Forgot your password?
typodupeerror

Comment Router/AP support (Score 1) 30

As cool as this new standard is, I'd love to find a decent AP that can support it. The only ones I'm seeing now are all over $200-300 and have crap reviews. If it's launching today, you'd think they'd at least have a decent lineup of both budget and premium devices ready for it.

Does anyone have good recommendations for an acceptable $200 AP with good reliability?

Comment I don't doubt it (Score 1) 236

MS Edge is a fast, lean, and efficient browser. When I play around with underpowered WinTabs, Edge consistently has smoother browsing (load times, scrolling, etc.) all around, when compared to Chrome and FF. It simply uses less RAM and CPU compared to the competition. Therefore, it's not surprising that it fares better with battery life comparisons. If they made even more improvements lately compared to the last time I played with Edge, I congratulate them for a job well done. Edge is indeed much more efficient than their competition, and as a web/software developer, that makes me appreciate their efforts on that front.

HOWEVER, that does not excuse their crappy security model. Anyone that's watched recent hacking events should know that Edge is the laughing stock of the bunch when it comes to vulnerabilities. Some of it comes with being the younger browser of the bunch. But that shouldn't really be an excuse in this day and age. I can't trust a browser that is so full of holes.

I'd appreciate if MS focused more on closing gaping security holes than a few more % on arbitrary benchmarks that become meaningless because the target audience is too afraid to use the product anymore.

Comment Simple and obvious solution (Score 2) 241

Just like .edu, .gov all require valid certification (to a degree) for ownership, they could simply institute a new TLD where the registry requires ID validation, and prohibits all privacy services for WHOIS information. Enforce a strict contact availability policy, and you have as good of a system as you can pragmatically setup. As an opt-in TLD, no one would be forced to sacrifice their privacy for their current TLDs, and the sites that want to be legitimate sources of information can host their content on their verified domains.

I don't for a minute think this addresses the problem of the masses believing everything they read on traditional .com sites -- and also especially on social networks. But going this route could potentially improve the accessibility of credible information for those that can be bothered to source-check.

Comment Re: I'm Confused (Score 5, Informative) 111

TFA mentions that:

8 Issue R: Purchase of StartCom (Nov 2015)

So it happened less than a year ago. What you researched 18 months ago was probably legit. The acquisition happened after your issuance. That said, having been a long time user of StartCom/StartSSL, I find this is depressing it's gone this route. But I've moved on to LetsEncrypt recently anyways, since the StartSSL website was a royal PITA to use, and LetsEncrypt works much more fluidly.

Sad, but time to move on, I guess.

Comment Not really ready for prime time (Score 5, Informative) 123

I've been holding my breath for a long time for this, and it's pretty disappointing to have to say... This is really not ready for real use -- at least for most non-trivial use. For example, I can't easily get a MySQL connector to work, since it's meant for .NET 4.x and not Core. The majority of packages I use in my projects don't support Core. Obviously this takes time, and without Core being live, it would have less priority for package maintainers to actually support Core. That's understandable. But it's just hard to do anything useful with it, and as a developer, it's highly frustrating to not be able to do something that should be so fundamental like importing 3rd party packages. The new CLI toolset is a bit weird, and it's a few steps backwards of what they were proposing of being able to do, like save and reload (quickly) -- but I suppose that for now, I should just be celebrating that they're headed in the right direction... Maybe.
Medicine

We're Safe From the Latest SARS-Like Disease...For the Moment 106

KentuckyFC writes "Back in 2002, Severe Acute Respiratory Syndrome or SARS killed about 10 per cent of the 8,000 people it infected in southern China and Hong Kong. The severity of the disease and its high death rate triggered panic in many countries where health agencies worked feverishly to prevent its further spread, largely successfully. Then in September 2012, a virologist working in Saudi Arabia noticed a similar virus in a patient suffering from acute pneumonia and renal failure. Since then, so-called Middle East Respiratory Syndrome or MERS has also begun to spread. The World Health Organization says it knows of 63 deaths from only 149 cases, a death rate that seems to dwarf that of SARS. So how worried should we be? Now epidemiologists who have modeled how the disease spreads have some reassuring news. They say MERS is unlikely to cause a global pandemic. But with Saudi Arabia expecting the imminent arrival of millions of pilgrims for the 2013 Hajj, there are still good reasons to be concerned."

Comment Re:Not to sound overly harsh (Score 4, Insightful) 151

I think you're mixing two different things.

1) Some people have certifications expiring.

In many cases, if you certify a higher level certification, it will renew your older lower ranked certificate. But if your certification expires, you won't be able to take the higher level certification because that lower level certification is required to take the higher level.

So yes, in this case, people are being somewhat lazy, and frankly most companies would work with you on this.

2) Some people need a certification to be able to work.

This might mean that some people are unable to start working (i.e. take a job with a company) until they pass their certification.

This is a different issue altogether, and has nothing to do with laziness on the part of the test taker.

