Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Pick a category (Score 2) 993

There isn't really an analog in your typical open source community. In fact, smaller open source projects tend to be so grateful for any help that asshole behavior is tolerated -- or even considered the norm. It's a sad state of affairs for the majority of us who want to contribute, but have no interest in dealing with a cesspool of assholes.

Sorry, but that sounds like an excuse.

Humans are thoroughly reprehensible creatures. There's a reason the living world is dying around us: that's because humans ARE assholes that generally destroy everything they touch. In some cases, that wicked Shiva energy is channeled in directions that benefit others ("open source", or what many profiteers say the "lunatic fringe" rightly calls "free software", is an example.) But in most cases, that energy is expended in (temporarily) fluffing the arrogant and greedy who, coincidentally or not, often seem to hover like vultures around those small eddying pools of curiosity and itch-scratching, eyeing their opportunity to profit from the collective labors. In other words, when something good happens, it's almost always an accident, and if that accident is profound enough, it needs righteous assholes to defend or protect it (like Linus does with Linux.)

So, that leaves you with a simple choice: create something for the whole with assholes that might benefit more than your local group, or not--and try on your own to profit from the assholes you manage to convince your wares are gold.

Of course, we're not addressing the concern of talent or competency here--that's a whole other layer that ALSO gets determined by assholes, the ones usually up or downstream of your project/work, either as user or developer or anything in between. And that is the area Poettering laments in his piece--which, lets be honest, has a whining tone--and seems unable to reconcile with how he sees his software (hi, Lennart!) and a great many others do (practically everyone on the "wrong" side of the systemd thing.) As many have noted, if there's significant pushback, maybe some re-thinking is involved, but that seems in short supply, particularly given the lofty position he finds himself in. With great power comes great responsibility, and one hopes humility, and that's where things seem to break down for him and the systemd posse.

In the end, he and you can just walk away if that isn't your cup of tea. There's no shame in saying "Enough! I'm outta here!" Just don't hide behind the idea the "open source" community is worse than working in a commercial firm because assholes are contained by culture--that's disingenuous bullshit. Ask anyone who's worked at a big firm and I'm sure they can name LOTS of assholes they've been forced to deal with during their time there. If you're lucky, you can do work that interests you and work around and with the assholes with the work driving you forward. Since most aren't, they just deal. Only a few play the victim card, thank the Dieties, but this gosh-darned Internet gives them a platform to vent their spleen.

Like I just did....

Biotech

Scientists To Breed the Auroch From Extinction 277

ImNotARealPerson writes "Scientists in Italy are hoping to breed back from extinction the mighty auroch, a bovine species which has been extinct since 1627. The auroch weighed 2,200 pounds (1000kg) and its shoulders stood at 6'6". The beasts once roamed most of Asia and northern Africa. The animal was depicted in cave paintings and Julius Caesar described it as being a little less in size than an elephant. A member of the Consortium for Experimental Biotechnology suggests that 99% of the auroch's DNA can be recreated from genetic material found in surviving bone material. Wikipedia mentions that researchers in Poland are working on the same problem."

Comment Re:Because? (Score 1) 587

I love F/OSS, but the Stallmans of the world are simply living in a wishywashy black and white fantasy land.

Any legitimacy you might have had, poof! Gone in one sentence so internally contradictory is sounds as if it was spewed by the Palintroid.

There's NOTHING "wishy-washy" about Richard Stallman. It seems on some dim level you already know this as you ratchet the words "black and white fantasy land" immediately, if obliviously, after the words that preceded them. Here's a clue: when trying to be cute, cut down on the doublethink unless irony and sarcasm is OBVIOUS.

Your knob-polishing of GNOME (Miguel's Microsoft project) has buried your reason so deeply under the ideology of convenience that it appears you'll love just about anything. Your pronouncement of love doesn't sound like a passion for F/OSS, or even a remotely basic understanding of what it actually *is*; it comes comes across as an overture to work in Redmond with Miguel.

Be about it, then; as others have noted, GNOME has sucked for a long time, and derivatives of Silverlight won't lift it out of Suckville in any case. Go your own way; just don't pretend the result will truly be FOSS because we certainly won't.

Comment Re:Bye bye marvel... (Score 1) 423

Whoa. Marvel is not, nor has it *ever* been, a source of "alternative media". If you want "alternate" comics, find some Slow Death, Love and Rockets, hell, even Cerebus (or perhaps The Boys, if you're into superhero meta-commentary/farce.)

I don't know what is more depressing: that you seem to think Marvel produces "alternative" comics or that they are alternative "media". Marvel is NEITHER; they are about PRODUCT, as is Disney. The two corporation were made for each other.

That being said, I'm dropping any Marvel titles I might have been following--I truly loathe Disney, and won't have any part of their "Disneyification" of culture. That's not a great loss, though: since Garth Ennis left Punisher, what does Marvel have to offer, anyway?

Comment Re:"cops , IQ" (Score 1) 1079

I believe the majority of what you say is bullshit. You're thinking of the department of Homeland Security, specifically the ICE. But modern cops do tend to be clueless about electronic crime.

