Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Assumed homogeneity (Score 1) 286

with few exceptions, white males can *socially* live wherever they want, if they can afford it

I don't think those exceptions are so few. I'd say about 40% of Chicago is "socially" off-limits to white guys, and I imagine the same is true in Detroit, DC, New York, and LA. In a lot of neighborhoods in Chicago, a white dude can find himself in serious trouble simply because of his lack of melanin. Unless you look like a cop, which is why I've grown a sweet Ditka mustache and wear mirrored Ray-Bans.

Comment Re:Freedom ain't free (Score 1) 273

Surely parity RAID is a function of the MD layer, and replication is a function of LVM?

Only if you're stuck in the LVM-on-Linux mindset, which frankly sucks. There are many reasons why; any of Jeff Bonwick's writings will explain these ZFS design choices. It's also one of the main reasons well-heeled shops run Linux volumes from SANs instead of just using LVM.

For example, LVM snapshots require space reservations, and copy a block to every snapshot with every write. This is extraordinarily slow, and gets worse with each additional snapshot. This makes LVM snapshots effectively unusable for high-volume server systems, where they are needed most.

Comment Re:Freedom ain't free (Score 3, Insightful) 273

Instead, btrfs, hammer, etc were developed -- much better, much cleaner file systems.

How can filesystems that don't exist in stable release form yet be "better" than ZFS?

ZFS is far ahead of btrfs, both in terms of stability, features, and usability. Btrfs doesn't have parity RAID, dedupe, or replication yet. These are critical features for large-scale systems. In short, it isn't even close to ZFS. ZFS is also "cleaner" in my opinion, in both design and UI. Oracle funding most btrfs development also raises a question of btrfs momentum now that they own ZFS and Solaris.

Comment Re:How will large SSDs effect databases? (Score 1) 228

With high-density SSDs at roughly $2.50/GB, and high-density (8+ GB) server-class DIMMs at roughly $50/GB, there is still a huge window where SSDs are the right choice versus in-memory databases. For applications where the IOPS requriements exceed mechanical disk, and the data size isn't trivially small, SSDs are the logical choice if the factor of 100+ improvement in IOPS is enough. That includes the majority of IOPS-bound databases, I think.

When you add in the fact that SSDs are "drop-in" replacements for an existing architecture piece, and do not require any code or operational changes at all, the appeal is great. In-memory databases are, by and large, still niche products. You can run MySQL, PostgreSQL, Oracle, DB2, and MSSQL from SSDs simply by swapping out the mechanical drives.

Comment Re:I miss the pressure AMD used to put on Intel (Score 1) 362

I was talking about actually finding the optimal price-point, graphing price/performance, and finding the farthest point on the performance axis before the slope of the line significantly increases indicating that you're getting very little return on your extra money. That math is still very relevant. And sure, it's going to point you at a quad-core processor today. But not the fastest one.

It's funny. I do the same thing often the server space, but include total system costs, including chassis, memory, lifetime power & cooling costs, lifetime warranty and maintenance costs. These costs actually dominate the raw chip costs to such a degree that it almost always makes sense to buy the fastest processor you can and fully load the chassis with as much memory, networking, storage, etc. as you can. Assuming, of course, your workloads can actually use all those resources. Thanks to virtualization, this is pretty much always true these days.

I imagine this is why AMD has been so dominated by Intel in the server space in the last few years: a cheaper chip might make the TCO of a system 5% lower over 4 years. But if it is 30% slower, it's a bad deal.

Comment Re:Solution: Tax gas more. (Score 1) 1139

Cameras don't prevent crime. They may help solve a crime after the fact, but I imagine a camera means little to a crackhead wearing a ski mask.

London is one example of this. Total "violence against the person" rates are largely unchanged in the last 5 years. Similar statistics can be seen in Chicago, USA, despite thousands of cameras added in "high crime" areas over the last 5 years. The cameras have been a bonanza for local contractors who install and maintain them, but that's about the only benefit.

To paraphrase Bruce Schneier, replacing smart people with dumb technology rarely results in increased security.

Comment Re:Security innovation (Score 2, Insightful) 109

What I'd want is a way to have more control over the program. Maybe put it in a sandbox and trick it into thinking it's got full privileges even though it's really sandboxed so it won't crash or maybe just set advanced settings for that specific application to disallow it from writing to specific registry/files/network/other process' memory.

Which is... umm... pretty much exactly what Windows Vista, Windows 7, and Windows Server 2008 can do.

Comment Re:The title (Score 1) 341

You, the customer pays the ISP for a connection.

Yeah, OK.

Your ISP pays a backbone provider for a connection.

Maybe. But not if your ISP is a tier-1 provider (like Sprint, Verizon, AT&T, Qwest). Or if your ISP has a crapload of private settlement-free peering arrangements that cover the traffic in question. This is far more common than people think. Looking at traceroutes, my ISP, for instance, seems to peer directly with Google, MSFT, Akamai, and Limelight. That's a huge chunk of traffic not crossing any "backbone". Tier-2 and smaller ISPs are happy to peer directly with these big boys for nothing, since it lowers their infrastructure costs and keeps traffic off connections for which they do pay.

Backbone providers pay each other to carry each other's data.

Not really, at least most of the time. What we think of as the Internet "backbone" - the collection of Tier-1 providers - do "settlement-free" peering with each other. They do this because it is cheaper to simply connect up and let the data flow than it is to meter and bill each other for any imbalances. It's an exclusive club that resists new players, but some upstarts have "joined" or come very close in recent years (XO and Cogent).

Comment Re:Boycott US Conferences (Score 1) 637

You better stay the hell out of Europe. Police there have vastly greater powers of search, seizure, and detention than they do in the USA. I particularly enjoyed being "monitored" by two jackbooted thugs with sub-machine guns while being "interviewed" by customs in Frankfort. And that was in the late 90s, pre-9/11.

Comment Re:So drop out and there will be one less "tribe" (Score 1) 655

Remember, Democrats are always wrong on every topic because they murder babies, and you don't want to trust a baby murderer, do you? The sad part is that I've heard more or less that specific argument in the recent past.

Actually, that's not such a terrible argument. If someone has such a fundamental disconnect with your own personal values that they promote something which you consider murder by natural law and common sense, it's very hard to trust them. You're simply too different to deal with one another.

I believe this is actually the same reason WWII ended for Japan in a mushroom cloud... we in the USA simply had no basis for understanding how the Japanese people at the time thought - their culture was too different. It was alien to us that a nation - including civilians - would effectively commit suicide to preserve traditions and a notion of honor that we just didn't understand. I fear the same divide exists between the western world and fundamentalist Islam - we simply can't grok them, nor they us.

Comment Re:What? (Score 2, Insightful) 397

Do you trust apt/yum/portage/whatever on your Linux/BSD distro of choice? Same thing... you trust that the developer's code-signing and key management policies are solid, and they won't dick you by releasing something really bad.

If you're not turning on automatic updates on Windows boxes (and even MacOS and Linux boxes), you might be part of the problem. Yes, you should have centralized patch review and deployment in place for all the machines you manage... but make sure it is all of them. All my company's servers and workstations have managed deployments, but I've configured Mom's laptop to get all updates ASAP straight from the vendor so I don't have to fuck with it and she remains malware-free. She hasn't had major breakage from an automatic update from any vendor in more than a decade (unless you count Adobe, whose best code is still horribly broken). There are probably 20-30 machines I "manage" informally at any given time, and I don't want to tackle patching them interactively, or deal with setting up my own WSUS or apt repository for them.

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...