Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re: Why use VMWare? (Score 1) 162

Sorry, but no. ESXi runs a custom proprietary kernel called "vmkernel" and has been this way since 1.0. You may be confused by the fact that up to v4.1 there was a Linux virtual machine running on top of it dubbed the "service console". Since v5.0 it has been removed. But even before, the Linux OS you mention is not the one that runs on the metal.

Nowadays ESXi has no Linux running whatsoever, but there is a busybox shell that may make it look like so.

Please note that I am not taking sides on whether the GPL has been infringed. Just saying that the Linux kernel is positively not there.

Social Networks

Pseudonyms Now Allowed On Google+ 238

An anonymous reader writes When Google+ launched, it received criticism across the internet for requiring that users register with their real names. Now, Google has finally relented and removed all restrictions on what usernames people are allowed to use. The company said, "We know you've been calling for this change for a while. We know that our names policy has been unclear, and this has led to some unnecessarily difficult experiences for some of our users. For this we apologize, and we hope that today's change is a step toward making Google+ the welcoming and inclusive place that we want it to be."

Comment Re:"Obliged to keep records of users' access" (Score 1) 132

From the original in Portuguese:

"O sigilo das comunicações dos usuários da internet não pode ser violado. Provedores de acesso à internet serão obrigados a guardar os registros das horas de acesso e do fim da conexão dos usuários pelo prazo de seis meses, mas isso deve ser feito em ambiente controlado."

which translates roughly as:

"The user's communication privacy cannot be violated. ISPs will be obliged to keep track of access and connection hours for six months, but this must be done in a controlled environment".

So yeah, I think it is pretty good. No URLs, no content, just connection times. Six months so your IP can be tied to a person in case the police needs to come after you, but no content and no invasion. Sounds fair.

Comment 20 GOTO 10 (Score 1) 149

It is basically the same deal over and over. We need to reduce complexity in programming, so we build yet another abstraction layer. We hide the complexity from the programmer and deal with it in the infrastructure, thus creating more bugs and worse performance. The bugs get (very) slowly fixed and the performance issues are compensated by evolving hardware, which takes a few years. Such is life. If it were not for some initiatives like this one, SAP would be written in machine code.

That is not to say that this is the solution to all problems, neither that this is even the best alternative for anything, but it's just the way that software evolves, and as such, time will tell.


Submission + - Enterprises Don't Understand IT Risk (

Orome1 writes: A global survey of more than 1,240 IT decision makers at large enterprises – 72% of which have more than 1,000 employees – found that 33% of respondents do not believe their organizations have an accurate assessment of the level of IT risk they face from internal and external threats. This lack of confidence in risk assessment is warranted for two reasons. First, nearly one in four companies (23%) indicated that they do not have a formal IT risk management program in place. Second, a large percentage of businesses do not routinely review user access rights to data.

Feds Prep For E-Gov Shutdown 290

dcblogs writes "If the federal government is shutdown midnight Friday, the feds plan to stop updating government Web sites that aren't delivering essential services. 'Most Web sites will not continue, only those Web sites that are part of these accepted activities would continue to operate,' the senior White House official said Tuesday. 'Accepted activities,' refers to essential, life and safety-related government services. The IRS, however, will continue to accept tax returns filed electronically and to process payments. 'We need to be able to collect the money that is owed to the U.S. government,' the official said. Paper-based returns won't be processed."

Sony, Universal Hope To Beat Piracy With 'Instant Pop' 369

Hugh Pickens writes "The Guardian reports that Britain's two biggest record labels, Sony and Universal, plan to beat music piracy by making new singles available for sale on the day they first hit the airwaves hoping the effort will encourage young people to buy songs they can listen to immediately rather than copying from radio broadcasts online. Songs used to receive up to six weeks radio airplay before they were released for sale, a practice known as 'setting up' a record. 'What we were finding under the old system was the searches for songs on Google or iTunes were peaking two weeks before they actually became available to buy, meaning that the public was bored of — or had already pirated — new singles,' says David Joseph. Sony, which will start the 'on air, on sale' policy simultaneously with Universal next month, agreed that the old approach was no longer relevant in an age where, according to a spokesman for the music major, 'people want instant gratification.'"

Passwords Are the Weakest Link In Online Security 277

Orome1 writes "It's not surprising to find that 79% of consumers use risky password construction practices, such as including personal information and words. The recent Gawker breach and a detailed analysis of breached passwords show undeniably that passwords continue to be the Achilles' heel of the average Internet user. This insecure trend sadly doesn't shift as 26% of users reuse the same password for important accounts such as email, banking or shopping and social networking sites while 29% had their own email or social network account hacked, and over half (52%) know someone who has had a similar problem."

Astonishing Speedup In Solving Linear SDD Systems 157

eldavojohn writes "A new paper (PDF) out of Carnegie Mellon University shows how to solve symmetric diagonally dominant linear systems much faster than before. The technique employs graph theory, randomized algorithms, and linear algebra to achieve an astonishing advantage over current methods to solve such systems. From the article: 'The result is a significant decrease in computer run times. The Gaussian elimination algorithm runs in time proportional to s^3, where s is the size of the SDD system as measured by the number of terms in the system, even when s is not much bigger the number of variables. The new algorithm, by comparison, has a run time of s*[log(s)]^2. That means, if s = 1 million, that the new algorithm run time would be about a billion times faster than Gaussian elimination.' Developers out there who maintain matrix packages and linear algebra tools might want to take a peak at the paper. Anyone who has modeled real-world systems will be able to tell you that speedups in linear algebra algorithms have a weighty effect on efficiency in simulations — especially as one approaches the theoretical limits of optimality. This research is currently being presented at the IEEE Symposium on Foundations of Computer Science."

Comment OK, please remember it's time travel! (Score 1) 1270

And not space travel, so unless you're already where you want to be, there's no use in being able to be when you want to be.

Especially if you're going as far back as to be in a time where long distance travel would be hard, time-consuming, or right down impossible.

If I'm nitpicking, please blame The Big Bang Theory, season 1, episode 14.

Slashdot Top Deals

Faith may be defined briefly as an illogical belief in the occurence of the improbable. - H. L. Mencken