Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Technical Controls (Score 1) 95

Come now.... Deep breaths little one, it'll be OK....

New standard, one of the revisions of LTE or 5G perhaps?

In a fault situation, what do you think happens?

With the overlap of cell towers, that cell would either automatically shut down for adjacent cells to pick up the load, or it would be shut down by the NOC.

The larger question is, how do you authenticate a tower? PKI? Does the SIM contain the cell network's root cert as well as it's cert from the HLR?

Home Location Register, in GSM terms, there's a cert in the SIM which is used to authenticate to network, the other half of the cert is stored by the HLR which does the authetntication

Does the running of a LIG (Legal Intercept Gateway) require you to give a copy of the network's root private key to law enforcement for them to fake cell sites? (At which point, the jig is up anyway)

Comment USB-C is a bad spec (Score 4, Insightful) 85

After Anker recalled their USB-C cables the other day, there was an article on The Register about it, the comments section had a great bunch of comments in it including: "it's a design error An electrical specification which allows multiple, software-controlled supply voltages, but does not require connected devices to tolerate the highest available voltage. What could possibly go wrong?" I can see a lot of fried TVs when people push 20A at 5V into their TVs because of a bad cable. Anyway, comments section worth a read: http://forums.theregister.co.u...

Comment Re:Azure, Exchange SQL et al (Score 1) 400

This unfortunately doesn't come anywhere near the functionality of PowerShell..... Powershell can manage into Windows evironments and with the ecosystem of admins out there posting powershell cmdlets and, well just powershell commands on how to do stuff, there isn't as much out there for people to start python over powershell.

Comment Azure, Exchange SQL et al (Score 5, Interesting) 400

The reason for doing this I thought would have been obvious, but from the comments it doesn't seem so.

No Linux admin, who administers standard Linux bare metal or VMs is going to install this, not in a million years, they've got bash scripts with GNU utils, or they learnt Python or Perl or something else years and years ago, they've no use for PowerShell...

If however, you use Azure (MS *are* the second largest cloud computing provider), and you want to do web scale, Microsoft either needs to start giving out Perl and or Python modules, or they need to get PowerShell on Mac / Linux for people to be able to script their Azure / SQL / Exchange instances so that the admins and devs can integrate with Chef and everything else out there.

With the amount of work that's gone into Powershell for it to be an admins platform, it's *easier* to port Powershell to Linux than what it is to rebuild powershell for Python or Perl or whatever else.

Comment I want it to be more secure, not less (Score 2) 109

I want to be able to write rules, so that, if I'm at home (Geo-location) and connected to the wireless, then you only need a simple unlock code.

If I'm out and about, I want it to be looking for my smart watch before it will unlock, or otherwise a yubikey (NFC).

If you want to get into my work section of my device you need *all* the above. Bluetooth, NFC and a strong unlock code.

If you don't have any of this stuff, no unlock. If you fail auth 7 times, full brick. Device destroyed.

I don't want to reward people who would mug me for my phone, if we got to the point where the devices are a worthless lump without an unlock, then people won't steal from you. Remove the incentive, remove the crime.

Comment 2TB is the limit in the accountancy system.... (Score 1) 204

That's as much as the carrier's engineers say you could theoretically get through without a limit if you ran it 24x7, but you're really not going to get that in the real world.

They do traffic management to prioritise certain traffic, up what they can see as VoIP (Which is hilarious as Facebook, Google Hangouts, Skype etc calls suck but SIP connections are flawless), HTTP (80) / HTTPS (443) are again, up. Try to torrent something? 64kb during peak hour, close to useless in my experience, but out of hours it picks up to a couple of hundred KB / sec.

Also, in the real world, once you go over 20GB you get a phone call. A friend of mine was using a SIM of theirs for a backup connection in his house, and he got a phone call from them saying something along the lines of "Is everything OK with your equipment, you seem to have gone from using not much to using a lot in a day or two" he told them it was the backup to his cable and they went "OK, thanks" and left him be.

So, they don't seem unreasonable about large usage as long as it's not every month. For â20 / month, I thought it was quite decent value actually.

Ordinarily I'd use 2 - 3GB, but if I hit 5 or 6 because I was tethering I wouldn't even think about it, and in my experience, neither did they.

Comment Re:the above is wrong (Score 1) 72

Sorry, what?

Even the kernel isn't accurate at doing this. On heavily loaded systems I've seen 20ms wait before a packet is stamped before. Pre-emptive kernels and everything else means that a packet might be sitting on the network card or in a buffer without it being collected and stamped by the system. The only way to have accurate timestamps is to have something like a Napatech or Myricom card using a third party time source.

Comment Re:Interesting (Score 1) 72

I'm guessing your using standard ping there, well, the problem is that the packet being generated and the time sent and received times are coming from timers most likely in the app itself, it's doing the calculation, so if you ask the system for time 1 and it goes "00:00:00:00" and you ask for the time again and it says "00:00:00:01" it'll get reported at 1ms, but the packet may have entered the system a lot faster than that, it's only because you're using a 1ms accuracy time stamp that you're getting 1ms. Also, if you ask for a timestamp and the system takes a long time to respond to that request, you're timestamps are going to be out again.

Accurately measuring all this stuff, there's whole sections of the networking industry built around it.

Slashdot Top Deals

You can't have everything... where would you put it? -- Steven Wright