Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: Re:28 files in 6 years is a hardware defect (Score 1) 396

by washu_k (#47236177) Attached to: One Developer's Experience With Real Life Bitrot Under HFS+
Bad RAM could have corrupted the file as it was being written to disk. The file is corrupted all along, but not the disk/filesystem's fault

Or the file could have been corrupted in RAM on read, and would actually be fine if read on a working machine.

Or the disk has been replaced in those 6 years and the file was corrupted during the copy because of bad RAM

There are lots of possibilities for the file to get corrupted that don't involve the disk or filesystem.

Comment: Re:Best low-cost CPU with half-decent GPU? (Score 1) 345

by washu_k (#47020493) Attached to: AMD Preparing To Give Intel a Run For Its Money
No, there really isn't an equivalent. Which is more important, CPU power or GPU power?

The closest AMD in price with a GPU is the A6-6400K. It would be quite a bit better in the GPU department, but MASSIVELY worse in the CPU department. Not even close in CPU power. To get something that wont cripple you on CPU you would need to go up to the A8-6600K, but that is over $110 at the CAD stores I checked and would still be way worse in single thread CPU.

There are also the new Kabini CPUs and the top end of those, the Athlon 5350, is around $70. It would save you money on the MB (AM1 boards are cheap), but would be even worse than the A6-6400K in CPU and might not even match the G3240 in GPU.

+ - E.T. Found In New Mexico Landfill-> 1

Submitted by skipkent
skipkent (1510) writes "One of the most infamous urban legends in video games has turned out to be true.P

Digging in Alamogordo, New Mexico today, excavators discovered cartridges for the critically-panned Atari game E.T., buried in a landfill way back in 1983 after Atari couldn't figure out what else to do with their unsold copies. For decades, legend had it that Atari put millions of E.T. cartridges in the ground, though some skeptics have wondered whether such an extraordinary event actually happened."

Link to Original Source

Comment: Re:Better than Atom N450 (Score 1) 564

by washu_k (#45924499) Attached to: PC Shipments In 2013 See the Worst Yearly Decline In History
Both the AMD E2 or Celeron 847 will smoke an Atom N450 in performance. Both are just fine for an average email/web surfing box assuming the rest of the system isn't complete crap. Both have way better graphics as well with the edge going to the E2, but the Celeron has much better CPU performance.

Comment: Re:Current PCs are good enough. (Score 1) 564

by washu_k (#45922961) Attached to: PC Shipments In 2013 See the Worst Yearly Decline In History
Clock speed doesn't mean everything. Remember when the P4 first came out and a P3 of 400-500 lower MHz could keep up with it? Sandy Bridge has very good IPC. I have a laptop with an i5-2467M and I have it configured to lock the speed at a mere 800 MHz when on battery and I don't even notice unless I try to do something CPU intensive. It does have an SSD an 8 GB of RAM though.

As 0123456 said, a Celeron 847 is about twice the speed of a 3.8GHz P4. The Celeron actually has MORE cache than the P4 in total (548K more to be exact). Plus it likely would have faster memory and a much faster interface to the rest of the system components.

Comment: Re:Current PCs are good enough. (Score 4, Interesting) 564

by washu_k (#45921983) Attached to: PC Shipments In 2013 See the Worst Yearly Decline In History
You do realize that a Celeron 847 is way faster than the GP's P4 3.8 GHz? Don't let the Celeron name fool you, it is still a dual core sandy bridge chip, just clocked low.

The lowest end AMD E2s might get bested by the P4, but the higher clocked ones would still be a big improvement.

The bigger problem with most cheap laptops is the slow HD and lack of RAM which would cripple any CPU. Give a Celeron 847 an SSD and 4GB+ and it would be fine for most non CPU intensive or gaming tasks. Much better than the P4 for sure.

+ - Rogers/Fido cellular service out nation-wide->

Submitted by (843637) writes "Cellular carriers Rogers, Fido, and Chatr are currently experiencing a nation-wide outage, which began at approximately 6:00pm EDT (22:00UTC) 09-Oct-2013. All cellular voice services are inoperable, however, the company claims that data and text services are not affected. Some customers are reporting brief periods of service. Attempts to reach Fido's customer service line (1-888-481-3236) failed during their normal business hours; however, once their automated system came back online, it reports that some customer phone number are not recognized by their system."
Link to Original Source

