Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Wasteful allocation is nearly as bad. (Score 4, Interesting) 270

There are actually reasons behind this. I've got a /29 from Charter Business myself, but this is why it is the way it is, based on my experience as a former Charter engineer.

In the days of old, customers were assigned their statics in WAN-side way as you describe. My parents used to have a static assigned to them from a WAN block on their CMTS. This was great because whatever allocation assigned was very efficiently used. Granted, this was back when nodes were combined 4:1 or greater on the small CMTS that was being used. A uBR7246 with 1x6 cards in the day could easily route traffic for over 48 cable nodes, at 2:1 combining on the upstreams, and 12:1 on the downstreams. (A whopping 150mbps for 48 nodes ... laugable today).

It wasn't all that long ago I remember some towns sharing a single downstream port. Now, enter node splits, and combining gets down to 1:1 in many cases. Even with a much larger CMTS (uBR10012 vs. uBR7246), it can't handle the same number of nodes. With redundancy failover switchboxes, there are only 35 downstreams per box (assuming 5x20 cards).

Now a problem exists as soon as the box's capacity is reached. If I need to split your node and move it to another CMTS to increase your available bandwidth, I need to coordinate with everyone who is moving who has a WAN side IP and tell them that their IP address is going to change on whatever date. This turns into an incredible shitstorm when one person stammers their feet and cries up the escalation chain and then delays necessary work because they bitch. Then capacity continues to be in hell until the move is finally approved. Then, there are the customers who ignore your voicemail and phone calls and then cry for a credit because they didn't pay attention until the move date.

So now what everyone is doing in order to make this easier is to assign you a /30 or /29 or whatever which you get from your modem. The modem sends that assignemnt up via RIP and it gets redistributed into the network. Now, it doesn't matter what town you're in or what CMTS you're on. Note splits and changes can essentially happen without you ever having to renumber your side. With the growing demands on bandwidth, it's not unheard of that you could move a couple of times per year, depending on the scope of the engineering changes.

Seems wasteful, but that's the sense behind it.

Crime

Geologists Might Be Charged For Not Predicting Quake 375

mmmscience writes "In 2009, a series of small earthquakes shook the region of L'Aquila, Italy. Seismologists investigated the tremors, but concluded that there was no direct indication of a big quake on the horizon. Less than a month later, a magnitude 6.3 earthquake killed more than 300 people. Now, the chief prosecutor of L'Aquila is looking to charge the scientists with gross negligent manslaughter for not predicting the quake."
Robotics

Lego Robot Solves Bigger and Harder Rubik's Cubes 63

kkleiner writes "It was only two months ago that we saw Mike Dobson's Cube Stormer Lego robot that could solve any 3x3 Rubik's cube in less than 12 seconds. You would think that there was only one person in the world crazy enough and talented enough to pull this off, but now we have found someone else that is just as amazing. The latest Rubik's cube-solving Lego monstrosity is called the MultiCuber, and although it's constructed out of nothing but Mindstorms components and a laptop, it can solve 2×2, 3×3, 4×4, and 5×5 cubes all in the same build! As if that weren't enough, a larger version solves the dreaded 6×6 Rubik's. We discovered the MultiCuber when its creator, David Gilday (IAssemble), wrote us an email to brag about its puzzle-solving might. Consider us impressed, sir."

Comment What I want to know is... (Score 5, Insightful) 368

Why did Google initially agree to censor search results in the first place if this was their philosophy? I am certain they have made money in China, they would not have gone there for altruistic purposes of giving China good search results and web based email if there was not profit in it. Sure they have the philosophy "Don't Be Evil" but they got in bed with China to do business there. Only after the Aurora Exploit did they finally say enough is enough. Taking an anti-censorship stance only AFTER the Aurora attacks makes it seem retaliatory to me. They got a bruised eye from the neighborhood bully and then after playing along fine for quite some time decided they wanted to pick up their ball and go home. I would have been more impressed if Google uncensored their search results from the beginning instead of reacting to overt actions from China to their bottom line.

Comment Fascinating (Score 1) 213

It seems the goggles and glove VR dreams of 15 years ago are being replaced with AR devices that are smaller and smaller. Makes me wonder however if it would be self-contained (unlikely) or have to communicate with some hardware either broadcasting near your location or probably worn on your person somewhere.
The only added feature that I would want for something like this is for it to work also as a corrective lens. Or else those of us without perfect sight are well... left in the dark.

Comment Maybe they should tie them to thier wrists (Score 1) 117

Nine out of Ten lost or stolen in the UK? I have to wonder if seeing abandoned laptops laying around is commonplace there. I don't think I have ever seen a "lost" computer just waiting for me to pick it up. There must be something about the culture that only 10% of the population can keep track of their gadgets. I am reminded of people you see on the beach with metal detectors trying to find lost and dropped jewelery and coins. I may have to make a trip to the UK and ride trains looking for discarded hardware.
Security

Submission + - GoDaddy wants your root password (sucuri.net)

Johnny Fusion writes: "The writer of the Securi Security Blog had a an alarming awakening when a honeypot on port 22 on a GoDaddy hosted VPS recorded login attempts using his GoDaddy username and password and even an attempt to login as root. It turns out the attempt was actually from within GoDaddy's network. Before he could "alert" GoDaddy about the security breach, he got an email from GoDaddy Demanding his root login credentials.

There is an update where GoDaddy explains itself and says they will change policy."

Microsoft

Journal Journal: Cryptome Taken Offline by Microsoft DMCA Filing 2

As of about 2:00 p.m. EST today, Cryptome.org has been taken offline by their host and Registrar, Network Solutions. It seems Microsoft filed a copyright-infringement DMCA takedown notice relating to a Microsoft’s “Global Criminal Compliance Handbook,” a comprehensive, 22-page guide running down the surveillance services Microsoft will perform for law enforcement agencies on its various online platforms. Network Solutions took the extra step of locking the domain to preven

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...