Umm, are you even remotely aware of A Clockwork Orange? The idea explicated there, and seemingly jumping from the page into our little gravity well every moment, is nearly fifty years old now, so the original poster's contention that many stupid thugs find their way into law enforcement is not even a new or original observation of emerging social trends. If anything, ACO didn't go far enough in its speculation of how near-term "law enforcement" might look. It's a sad thing when fictional near-future-dystopias are outstripped by "reality".

But, more to the point, how many smart, or even reasonable intelligent cops have you ran across? If you've enough experience with Johnny Law to state how "clueless" they are when concerned with computer crime, surely you have some experiential anecdote that would validate that view, as well as invalidate the contention that street cops are one step removed from knuckle-dragging stormtroopers? And, sorry, articles posted on /. don't count.

Privacy

Submission + - House approves warrantless wiretapping.

An anonymous reader writes: The House of Representatives voted 227-183 to update the Foreign Intelligence Surveillance Act (FISA) to allow warrantless wiretapping of telephone and electronic communications. The vote extends the FISA amendment for six months. The final vote results are available here.
GNU is Not Unix

Submission + - iD and Valve violating GPL

frooge writes: With the recent release of iD's catalog on Steam, it appears DOSBox is being used to run the old DOS games for greater compatibility. According to a post on the Halflife2.net forums, however, this distribution does not contain a copy of the GPL license that DOSBox is distributed under, which violates the license. According to the DOSBox developers, they were not notified that it was being used for this release.
User Journal

Journal SPAM: Will Bush Cancel The 2008 Election? 10

Published on Tuesday, July 31, 2007 by CommonDreams.org

Will Bush Cancel The 2008 Election?

by Harvey Wasserman & Bob Fitrakis

It is time to think about the unthinkable.

The Bush Administration has both the inclination and the power to cancel the 2008 election.

Networking

Submission + - Bloggers vs. Journalists - Access denied!

An anonymous reader writes: ADC over at the Application Delivery Networking blog had an interesting take on bloggers vs. journalists and why bloggers shouldn't complain when they don't get access from vendors. Her post was a response to a complaint on Mark Evans' blog about why Nortel wouldn't give him access, despite the fact that he's the only blogger that focuses solely on Nortel.

Among other things, ADC says:
"You probably aren't aware of the hierarchy out there amidst the media community. Access to information from vendors is based on your status within the hierarchy. The information a member of the press gets from a vendor is different from what's given to an analyst and is different than what a blogger is going to receive. Bloggers are not journalists and most are certainly not analysts. They can be a channel through which information is disseminated, making them invaluable to the folks in the trenches, true, but they can also be dangerous because they aren't bound by any rules. And that's what you're missing because you've not been a member of the press — you don't "get" the hierarchy and how information is disseminated through the ranks. And guess where bloggers fall? Yup. Stand up straight, there, private!"

It's an interesting take on the role of the blogosphere and their relationships with vendors. As a tech PR guy, I can tell you that ADC hits the nail right on the head about vendors' tenuous relationship with bloggers.

Here's the URL: http://www.theapplicationdeliverynetwork.com/?p=25
Security

Mind How You Walk - Someone is Watching 256

mrbluze writes "The Telegraph has an opinion article about the future of the extensive CCTV network in the United Kingdom. Automated analysis of how and where people are walking or otherwise moving, and what objects they carry or leave behind, flags the attention of security staff. This is meant to preempt a crime and make suspects identifiable even by gait. The technology is of questionable public benefit since street crime has not decreased despite the presence of CCTV. 'An airport camera can be programmed to know what a departure hall should look like, with thousands of separate movements. A single suitcase left for any length of time would trigger an alarm. This technology was developed for use in hotels to alert staff to a breakfast tray left outside a room. Soon, it will be coming to a street near you. Why not go the whole hog and have microphones attached to cameras or embedded in street lights?'"
The Internet

Submission + - R.E.M. and Net Neutrality

cheezitmike writes: The Washington Post reports that several bands, including R.E.M., are joining up to raise public awareness in support of Net Neutrality:

The Future of Music Coalition — an advocacy group of musicians that fought radio consolidation — is assembling a lineup of name bands, such as R.E.M. and Death Cab for Cutie, to join the fight to keep the net neutral. The group will join net neutrality advocate Rep. Edward J. Markey (D-Mass.) for a teleconference today to kick off the campaign, which is called "Rock the Net ." The campaign will include a petition and a series of concerts. The coalition fears that if companies are allowed to charge for faster access to the Internet, it will hurt the ability of musicians to get their music out to their fans, especially small, indie bands.
Networking

Submission + - Nagios: System and Network Monitoring

David Martinjak writes: "Nagios is an open source application for monitoring hosts, services, and conditions over a network. Availability of daemons and services can be tested, and specific statistics can be checked by Nagios to provide system and network administrators with vital information to help sustain uptime and prevent outages. Nagios: System and Network Monitoring is for everyone who has a network to run.

The book is authored by Wolfgang Barth and published by No Starch Press. The publisher hosts a Web page which contains an online copy of the table of contents, portions of reviews, links to purchase the electronic and print versions of the book, and a sample chapter ("Chapter 7: Testing Local Resources") in PDF format.

