Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:stupid windows! (Score 1) 505

Agreed that there's not much difference in performance between modern software RAID on Linux and hardware RAID, for home users / small servers, even when it's RAID5. I have a departmental fileserver -- HP ML(310 or 330) tower -- with software RAID5 (because the builtin controller can't see the full capacity of large drives) -- and CPU utilization is almost nil. In addition to being used locally, this storage is also mounted via an NFS share to give storage for another server which does some relatively large backups in a smallish window (30+GB done over 3 hours every night). Works great and solves the problem of the original "real" server running out of space on the OS drive array.

On bigger systems, you go the hardware route but at that point you are doing it not just for the large workload but also looking for things such as battery-backed cache.

Comment Re:Haven't seen this one yet... (Score 1) 409

This is about replacing one weapons system with another

Which is precisely why Bush didn't like this weapon and Obama does. For Bush it's not worth the expense if he has to decommission nukes (not a big net gain in ability to blow things up). For Obama, having a way to decommission nukes is the whole point. By replacing nukes with a new system that's even more vorpal, he gets the nuclear reduction he wants without looking weak.

Of course, the tea-birther will jump on this as yet more "proof" that Obama's a wimp. But nothing will convince them otherwise, so that's hardly a factor.

Comment Re:Algorithms? (Score 1) 116

STK was probably used for visualization of trajectories; I'm pretty sure it wasn't used to actually create them, though. My guess is a lot of computer time with custom optimization code.

Also, I imagine it has more to do with simply getting close enough to Titan to slingshot off it than it has to do with the lagrange points; those are more useful if you *don't* want to move than if you *do*.

Comment Re:What's the point? (Score 1) 853

Personal property rights basically developed from the right to harvest land which you cultivated. Nowadays you're not allowed to say this, of course, because so much of today's so-called "property" is based on rent-seeking and thus does not have this moral basis. Thus we have deified the very concept of property and all its extensions, while abandoning the moral basis. This is your mistake.

The point is, that any natural sense of personal property is predicated on a sense of personal responsibility. If one is neglectful enough to abandon their property then what claim do they have afterward?

So I call it commie because it's an artificial social welfare program which directly negates a rightful loss. This is important. Good welfare programs help the innocent, those who did not contribute to their disadvantages.

Comment Re:Leave the networking stuff to the networking te (Score 1) 414

You bring up a good point. You have no idea how many times I've been forced to tunnel SSH traffic over HTTP or SSL to get to resources I needed to use to do a job.

Nevermind the constant influx of vendors and customers, and field people or home workers on VPN.

Securing a network is tough work.

Doesn't fwbuilder do some of this for the FOSS world? Why couldn't the Poster take this and improve on it?

Comment Re:sigh, the "quantum" buzzword (Score 0) 69

You are missing something. I don't blame you. Almost every description of quantum cryptography forgets to mention this step, and without it you are indeed vulnerable to a man in the middle attack.

The thing is, there is something similar to a one time pad but for authentication instead of encryption. See universal hashing. You authenticate your messages over the classical channel with universal hashing using a little bit of key generated from a previous round. Eve doesn't have this key so she cannot forge messages. Just like with one time pads you cannot reuse the key, but unlike one time pads you can authenticate large messages using a small key so you can make sure you lose less key material each round than you gain from running the protocol.

Comment Re:Got to side with Apple on this one... (Score 1) 980

The only legs Adobe may have to stand on is if they were lead to believe that their platform was to be accepted (written contract or verbal) and then at the 11th hour to be shafted? Well then maybe they have a case.

And a fairly limited case, at that. Development tools for the iPhone OS probably don't generate large profits. The costs to add iPhone capabilities to the Flash IDE were probably rather modest. Loss of good will from developers who get caught in the middle of this is hard to quantify. So even if Adobe prevails, the court is likely to decide that the damages done to Adobe are quite modest. And while IANAL, it seems unlikely to me that the court would do more than require Apple to reimburse Adobe; I certainly don't see the court forcing Apple to retract this restriction on developers.

Comment Re:Hmm (Score 1) 87

'Cause Windows 2008 Server core has SO MUCH overhead...

Exchange Server is extremely reliable and very scalable...there are very few products that are open source and/or free that have the same level of usability, stability and features.

I have both Unix and Windows servers and both have had very few problems. I think some of the misconceptions about Microsoft's products being prone to problems have more to do with the user than the software. It is possible that anyone who can download a torrent can walk through a basic installation of Windows Server and Exchange Server, and possibly start receiving email on it...but they will not be able to deal with any problems that arise.

Now, try installing Linux and Horde, and see how far the same person gets. It's not that hard, but definitely harder than installing Windows.

I don't agree with slashdot's historical comments about Windows admins/users being "worse" than Linux admins/users. It's just that there are far more unqualified Windows admins than there are Linux admins, simply because you can't fake it with Linux as well as you can with Windows.

I was an SCO admin first (um, I know, I know). I started on Slackware, moved to SCO, then got into Windows because that's what the market demanded of me in my area. I now do 80% Windows and 20% Unix. 0% Linux.

Now let's all be friends, and bash a company we can all agree on...SCO

Comment Re:DUPE (Score 1) 187

You know what though? Remember years ago, when Slashdot used to have some dupes? And then it got pretty bad for a while and was like a total joke? I remember once seeing the same story twice on the homepage, about 4 stories apart. And it would've been so trivial to implement a dupe-checking system--search for stories by keyword and URL and a couple other things would catch 99% of them. Anyway, this is, I think, the third dupe I've seen in... six months? I don't know but it's been a LONG while since the bad old days. Kudos to Slashdot for finally getting dupe-checking (mostly) figured out!

