Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Where is the direction arrow? (Score 1) 391

These can not be very good cables because they lack the direction arrow that the Belden audiophile Ethernet cables have (had?). This was so you would know which way to plug them in. Packets flow from hub/switch to the device.

And if you believe this, I have a bridge to sell you.
It is orange and you will make your money back in picture postcard royalties.

Comment You can't report blocked IPv6 addresses to Comcast (Score 1) 595

Last week I found that my IPv6 address was blocked as a spam IP by Comcast. I have had IP addresses blocked in the past so I did some digging and found the Comcast form you fill out to unblock an IP address and filled it out. When I tried to submit my IPv6 address the form reported that it was a malformed IP address. The form only accepts IPv4 dotted quad addresses.

Just one of the many minor issues facing IPv6 adoption.

Comment What about local news paper? (Score 0) 379

I know in my town the local paper carries pictures of the high school games. How is this significantly different than the student taking the pictures? Yes, I know, a press pass and an official newspaper. It would be interesting to hear why the principal thinks this students pictures are different?


Comment Taylor Mali's Pizza poem for Pluto (Score 1) 196

There is always Taylor Mali's Pizza poem for Pluto:

I is a poem about a planet mnemonic:
My very educated mother just served us nine pizzas
Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, Pluto

He also has a great poem about teachers and I love his spell checker poem.

Comment RFID and strong authentication in a clean room (Score 1) 127

In a clean room, swiping a badge each time is hard. Use RFID in a wrist band. The hand needs to push a button. Put a reader next to the default button so pressing the button authenticates with RFID. For non-default operations requires a RFID swipe. Could the reader be an IoT (Internet of Things) device?

Strong authentication with an RFID device in a clean room environment is easy. Put the RFID wrist band on under the bunny suit. Require the user to authenticate on a computer with their RFID wrist band inside the clean room before anything will work. Two users can not swap wrist bands because they would have to wear them outside the bunny suit which is visually obvious.

A wrist band could work easily any manufacturing environment if the company does not need strong authenticati

Weak authentication is easy. Strong authentication is hard.

Comment Massive Ancient Landslides In California (Score 1) 44

Many years ago I took a geomorphology class in college. Geomorphology is the study of the landscape and the geologic processes that shape the contours of the land. We had a lab where we identified landslides using aerial photos and a stereoscope. I already had some experience looking through a stereoscope and identifying landslides so I was finding lots of them. The professor walked by and noticed. He said "OK Robert, now look for larger landslides." They were harder to see because they were older. But they could be identified by their surface mottling and shape. So I start to see them and there are lots of them. The professor was impressed and he said "OK, now step back and look at the entire hill side." When I did this I realized that the entire hillside was one massive landslide. Ridge to valley bottom. Probably on the order of a square mile. He suggested that at some time in the past the entire hillside slid. Probably the result of a 1906 type earthquake in the middle of a very wet winter when all the soil on the hillside was saturated with water. It blew my mind.


Comment Re: Yelling "Fire" in a movie theater (Score 1) 716

Yelling "Fire" in a movie theater is far less terrifying than receiving a death threat. But people do not yell "Fire" in theaters because it is considered socially unacceptable even as a prank. Why are we not raising the same level of social pressure when people send death or rape threats?

Death or rape threats are never a joke just like yelling "Fire" in a theater is never a joke. This is especially true for a woman or girl when they receive one. It is really bad to teach women that they should "Laugh it off" or "Get a thinker skin" in response to a direct threat to their personal safety. Is this how you want your daughters or sisters or mothers to be treated?

Comment Walking on water (Score 5, Interesting) 54

Kind of off topic but we have a picture of my father, Jack Harker, walking on water in front of the sculpture. He was manager of "The Labs" and was working with manufacturing to introduce their first Winchester disk drive. The technology was not moving successfully from the lab to the shop. There were some tremendous technical problems in mass producing the drives. Manufacturing gave a very aggressive schedule for solving the problems. My father replied that if they could meet the schedule, he would walk on water.

Manufacturing meet the schedule and the disk drives were delivered. My father had a plywood platform built and painted dark placed just under the surface of the reflecting pool. True to his word, there he was walking on water with the sculpture in the background.

A picture I did not understand fully until after his death.

Jack Harker, one of the fathers of the disk drive industry, a manager's manager, a great dad.

Comment Performance monitoring (Score 1) 170

Interesting things to monitor are I/O rates and read/write latency. More esoteric things might be stats about most active files and directories or percentage of recently accessed data -vs- inactive data. But these are more analysis than monitoring. What other parameters would a sysadmin want to look at?


Comment 30 year war? No. 30 year battle? Yes. (Score 1) 425

If we treat this as a war, we will be fighting, killing and destroying for 30 years changing little. Most of the death and destruction will happen to the civilian population. We need to treat this as a battle for the hearts and minds of the Muslim world. We have to change attitudes and how they treat each other. Break the cycle of tit for tat, I kill you because you killed my father/brother. This will take a generation or more.

Comment More constructive difference between xen & bas (Score 1) 81

Pre-disclosure and a quarantine period is useful for both infrastructure security bugs like xen and widely deployed security bugs like bash and openssl.

In the case of an infrastructure bug the quarantine period allows the service providers a chance to patch and restart their services before their customers become vulnerable.

In the case of a widely deployed security bug it give the OS/software vendors the chance to investigate the bug. Create patches and test/verify their patches and pre-stage them so when the bug is disclosed publicly sites that do automatic updates are already patched.

I think the two week window used by xen is a good window balancing giving time for people to fix the problem but limiting the time between discovery and public knowledge/exploit.

What is now proved was once only imagin'd. -- William Blake