Follow Slashdot stories on Twitter


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Comment Re:Typing versus Reading (Score 1) 304

Mnemonics are for people who want to later have to remember which DSLs decided on "ne" and which ones decided on "neq" and hence lose most of the benefit.

The only real advantage to them is on the commandline so you don't have to escape shell syntax. Or when you actually make them do something subtly different (but useful) than the symbolic ones, as in Perl.

Comment Re:Verified boot by who? (Score 1) 150

Except that the verification keys used are not public, and in general, no option to install additional trusted keys is made available. It basically kills the ability to have custom boot loaders for backup/restore or for any other reason and makes it rather easy to hard-brick the device as no utility to undo an unverifiable bootloader is made availble to the public. The age of mods is coming to an end unless consumer demand for devices that they can add keys to rises to unlikely levels.

(Often the keys are manufacturer specific and roms from different carriers can be booted on the same device, but the carriers could easily lobby the manufacturers to truly lock the devices they sell to their network.)

Comment Re:Good thing actually (Score 1) 217

Well, for the more-BYOD-than-BYOD sector, what will happen is we'll install a new VPN that is not quite as crusty as our old one which always "just worked" and so never got budgeted for an upgrade, configure it for best practices security, and then weaken it when 10% the must-have clients turn out to be too crummy to deal and don't support installation of a 3rd party client, even if we could get front-row to shoulder the support burden involved in doing that (or doing an on-site CA and dealing with cert installation.)

(I'm going to try to sell the idea of forcing those weakest-link clients to use a different SAP IP so we can tell them apart and not cripple security for the rest, we'll see how that goes.)

Comment Re:Why Not Flywheels? (Score 2) 147

AFAIK the most recent company to make a serious attempt at market penetration with flywheels was Beacon Power. They got as far as building one frequency regulation plant to operational status, and then the financials caught up with them; there's a private equity firm trying to put humpty dumpty back together again, we'll see how they do.

Just like flow batteries, it's a tech that needs a lot of up front money and work to scale out, and is stepping into a field where they have to compete with a variety of companies with different technology -- not all of them necessarily based on technology that uses resources that actually scale (e.g. giant plants of Li batteries are likely to later be scrapped when Li starts to be more expensive as mobile applications need it for gravimetric/volumetric energy density.) Investors can get reluctant when a breakout market trend towards one particular tech could make the others obsolete before they start turning a profit, and the pressure is always there to go back to the drawing board and improve the eventual economics at the cost of losing time in market development.

But mostly, nobody mentioned them because the article is about flow batteries, not flywheels.

Comment Re:girl with dragon tattoo did it (Score 1) 303

I never claimed "Layer 0" was specified, don't be a moron, use your reading comprehension skills. You don't win arguments by mischaracterizing your opponent. And stop being so insulting. All I did was point out that "Layer 0" is in parlance, and that the extent to which physical media and infrastructure is "in the ISO model" is, by that own model's admission, been a gray area with gradually scope creep (they probably should have started with layer 3 or so to leave space to grow downward.)

At any rate, I will leave you and your personality disorders to amuse yourself insulting other people.

Comment Re:girl with dragon tattoo did it (Score 1) 303

Layer 1 ends at bit encoding.

Physical Media: Any means in the physical world for transferring
      signals between OSI systems. Considered to be outside the OSI Model,
      and therefore sometimes referred to as "Layer 0." The physical
      connector to the media can be considered as defining the bottom
      interface of the Physical Layer, i.e., the bottom of the OSI

Here, and yes, we do. This is not a new thing.

One thing you have to realize about networking career folks is they are always tired and have forgotten more than many people know due to their horrible sleep habits/job requirements, so honestly, it was just a slip of the neurons. Do always ask us to verify our answers though because often we are kinda phasing in and out of reality.

Comment Re:girl with dragon tattoo did it (Score 1) 303

I meant to say, physical layer, sorry, tired, so NRZI etc. Really the whole thing is rather fungible with protocols that don't fit cleanly into the classifications, but for the most part layer 1 is mostly high frequency bit encodings that don't actually demand certain voltage/current specifications.

Comment Re:girl with dragon tattoo did it (Score 1) 303

For those who don't want to Google, the 7 layers are numbered 1 through 7, not 0 through 6.

Layer 1 is link layer signalling like HDLC.

We who are actually in the business do indeed use the term "Layer 0" to refer to power/physical cabling/infrastrucuture.
I've even heard "Layer 8" bandied about to refer to managers and politics, but it's less popular.

Machines certainly can solve problems, store information, correlate, and play games -- but not with pleasure. -- Leo Rosten