Comment The absolutely fatal assumption (Score 1) 410

Defending against adversarial strategy 4 – modify detection code. The security against adversarial strategy 4 follows directly from assumption 2 (code optimality), with the exception of a “kamikaze strategy” in which the adversary corrupts the execution of some of the steps (as described in section 3), and then willingly loads legitimate code and removes itself. Such an adversary could only corrupt step 1 of the process, as it will have to be overwritten during step 2 to avoid detection. Moreover, it needs to correctly perform the setup in step 1; this means that the only harm it can do is to cause an incorrect state to be swapped out in step 1. It can write anything it wants to to swap space. It can place a copy of itself in the swap space, or a copy of a legitimate but vulnerable application, with an input triggering an opportunity for malware to be loaded. However, the swap space will be scanned along with all other memory during step 5, and any known malicious configuration will be detected.

If an adversary corrupts stage 1, there is no stage 2, just a fake stage 2.

Holy shit. Seriously. Did this guy also certify the DRM for Ass Creed 2?

Comment An observation from an adult with an ASD. (Score 2, Interesting) 56

After having read the original article and the comments made on it, I would like to share some comments about this, coming from a perspective which probably differs from what may be 74/75ths to perhaps 149/150ths of the rest of you who are Neurotypicals (NTs). You see, I have been diagnosed with an Autistic Spectrum Disorder (ASD... God... how I hate that last word), such as those who who are being put into the enclosure. However, in my case, my childhood occurred before ASDs were widely known by teachers and doctors, and for the most part, a bright but reclusive and awkward child. It was not until I was in my 40s that I was diagnosed, at which point, I could look back at my life and see where various events, behaviours and tendencies may very likely have been the result of my being on the spectrum.

1) Nowhere was the size of this area indicated, nor sufficient details about the surroundings. If it is of a significant size, OK. But even then, it has been pointed out by folks in the area that it lacked adequate shade and was in other ways lacking when compared with another playground at the school, which was apparently featured on a pamphlet of some sort.

2) When possible, kids with ASDs, whether they are low functioning and in need of 24/7 care, or so high functioning that they generally appear normal, should be treated as much the same as NTs, doing the same activities on the same playgrounds and as much as possible in the same classes. Yes, we **may** need a bit less distraction in the classroom (no covering the walls with unnecessary maps, posters, etc.), **may** have issues with bright lights, the buzzing from the lights, etc., and **may** get upset at changes such as a substitute. We **may** also be subject to being bullied. But at the same time, we **may** act up because we may be bored with what the NTs have taken days to understand while we got it in no time flat. (And grades are not a good indicator here...) The list goes on... But all this is necessary, because by doing so, we learn to socialize as best we can, and people have a chance to learn that AS vs. NT is no different than where we were born, the color of our hair, our race or anything else.

3) If you are going to fence off an area, take advantage of the fact and fence off an area for all the kids to use, not just those diagnosed with an ASD. I know of many schools where this was done for younger kids, who NT, Aspie or Autie are prone to go running off under the right conditions (such as chasing off after a ball). Indeed, the entire playground areas at schools I attended were big enough to play baseball in, if not larger.

4) As for the "dirt floor" comment... ours were a mix of asphalt, grass and dirt covered with sand, pea gravel or wood chips, to cut down on puddles and mud while allowing a chance for the kids to work off excess energy. More recently, there has been a move to use the rubber "asphalt" which is springy and more forgiving than either the hard ground or asphalt... fewer injuries from falls. And no, this is not a fancy rich area, but rather rural Appalachia, where 90% of us fed the livestock both before and after school, and were used to seeing garbage cans in the halls to capture water from leaks in the roof.

Don't get me wrong... I am not saying all children should be treated in 100% the same way. That is one of the problems with NCLB as implemented in many schools, and perhaps symptomatic of trying to teach 30+ children in a single classroom with one teacher. If a child has a speech impediment, such as saying "ch" vs. "st" but otherwise has a large vocabulary and reads and does math several grade levels higher than their peers, you should have a speech pathologist work with the impediment and give them instruction at their advanced levels when ever possible. If, however, they have problems reading or doing math, but are otherwise doing fine, give them the extra instruction they need in those areas, and otherwise they are just like any other child. Perhaps by doing so can we reclaim what once put us on the Moon, and go beyond that to possibly fix many of the ills which we are presently suffering.

Comment Re:Emi (Score 1) 601

I guess I just find it confounding that you've said basically everything except, "okay, maybe it's not that there aren't artists making great albums, but that other conditions completely out of the control of those artists have led me away from discovering them."

It makes no sense to blame artists today for the fact that corporate radio is a sham, or for the fact that you feel disinclined to go out to see those artists perform, or to find other outlets for discovering good new music.

I don't particularly care that you're not interested in doing that. It just bothers me that you're using that as the crux of a claim that artistic integrity in music is somehow dead, when it couldn't be further from the truth. It upsets me as an artist, because it's a prevailing attitude that makes getting an audience needlessly more difficult.

Comment Re:What to except (Score 1) 272


HTML 5 is a half-ass hacked attempt to fix the web without breaking backwards compatibility. XHTML 2 was a better specification going forwards, one of the big reasons for that was the specification requires a consistent DOM model.

Slashdot Top Deals

Mathematicians practice absolute freedom. -- Henry Adams