hardware.

iSCADA, on the other hand is an Internet-based SCADA solution that utilizes the public Internet infrastructure as the data communication medium. It uniquely combines traditional SCADA technology with the open data communication protocols, services and data formats of the public Internet to deliver cost-effective and easy-to-use SCADA solutions. With iSCADA, it is now feasible to monitor and control virtually anything from anywhere in the world.

This kind of stuff is getting deployed more and more.

Comment: Re:Summary Fail (Score 2) 429

by mlyle (#34412926) Attached to: Wikileaks DDoS Attacker Arrested, Equipment Seized

Yes. For instance, under California law:

Any person who willfully threatens to commit a crime which
will result in death or great bodily injury to another person, with
the specific intent that the statement, made verbally, in writing, or
by means of an electronic communication device, is to be taken as a
threat, even if there is no intent of actually carrying it out,
which, on its face and under the circumstances in which it is made,
is so unequivocal, unconditional, immediate, and specific as to
convey to the person threatened, a gravity of purpose and an
immediate prospect of execution of the threat, and thereby causes
that person reasonably to be in sustained fear for his or her own
safety or for his or her immediate family's safety, shall be punished
by imprisonment in the county jail not to exceed one year, or by
imprisonment in the state prison.

or (c) Any person who maliciously informs any other person that a
bomb or other explosive has been or will be placed or secreted in any
public or private place, knowing that the information is false, is
guilty of a crime punishable by imprisonment in the state prison, or
imprisonment in the county jail not to exceed one year.

Or there are many other choices of statute depending on specific circumstances. Note that both of these require malice. If you were going to legally set off a bomb as part of a demonstration when you had a pyrotechnics license, neither of these would apply.

Comment: Re:Wow (Score 4, Interesting) 222

by mlyle (#34274656) Attached to: Horizontal Scaling of SQL Databases?

The short answer is, CA/CP/AP on a transaction-by-transaction basis depending on application requirements. Also of note: network delay is effectively a special "partition", requiring an engine that can have massive workloads in flight and reconcile/order non-commutative changesets in a distributed fashion.

Comment: Re:you're doing something wrong (Score 3, Informative) 222

by mlyle (#34274382) Attached to: Horizontal Scaling of SQL Databases?

And that's what Translattice does, actually: for the database part of the system, we transparently shard large tables behind the scenes, and figure out how to store it to the computing resources available taking into account historical usage patterns and administrators' policies on how data must be stored (for redundancy and compliance purposes). A different population of nodes is used to store each shard and the redundancy is effectively loosely coupled, so when a failure or partition occurs, the work involved in re-establishing redundancy is fairly shared over all nodes. This provides linear scalability for many workloads and better redundancy properties, and can also as a side benefit position data closer to where it's consumed.

When it comes time to access the data, the query planner in our database figures out how to efficiently dispatch the query to the minimal necessary population of nodes, introducing map and reduce steps to provide for data reduction and efficient execution.

All of the table storage is directly attached to the nodes, eliminating much of the need for a storage area network and scaling beyond where shared-disk database clusters can go.

Comment: Wow (Score 5, Informative) 222

by mlyle (#34273960) Attached to: Horizontal Scaling of SQL Databases?

I didn't expect we'd be on Slashdot just yet. I'm Michael Lyle, CTO and cofounder of Translattice.

With regards to the original submitter's question, we'd love to talk to him. How much we can help, of course, depends on the specific scenario he's hitting.

What we've built is an application platform constituted from identical nodes, each containing a geographically decentralized relational database, a distributed (J2EE compatible) application container, and distributed load balancing and management capabilities. Massive relational data is transparently sharded behind the scenes and assigned redundantly to the computing resources in the cluster, and a distributed consensus protocol keeps all of the transactions in flight coherent and provides ACID guarantees. In essence, we allow existing enterprise applications to scale out horizontally while keeping the benefits of the existing programming model for transactional applications, by letting computing resources from throughout an organization combine to run enterprise workloads.

Current stacks are really complicated, multi-vendor, and require extensive integration/custom engineering for each application install. We're striving to create a world where massively performing infrastructure can be built from identical pieces.


Horizontal Scaling of SQL Databases? 222

Posted by timothy
from the side-to-side dept.
still_sick writes "I'm currently responsible for operations at a software-as-a-service startup, and we're increasingly hitting limitations in what we can do with relational databases. We've been looking at various NoSQL stores and I've been following Adrian Cockcroft's blog at Netflix which compares the various options. I was intrigued by the most recent entry, about Translattice, which purports to provide many of the same scaling advantages for SQL databases. Is this even possible given the CAP theorem? Is anyone using a system like this in production?"

+ - LHC Manages to Capture Antimatter ->

Submitted by Quantus347
Quantus347 (1220456) writes "Antimatter research took a significant step forward when scientists for the first time created and briefly corralled anti-hydrogen. The experiment could help scientists probe why the universe has less antimatter than prevailing theories suggest it should. For more than 20 years, physicists have been looking for ways to create and study antihydrogen as a way to gain insights into processes that allowed the universe to evolve from a hot, roiling soup of subatomic particles shortly after the Big Bang some 13.6 billion years ago into the cooler collection of planets, stars, and galaxies astronomers observe today."
Link to Original Source

What is worth doing is worth the trouble of asking somebody to do.