+ - X11 Server Security Hole Plugged Dating Back To 1993->

Submitted by Anonymous Coward
An anonymous reader writes "CVE-2013-4396 was publicized this week and resolved as the latest X11 Server security advisory. This security advisory is about a use after free memory hole that could lead to system crashes and/or memory corruption, but making this X11 security advisory more pressing is that the issue has been present since September of 1993. For two decades in all X11/X.Org Server releases going back to X11R6.0 has been this vulnerabilty that was only now discovered in the widely-used open-source software and can be fixed by a five-line X Server patch."
Link to Original Source

'Dangerously Naive' Aaron Swartz 'Destroyed Himself' 362

Posted by timothy
from the serious-consequences dept.
theodp writes "In July, MIT drew criticism after issuing a report clearing itself in the suicide of Aaron Swartz. So, one wonders what Swartz supporters will make of The Lessons of Aaron Swartz, an MIT Technology Review op-edish piece penned by MIT EE/CS prof Hal Abelson, who chaired the review panel. Calling Swartz 'dangerously naïve about the reality of exercising that power [of technology], to the extent that he destroyed himself' (others say prosecutorial overreach destroyed him), Abelson questions 'whether the people who mentored Swartz and helped him achieve such brilliance and power had a responsibility to cultivate not only his technical excellence and his passion as an advocate but also, as my grandmother would have called it, seykhel-a wonderful Yiddish word that means a combination of intelligence and common sense.'"

Book Review: Citrix XenApp Performance Essentials 24

Posted by samzenpus
from the read-all-about-it dept.
First time accepted submitter gbrambilla writes "A problem every system administrator has to face sooner or later is to improve the performance of the infrastructure that he administers. This is especially true if the infrastructure is a Citrix XenApp farm that publishes applications to the users, that starts complaining as soon as those applications become slow. A couple of weeks ago I was asked to publish a new ERP application and suddenly all the hosted applications started to suffer performance problems... after some basic tests I looked on Amazon for an help and found the book I'm reviewing: Citrix XenApp Performance Essentials, by Luca Dentella, is a practical guide that helps system administrators to identify bottlenecks, solve performance problems and optimize XenApp farms thanks to best-practices and real-world examples." Read below for the rest of gbrambilla's review.

Ask Slashdot: Preventing Snowden-Style Security Breaches? 381

Posted by samzenpus
from the protect-ya-neck dept.
Nerval's Lobster writes "The topic of dealing with insider threats has entered the spotlight in a big way recently thanks to Edward Snowden. A former contractor who worked as an IT administrator for the National Security Agency via Booz Allen Hamilton, Snowden rocked the public with his controversial (and unauthorized) disclosure of top secret documents describing the NSA's telecommunications and Internet surveillance programs to The Guardian. Achieving a layer of solid protection from insiders is a complex issue; when it comes to protecting a business's data, organizations more often focus on threats from the outside. But when a trusted employee or contractor uses privileged access to take company data, the aftermath can be as catastrophic to the business or organization as an outside attack. An administrator can block removal of sensitive data via removable media (Snowden apparently lifted sensitive NSA data using a USB device) by disabling USB slots or controlling them via access or profile, or relying on DLP (which has its own issues). They can install software that monitors systems and does its best to detect unusual employee behavior, but many offerings in this category don't go quite far enough. They can track data as it moves through the network. But all of these security practices come with vulnerabilities. What do you think the best way is to lock down a system against malicious insiders?"

Comment: Re:ZFS (Score 1) 268

by washu_k (#43561817) Attached to: Btrfs Is Getting There, But Not Quite Ready For Production
You didn't have enough RAM. To use deduplication on ZFS without a massive performance hit requires assloads of RAM. 8 GB is nothing to ZFS with dedup on unless your disks are tiny. While Oracle claims less, the FreeBSD guys have found you need at least 5 GB per TB of disk just for dedup, plus more for cache and the rest of the OS. Do the math and any reasonably big storage pool will need tonnes of RAM.

Comment: Re:Hope it's going in the new Mac Pro (Score 5, Informative) 176

by washu_k (#43208879) Attached to: Next-Gen Intel Chip Brings Big Gains For Floating-Point Apps

The Core i7's are consumer-grade processors and are slower than the Xeon's the Mac Pros use

This is completely incorrect. The current Mac Pros use Nehalem based Xeons which are two generations back from the current Ivy Bridge i7s. Xeons may have differences in core count, cache and/or ECC support but their execution units are the same as their desktop equivalents. The base Mac Pro CPU is equivalent to an i7-960 with ECC support. The current Ivy Bridge i7s are a fair bit faster.

"It's what you learn after you know it all that counts." -- John Wooden