Comment Re:Amazon Silk + SSL = MITM? (Score 1) 249

The RFC you linked to points out: in a proxy situation, this establishes a secure connection between you and the proxy (between proxy and target site is undefined). If you want end-to-end TLS, it states you must use CONNECT to create a tunnel.

I can't imagine Amazon would funnel TLS encrypted connections through AWS using this method, since the whole point of Silk is to analyze/cache/preload the content (end-to-end crypto would break this ability). If they couldn't read your HTTPS data, it would be less latency for you and cheaper for Amazon to have the client connect directly. Their Help site makes it sound like proxy/cached mode is the default setting, so IMHO it still is effectively a man-in-the-middle.

Thankfully, it looks like you can disable it (or use a different browser), so I may just be paranoid for no reason.

Comment Amazon Silk + SSL = MITM? (Score 5, Insightful) 249

Cross posting from my old comment. As per their help:

What about handling secure (https) connections?
We will establish a secure connection from the cloud to the site owner on your behalf for page requests of sites using SSL (e.g. https://siteaddress.com/ ).

So essentially, they become the man-in-the-middle so they can better cache your HTTPS content? And their browser is programmed to show this is acceptable/secure... What kind of privacy implications does this introduce? Even if their privacy policy says they won't use the data maliciously, cloud computing isn't a bullet-proof system (i.e., leaks, hacking incidents, etc.). Call me paranoid, but if I read this right, this sounds like a frightening idea.

Comment Amazon Silk + SSL = MITM? (Score 2) 521

As per their help:

What about handling secure (https) connections?
We will establish a secure connection from the cloud to the site owner on your behalf for page requests of sites using SSL (e.g. https://siteaddress.com/ ).

So essentially, they become the man-in-the-middle so they can better cache your HTTPS content? And their browser is programmed to show this is acceptable/secure... What kind of privacy implications does this introduce? Even if their privacy policy says they won't use the data maliciously, cloud computing isn't a bullet-proof system (i.e., leaks, hacking incidents, etc.). Call me paranoid, but if I read this right, this sounds like a frightening idea.

Comment Alternative Solution: Implement it Right? (Score 5, Insightful) 354

There's all this talk of URL shortening services - whether third-party, or in-house implementation.

The question here is this: Why are the URLs so long to begin with?

Why does it have to be:
http://shiflett.org/blog/2009/apr/save-the-internet-with-rev-canonical

A full title in the URL is, IMHO, a very inefficient idea. The excuses I've heard are:

Search Engine Optimizations (better performance when keywords are in the URL)
Okay, I can't argue that some search engines do stuff like that. But shouldn't the TITLE or META tags have more bearing on this than how ridiculously long the URL is?

"The URL has meaning, so you know what you're clicking", Context, etc.
I suppose that when I see a URL like
http://shiflett.org/blog/2009/apr/save-the-internet-with-rev-canonical
as opposed to something like
http://example.org/blog/526
I would have a slightly better idea of the article's content before clicking on it. But then again, I can't really say that I've decided against clicking on a link just because of the link URL. I would, instead, decide whether I'd want to visit the link by its link text/description.

So <a href="http://example.org/blog/526">blog on link shortening</a> would still have the same effect on me as a long URL IMO. If it were bookmarked, the same rules would apply.

Hell, if I were handed an obfuscated shortened URL without context, I'd know even less of what I was getting myself into.

I think the proper solution is to just stop making ridiculously long URLs to begin with, so we don't have to rely on obfuscation/hashing/shortening to accommodate services that have character limit restrictions. And we'd save bandwidth too, apparently. Win-win?

Medicine

Asthma Risk Linked To Early TV Viewing 266

Ponca City, We love you writes "The number of children with asthma has been rising for many years. About 1 in 10 children in the UK develop asthma, compared with about 1 in 25 in the 1960s. The reason for this isn't clear, although several theories have been put forward such as keeping our homes cleaner, and having central heating and more soft furnishings where house dust mites can multiply. Now based on more than 3,000 children whose respiratory health was tracked from birth to 11.5 years of age, researchers have found a new correlation with young children who spend more than two hours glued to the TV every day doubling their subsequent risk of developing asthma. 'This study has shown for the first time a positive association between increased duration of reported TV viewing in early childhood and the development of asthma by 11.5 years of age in children with no symptoms of asthma in early childhood,' said the researchers, led by A. Sherriff, from the University of Glasgow. It's not clear exactly how sedentary behaviors like television watching are tied to asthma, but there is some evidence to suggest exercise and deep breaths that come with it stretch the smooth muscles in the airways, while lack of exercise may make the lungs overly sensitive. The results add asthma to a catalog of undesirable outcomes, including obesity, diabetes, smoking, and promiscuity, tied to TV viewing."
Databases

Is the Relational Database Doomed? 344

DB Guy writes "There's an article over on Read Write Web about what the future of relational databases looks like when faced with new challenges to its dominance from key/value stores, such as SimpleDB, CouchDB, Project Voldemort and BigTable. The conclusion suggests that relational databases and key value stores aren't really mutually exclusive and instead are different tools for different requirements."

Slashdot Top Deals

Basic is a high level languish. APL is a high level anguish.

Working...