Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:Opt out (Score 0) 112

I have no idea whether they will bother to implement this service on superhubs in modem mode but I don't see any obvious reason why they couldn't.

Public wifi services that rely on piggybacking on end-user routers are always going to be spotty. Especially in a market like the UK where there are many competing ISPs. I doubt a few more users dropping out because they happen to have their superhub in an unusual mode probablly won't matter much in the grand scheme of things.

Comment Re:It's been 24 years (Score 2) 150

In particular the standard userland interfaces (libc and such) on 32-bit ports of linux still use 32-bit time_t. For embedded distros that can afford to sacrifice binary compatibility with both older versions of themselves and regular linux systems this is fairly easy to fix but for more general purpose distros that care about binary compatibility it is much harder and people aren't sure if it's worth doing it.

Note: my information is based on if anyone has more recent information i'd like to hear it.

Comment Re:What does that mean? (Score 1) 111

While the beagleboard line are familiar to many of us linux geeks they don't have anything like the general recognition that tablets or even raspberry pi's do and they have been somewhat uncompetitive for a while (especially since the pi2 and odroid c1 showed up). So they aren't an especially good target for drawing marketing comparisions with.

Comment Re:Innovate, not litigate (Score 1) 457

Read "value" as "something that will make money for oracle" and it makes sense.

AIUI the java model was to give it away free on the desktop/server and then once they had an army of java programmers out there make money out of it in other product lines like mobile and embedded.

Mobile phones have moved from a variety of javame supporting system (which paid licensing fees to oracle) to andriod (which doesn't). Oracle is unhappy about this.

Comment Re:Just starting now? (Score 1) 373

If they could somehow rig a suite of weight sensors for the wheel trucks, they 'd get something

If we assume the wheel trucks can be modelled as point supports (reasonable given the plane is much larger than the wheel trucks) then the forces through them would tell you the weight of the plane and the 2D location of the center of gravity. They would not tell you the height of the center of gravity.

If the fuel load and fuel tank arrangements are known it should be possible to predict how that center of gravity will move as fuel is drained.

I would expect that with most planes front-back balance is a bigger issue than top-bottom balance (because planes tend to be small top-bottom) or side-side balance (since the only thing carried in the wings is usually fuel which is easy to balance) so measuring gear forces would seem like a reasonable method of balancing to me.

Disclaimer: IANAP, this is theoretical musing, not practical advice.

Comment Re:I don't get it, what is this about? (Score 1) 145


cellphone networks were designed to handle voice from the start, packet data* was added as an afterthought and is basically the bottom of the priority pile. At least on O2 in the UK it's common to find areas where voice works fine but packet data is unusable. Poor voice quality on cellular networks is a result of two things, firstly the unreliability of the wireless channel and secondly limited available bitrate leading to the use of low bitrate codecs. Even in the more modern technologies which are moving away from circuit switching voice calls still have priority.

* GSM at least also allows for for circuit-switched data calls and has done for a long time but high cost and low data rate meant it wasn't used much.

Comment Re:none cipher? (Score 1) 75

        Enables X11 forwarding. This can also be specified on a per-host basis in a configuration file.
        X11 forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the user's X authorization database) can access the local X11 display through the forwarded connection. An attacker may then be able to perform activities such as keystroke monitoring.
        For this reason, X11 forwarding is subjected to X11 SECURITY extension restrictions by default. Please refer to the ssh -Y option and the ForwardX11Trusted directive in ssh_config(5) for more information.
        Disables X11 forwarding.
        Enables trusted X11 forwarding. Trusted X11 forwardings are not subjected to the X11 SECURITY extension controls.

        If this option is set to “yes”, remote X11 clients will have full access to the original X11 display.
        If this option is set to “no”, remote X11 clients will be considered untrusted and prevented from stealing or tampering with data belonging to trusted X11 clients. Furthermore, the xauth(1) token used for the session will be set to expire after 20 minutes. Remote clients will be refused access after this time.

In summery it seems that -X is more secure than -Y but can break things in some cases.

Comment Re:NSA responds (Score 2) 75

The problem is "big enough key", how big is big enough? best estimate seems to be that 4096 bit is fine for the forseeable future but noone really knows because noone can predict how integer factorisation algorithms will progress.

When RSA was developed it was thought that 1024 bit keys would be secure essentially forever. Unfortunately the combination of advancements in integer factorisation techniques and advancements in computing power have brought factoring a 1024 bit key into the range of computationally feasible (though very expensive). Furthermore that is based on what is publically known, it's not beyond the realms of possibility that the spooks know techiquest that the public doesn't.

Unfortunately 1024 bit keys were the standard size for years and so are extremely common. Getting rid of them is going to involve quite a bit of pain. It's telling that openssh only plan to refuse keys smaller than 1024 bit, not keys that are exactly 1024 bit.

Comment Re:Think of it like movie credits (Score 2) 122

With academic papers the author list is usually a flat list. Sometimes the first authors are the key ones but many papers simply have the authors in alphabetical order. Combine that with a writing style that ephasisies what was done over who did it and it's pretty difficult to figure out who the main drivers of the project were and who were just workers.

Contrast that to movie or videogame credits where there is a structure that tell you who played (or in the case of videogames voiced), who the people driving the project were, which category each of the workers fell into and so-on.

Comment Re:GST? (Score 1) 148

Seriously, they want to drop the threshold to AUD$20? I thought it was uneconomic to collect the tax below purchases of AUD$100?

mmm, thats the situation we have in the UK (and I belive the EU in general) and it sucks. Order a £16 (inc delivery) item from outside the EU, pay £3.20 VAT and pay ~£10 handling charge for collecting the VAT.

"Just think, with VLSI we can have 100 ENIACS on a chip!" -- Alan Perlis