Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Turrets! (Score 2, Insightful) 368

Yes, but then you include metal rounds as a class of objects that likely will be SUCKED INTO THE ENGINE. If my options for aspirating something are a bird versus a bullet, I think the plane would fair better ingesting a bird. Not to mention the hazard of turning one falling (suckable) objects into many falling (suckable) objects.

Comment Re:Fly Around Them (Score 1) 368

Generally, yes, the flocks are difficult to pick up on radar, due to the small cross-section, and generally squishy nature of birds. The speed of an aircraft is also an issue - moving at 600mph (~880 feet per second) - means the flock (given radar / VFR issues) will probably already be upon you even before you have a chance to react. Even if you did have time to react, an Airbus A320 doesn't exactly (safely) turn on a dime.

Comment Re:How to block portable apps (Score 1) 531

This is so true that it's sad.

And, of course, the apps were originally outsourced to India, developed by GroupX. Now, GroupY will be brought in to re-tool them, and management asks 'But it already works. Why do we need to update it?'

The business doesn't see it as a value - it's not broken, to them, and therefore doesn't need to be fixed (or have a dime spent on it).

Comment Re:Repair a clone of a clone (Score 2, Informative) 399

SpinRite works to identify bad sectors on a track on magnetic media. Once it locates a bad sector, it attempts to re-read (repeatedly) the bitmap from that sector. If successful, it will re-write that bitmap to an unused sector, mark the original sector as bad, and provide a pointer in the index of the drive to the newly created sector.

For me, SpinRite has successfully corrected fubared Windows installations (STOP error at boot, unreadable boot volume, registry .xxx missing at boot time, etc), repairing a disk with a FileVaulted sparseimage (allowing it to mount), repairing a disk that was TrueCrypted (allowing it to mount), as well as repairing a drive enough to the point where I can make an image copy of it and recover atleast some (and in some cases, most) of the data on it.

SpinRite is also the only tool I'm comfortable running on an encrypted volume.

It's not voodoo, and I run it quarterly for maintenance purposes.

Comment Re:Perfectly theft proof (Score 1) 98

Except those who would simply dBAN the device and run Linux on it. There are quite a few machines out there that can't run Vista for shit, but as soon as you load Ubuntu/Kubuntu/SuSE on them, they handle the task pretty well. The only gripes are super proprietary wireless drivers, and those've come a good long way in the last 18 months.

Comment I have a ton of flash drives... (Score 1) 485

...and no data on any flash drive is ever permanent. Usually, the first thing I do with one before I start using it for whatever task I've picked it up for is wipe it. There's a folder on my file server of .dmgs - snapshots of 'important' jumpdrive stuff that I'm not confident is being replicated everywhere. But I have convinced myself that ever an SD card, CF card, USB drive, whathaveyou is found, the data onboard is transient.

These cards are not intended as long-term storage, they're portable medium until you can get the data onto something with more iron. If the data is important to you, transfer it to the drobo, or file storage, or CD or something. Just not on the portable media.

It's the same old story: backup, backup, backup.

Comment Big business is slow to respond (Score 4, Insightful) 426

I work for a Very Large Company. Unfortunately, this particular company has built quite a bit of business process around Microsoft's tattered and broken products. For starters, the client engineering group requires that you use a build of IE6. Without several security patches. Why? Because a lot of the web portal applications do not run on anything but IE6. Upgrade to IE7? Unsupported. Chances are, the app won't work, or won't display correctly. For most of the apps that have forms, upgrading to IE7 means you'll never see the 'Submit' button, either because it's not there, or was rendered off of the page (and there's no horizontal scroll). Worse, most of these rely on stupid IE6 javascript tricks that don't quite work right in Firefox or Chrome or Safari. Firefox is semi-usable for most things, though you will eventually hit a page that just won't "Work". Unfortuantely, this corps makes up a not-insignificant chunk of the population. It's groups like that that would need to take care of in-house breakware before an adoption of Firefox or Chrome can be taken seriously.
Operating Systems

Submission + - Why Mac OS X won't be virtualized for the moment

An anonymous reader writes: "The problem is that neither Parallels or VMWare want to strain their relationship with Apple by adding this feature without the Mac-maker's consent and, by the way, violating or incenting to violate its current user license agreement as well as Apple's copyright regarding the protection system the company has developed so as to prevent Mac OS X from booting on anything that is not a Mac." More on MacosXrumors / MacScoop
Spam

Submission + - Bluetooth spam in public spaces

mrwireless writes: "http://www.emerce.nl/nieuws.jsp?id=1845389

The Dutch OPTA, a national telecommunications watchdog, has decided not to label commercial bluetooth messages as spam. These messages seem to fall through a loophole in European laws against spam since they do not travel through an 'intermediary network'.

The issue was raised last week when a Dutch broadcasting agency outfitted a number of bus stops so they would send a promotional video of an upcoming show to passers by. Although the messages first ask if people want to see the video, ICT lawyer Steven Ras believes that this does not qualify as "opt-in" advertising.

As more and more people are leaving their bluetooth turned on to make use of their bluetooth headsets, Bluetooth close-range messaging, such as through bluejacking, is increasingly being used for commercial exploitation."
United States

Submission + - Afghan leaders steal half of all aid

AlHunt writes: "The Telegraph is reporting that Afghan leaders are stealing up to half of aid sent to the country.
Despite accusations against tribal leaders, mosque elders and police, the US and EU are still planning to send another £7 billion in aid.

From TFA:

Charles Heyman, a defence analyst and former British Army major, said millions of pounds earmarked for reconstruction were being siphoned off. "It almost comes with the programme," he said. "You have to build in an element of that into any programme because you know it will leak into people's pockets."
On an up note, however: "Nato commanders in southern Afghanistan are deeply concerned at the level of corruption ...".
Super. As long as someone is "deeply concerned" we can keep bleeding the worlds taxpayers to feed the corrupt."

Slashdot Top Deals

Truly simple systems... require infinite testing. -- Norman Augustine

Working...