An amusing note to begin: this is one of the only books I have read where the introduction was actually worth reading closely. Many books seem to talk about background or history of the subject without providing much pertinent information, if any at all. In Nagios: System and Network Monitoring, Wolfgang Barth begins with a hypothetical anecdote to illustrate the usefulness of Nagios. The most important section in the introduction, however, is the explanation of states in Nagios. While monitoring a resource, Nagios will return of one of four states. OK indicates nominal status, WARNING shows a potentially problematic circumstance, CRITICAL signifies an emergency situation, and UNKNOWN usually means there is an operating error with Nagios or the corresponding plugin. The definitions for each of these states are determined by the person or team who administers Nagios so that relevant thresholds can be set for the WARNING and CRITICAL status levels.

The first chapter walks the reader through installing Nagios to the filesystem. All steps are shown, which proves to be very helpful if you are unfamiliar with unpacking archives or compiling from source. Users who are either new to Linux, or cannot install Nagios through a package manager, will appreciate the verbosity offered here. Fortunately, the level of detail is consistent through the book.

Chapter 2 explains the configuration structure of Nagios to the reader. This chapter may contain the most important material in the book as understanding the layout of Nagios is essential to a successful deployment in any environment. The book moves right into enumerating the uses and purposes of the config files, objects, groupings, and templates. All of this information is valuable and presented in a descriptive manner to help the reader set up a properly configured installation of Nagios. My biggest stumbling block in using Nagios was wrapping my brain around the relationships of the config files and objects. This chapter clears up all of the ambiguities I remember having to work out for myself. If only this book had been around a few years ago!

The sixth chapter dives into the details of plugins that are available for monitoring network services. This chapter explains using the check_icmp plugin to ping both a host and a specific service for verifying reachability. Additional examples include monitoring mail servers, LDAP, web servers, and DNS among others. There is even a section for testing TCP and UDP ports.

Next, the book covers checking the status of local resources on systems. At work, we have a system in production that could have been partitioned better. Unfortunately, /var is a bit smaller than it should be, and tends to fill up relatively frequently. Thankfully, Nagios can trigger a warning when there is a low amount of free space left on the partition. From there, we have Nagios execute a script that cleans out certain items in /var so we don't have to bother with it. We can also receive notification if the situation does not improve, and requires further attention. In addition to monitoring hard drive usage, the book includes examples for checking swap utilization, system load, number of logged-in users, and even Nagios itself.

Chapter 12 discusses the notification system in Nagios. You provide who, what, when, where, and how in the configs, and Nagios does the rest. The book does a fantastic job of explaining what exactly triggers a notification, and how to efficiently configure Nagios to ensure the proper parties are being informed of relevant issues at reasonable intervals. For example, the server team might be interested to know that /var is 90% full on one of the LDAP servers; however they don't need to be notified of this every thirty seconds. This chapter also covers an important aspect of Nagios known as flapping. Flapping occurs when a monitored resource quickly alternates between states. Nagios can be configured for a certain tolerance against rapid alternating changes in states. This means Nagios won't sound the alarm if the problem will resolve itself in a short period of time. Usually flapping is caused by an external factor temporarily influencing the results of the test from Nagios; and therefore has no long-term impact.

The last major chapter to mention here deals with essentially anything and everything about the Nagios Web interface. The main point of interaction between the administrator and Nagios is the fully featured Web interface. This chapter covers recognizing and working on problems, planning downtimes, making configuration changes, and more. I especially like that the book gives an overview of each of the individual CGI programs that the Web interface is composed of; as these files are important for UI customization.

The only aspect of this book that I did not care for was that the book reads like a reference manual at times. The first several chapters start out more conversational in tone with great explanations of the procedures and files; but later it sometimes feels like I am repeatedly reading an iterated piece-by-piece structure, filled in with the content for that chapter. That is not necessarily bad all together as it does provide consistency in the presentation of the information. Additionally, the level of detail is outstanding throughout the book. The explanations are never too short or too long. This is definitely a valuable book for administrators at all levels with fantastic breadth and depth of material. Administrators who are interested in proactive management of their systems and networks should be pleased with Nagios: System and Network Monitoring.

Nagios is licensed under the GNU General Public License Version 2, and can be downloaded from http://nagios.org.

David Martinjak is a programmer, GNU/Linux addict, and the director of 2600 in Cincinnati, Ohio. He can be reached at david.martinjak@gmail.com."
Technology (Apple)

Submission + - Already A Community ready to hack the iPhone

An anonymous reader writes: Less than a week after the iPhone was released, there is already a website that wants to hack it. As it says on the site "Our Goal is to foster a community of Apple iPhone users and developers dedicated to getting the most out of the iPhone. We're on a mission to better the iPhone experience." They also mention that they want to unlock the iPhone so that it can be used on networks other than Cingular, and get to the point where 3rd party applications that are unapproved by Apple can run on the iPhone. I think we've found our "Bad Guys" and only time will tell if they are successful. iFoneResource.com

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...