Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Better idea (Score 1) 55

You'll need about 1,000,000,000$ US for your first datacenter. All of the hardware needs to be in close proximity to get reasonable communication latency in your distributed indexing/processing.

There is a reason why competing search engines aren't popping up left and right.

Comment Re:I'll be keeping mine (Score 2) 257

I work at Google, in the facilities automation group. Google is really good at designing warehouse-scale computers that maximize the efficiency of electrical usage and heating/cooling. I suspect that this Nest acquisition is an attempt to leverage some of their heating/cooling expertise.

I fully expect that no one will believe this and will chalk it up to an advertising opportunity.

Comment Re:congrats guys and gals (Score 4, Interesting) 293

I work at Google.

Before anything was reported by Snowden, plans were already in place to protect user data. It started with the switch to HTTPS, continued with us encrypting user data on disk, and we were beginning to encrypt data that was transferred between datacenters. The revelation that the NSA was tapping into undersea cables only accelerated the timeline.

Comment Re:violation of trust (Score 1) 109

Google hacked your browser? Or they just used a standard web technique to get results for a +1 button and Safari piled on a bunch of extra cookies?

Why would Google do this? If we assume that it was intentional, they must have known that, with all the scrutiny the company faces, someone was going to figure it out? And what would they get in return? A little bit of data on the handful of people who upped their Safari privacy settings and are unlikely to click on ads.

Does that make sense?

Comment Re:Oh for crying out loud (Score 1) 325

Is there any evidence that email are used to build up a profile? I have never seen the contents of an email reflected anywhere else aside from right next to that same email. I get ads based on what I do web searches on, but I've never seen and ad based on my email correspondence, except for right next to the email message.

Comment Re:Just askin... (Score 1) 221

The transmission is encrypted with ECDHE, an Elliptical Curve Diffie-Hellman Exchange. Each connection is encrypted with a separate secret number which is dynamically generated and known only to the endpoints of the connection. The NSA or anyone else might be able to watch all the traffic, but it will still take anyone years to brute force it.

Do you understand how ECDHE works?

Slashdot Top Deals

If all else fails, lower your standards.

Working...