Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Mythbuster 3.0 (Score 2) 317

I too have a problem with the many occasions where they "bust" a myth due to failing to reproduce, while there are credible documented occasions of it actually happening.

That, and all the myths related to human performance, where an "X" gets to represent either an average X, or the best possible X. Especially when many of the myths includes some notion of super-human abilities. Congratulations, you just proved superman/santa-claus/hellboy doesn't really exists. Bravo.

If nothing else, the amount of changed verdicts in the revisits shows pretty clearly that while fun to watch (when they doesn't mess up completely), Mythbusters isn't an exact science.

Comment Re:Auto-Installing *anything* needs to die. (Score 1) 284

The whole "I trust you, so please go ahead and run your installer with admin-privileges."-model is fundamentally broken for so many reasons. It's not just the install-various-crap-I-did-not-want problem, but also the problem of the "installer" not knowing critical details about you particular config, breaking things horribly, the uninstall-problem, dependency-problem etc.

Package-management systems are usually just marginally better (there's still install/uninstall-scripts that can go haywire, and poor support for isolating 3d-party apps), but at least it's something.

Comment Just a thought (Score 1) 94

I'm sure someone has already reflected on this, but the thought hit my slow brain at first today:

  [li] A project like Firefox could never have succeeded in a web-landscape where license-payments were needed to implement a web browser.

  [li] Without Firefox, we would most likely still be stuck with IE.

Comment Re:Everyone else uses H264/MPEG4 (Score 1) 336

In order to beat h.264, you have to be significantly better, and h.264 is pretty darn good.

Should be possible though. It's quite amazing to see how much bit-errors can actually be concealed, meaning there must be some degree of redundant information in there.

For a while, especially in broadcast media, there's been a desire for wavelet-based coding instead, which doesn't seem to improve compression much, but improve error-concealing such that missing information causes blurring rather than blocking, which is much more lenient on the human eye.

Comment Re:Just wondering (Score 1) 508

I don't know about the US legal system, but here the law explicitly focuses on "intent". It's not a crime to whack someone over the head with a 40-foot pole by accident, it might be if due to negligence, it certainly is if intentional.

In this case, the stated and reasonable intent was not to circumvent copy-protection. AFAIU, the hack by itself cannot even be used to break copy protection. It's merely a way to build and run your homebrew games on your own hardware. If that isn't already covered by fair-use, it certainly should be.

Comment Technical mitigations (Score 1) 433

At work, we are 4 sysadmins (two dedicated, two time-shared with other tasks) working in a number of systems. To mitigate this particular problem, we've setup an infrastructure comprised of Kerberos, LDAP and AFS with sudo for privilege escalation.

The intention is to manage the risk of unintentional mistakes causing problems, as well as some degree of traceability when problems occur. No single admin knows all systems, so one may by mistake cause conflicting configs in unknown systems, but in those cases, you can pretty quickly determine who did it, and roughly what was did by examining logs. Enables the shame-factor, education, and acceptably quick recovery.

The highly critical functions runs in an isolated system, upgrades to both code and config are version controlled (as is the bulk of the config of every individual service), further improving traceability, with the praxis to only do updates to those systems in with at least two admins present in order to avoid mistakes and ensure everyone keeps well familiar with those systems.

However, it's very important to note that all of this is intended to improve maintainability, NOT security. All four admins have individual physical access, so any one of us could naturally while doing onsite jobs, perform an "upgrade-reboot", and sneak in init=/bin/bash on any system and do whatever without logging. In the end, you pretty much have to trust your co-workers, or pay in both money and flexibility for a non-centralized organisation.

Comment Re:how do they design nuclear missile systems? (Score 1) 433

What about reading, if not TFA, at least the description?

The problem-description explicitly mentions dual-admin cases like the nuke, and deems it not appropriate for all admin-tasks.

"Do you want to reset user X:es password? Please bring 4 more admins."

Obviously the writer of the question knows of multiple-confirm-schemes and asks for other solutions.

Comment Re:Number of components, not computing power (Score 1) 214

When put in the mobile context, it also means shorter battery life.

It also provides incentive for hardware makers to keep focusing on performance rather than other qualities. It's to the point of the hardware literally catching on fire, killing people.

Sure, if you sit with your laptop in your lap, it's smart to make sure it gets properly ventilated, but WHY SHOULD THE USER HAVE TO CARE? Had software systems remained efficient, hardware manufacturers would soon had to differentiate themselves on other qualities such as cool and quiet, case-design or other things users actually value.

Comment It's a matter of use and optimisation. (Score 1) 124

Hard-drives aren't really as slow as people think. The problem is that mechanical hard-drives is slow on seeking, but if seeking can be eliminated, you can quite easily saturate your CPU on even a moderately complex calculation.

Case of point: http://www.youtube.com/watch?v=WQw7c-PliB4

Slashdot Top Deals

Sentient plasmoids are a gas.

Working...