Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Quick Workaround (Score 4, Interesting) 150

1. Determine which TOR-nodes you're talking to. (Netstat or Ethereal)
2. Remove default route through your ISPs router
3. Add specific routes to the /32s the TOR-nodes are on through the ISP router

Traffic routed through TOR will work fine.
Traffic going outside of TOR will fail except for the local network (your home or office LAN).


Comment Begging the question (Score 1) 114

This begs the question (assumes it and ignores it): When a NON-open-source software program is involved in an accident, the responsibility is that of the manufacturer.

That is not true according to current cases dealing specifically with Tesla.

A better question isn't "Hey if an open-source independent vehicle software program causes a crash, who's responsible" but rather: 'Who is responsible when software causes a crash" or better yet "How can people be responsible for their own behavior even if relying on a tool?"


Comment Hornby set? Maglev is "new"? (Score 1) 122

I think it's great that one day we'll live on a planet where we don't have to sit in a plane but instead can sit in a train, although I'm sure TSA will find a way to make it slower and more annoying. However, the original article really quotes some... HYPERBOLE ideas:

"...leave the hyperloop looking like a Hornby set."

Never heard of it. When using a simile try to ensure that the part you're comparing things to is actually known by people. With all due respect to Bruce Hornsby, of whom I have heard. He's got a band, not a set.

"...maglev, a still-new propulsion system..."
Only if still-new is 1972 tech. Seriously... this is almost 50-year old technology. It's not "still new". It has its challenges which is why it's not used everywhere... just like any other form of compromise in transportation, shipping logistics, or life.


Comment Tether, Real backup, Root apps (Score 3, Informative) 215

WiFi Tether without paying extra to the carrier for the same data you're already paying for is a feature.
Backup specific apps and their data ("Titanium Backup" or its successors) or the entire device ("NANDROID" backup via TWRP, CWM, PhilZ, etc)
Root apps allow flexibility carrier-ROMs don't. Greenify shuts down unused apps. Xposed allows changing almost anything about Android operation (the "framework") with easy installation. See this link for top rooted apps.

None of these are available with locked bootloaders, and stock ROMs. (The NANDROID backup is available with stock ROMs but is if little value).

MotoG4 using Silesh Nair xt16xx 7.1.1 Lineage OS 20170113 ROM

Ehud Gavron

Comment Super Awesome Improvement!!! (Score 2) 109

I'd rather the Hamas terrorists sit around hacking Israeli army enlisted men's smartphones than strap explosives to themselves and go kill innocent civilians in populated cities.

Exploding bus = brutally murdered people and body parts everywhere while the terrorists and their sympathizers dance in the streets and Iran pays them.
Hacked smartphone = nobody dead.

This applies to all terrorists, be they Hamas, Hezbollah, Iran, French-muslims, etc.

Please, terrorists, do go on and continue your oh-so-super hacking.

Swords to plowshares indeed.


Comment Re:Slow day on slashdot? (Score 1) 73

It's not a memristor. See this article which does a much better job of explaining it than WikiPedia.

Memristors by definition is not a stateful electronic component, so, to answer your question, no, it's not a 4-state memristor. The original article does talk about "states" but it refers to the ternary numerbing system available in the device. Ternary is better than binary for efficient storage (log base 3 of n vs log base 2 of n) but hopelessly inefficient for actually accessing it or doing anything with it.

Imagine, if you will, the old "sort the coins with the balance-scale" problem. Given n coins you CAN do it in log(3)n+2 instead of log(2)n+1 which is "better" except there's an algorithmic cost to have to identify discrete coins and move them around. In the log(2)n solution you just put half on one scale, half on the other, and see which side goes up and which side goes down.

Computationally intensive algorithms make a ternary system less efficient than a binary system for FAR MORE than the cost that one saves in storage or having different 'states' as they call it.

As to the comment that you can do logic gates, that is not in the original article. All the article purports to claim is that the memory chip can do operations on the data in the memory chip so you don't need a CPU. Put more simplistically it means that the memory chip can do CPU-like functions without the transfer back and forth of memory. In-place ops are significantly less computationally expensive than those requiring memory-mapping, DMA, or whatever transfer mechanism is used.


Comment Slow day on slashdot? (Score 4, Informative) 73

A memory chip is not a processor.
The *summary of* the article didn't say what the article did.
Nothing the summary says is close to what is true.

NO MEMORY UNIT WILL PERFORM CPU FUNCTIONS at less than 2 orders of magnitude worse (that's 1/100 performance/power) today.

There's no "discovery" here. You can use stones and sticks to compute. Using a memory chip is far more advanced. And just as stupid.

Slow day on slashdot?

Yes. I signed this post. Because I'm in the industry. I'm not a troll. I get to call out when people put out stupid articles where they summarize stupid research papers that have nothing to do with reality land. Like this one.


Comment All about herself... (Score 3, Informative) 511

Scott Greenfield from simplejustice gives his take on Ms. Wu's whole-hearted attempt to represent *HER* desires and *HER* feelz and not anyone else in her failure run for Congress.

It's a good read. Scott is a lawyer who blogs daily... and he doesn't pull any punches. Unlike Ms. Wu he is able to view things objectively.


Submission + - Bug in libvirt allows unauthenticated VNC sessions

gavron writes: A bug in the libvirt virtualization library allows attackers to connect to VNC servers that have no password set (that are using a non simple-password authentication) but instead of denying access... no authentication will be tried and the user will be connected.

The US National Vulnerability Database rates this a 9.8 on the CVSS severity level.


Comment Problem. Solution. Specification. (Score 2, Insightful) 303

Before asking for "how do I figure out what to do?" (spec) you should define what's up (problem) and determine how to handle it (solution) and then come up with the specification.

"Trench CAT6"???? No, you are unclear on the concept of a)trench b)concuit, and c)CAT-6. Before you ask me why I'm dissing your plan see above about Problem/Solution/Spec. In short, copper bad, fiber-optics provide opto-isolation, CAT-6 won't get you anything CAT-5 won't since you stupidly rely on *one* commodity ISP, and you have nothing to trench for. Short answer: inner-duct with multi-mode fiber will carry 1G, 10G with no electrical connection nor ground issues.

UPS? No. LOL. That's good for your kitchen. If you want solid power get a -48VDC battery pack, a rectifier/charger, and an inverter for AC operations.

Whiteboard walls? How is "what I do with my walls" part of any IT strategy? Do whatever you want with your walls. You want IT advice? See above. You want interior decorations advice, see an interior decorator.

Your concepts of physical security (double up the wall beams and which lock should I supply) are absurd.

Let us know when you have your fortress done.

I'd like the opportunity to drive my car through your front door in 15 seconds and see how great your $3.75 works.

I did try to be helpful... but as other posters have pointed out... SERIOUSLY???


Comment Headline correct; summary wrong (Score 3, Insightful) 399

Any employer can donate the gifts (or funds) they would have spent on employees, or any amount for that matter, to charity. That part of the story is clear and good on Alphabet for helping out needy schools to the tune of more money than I'll ever make in my lifetime.

What is not accurate is the phrase "on its employees behalf" and other posters have already indicated that if the employees don't get the tax advantage, then the donation is not "on their behalf." Indeed the incentive is for Alphabet to get the deduction, effectively providing a $30M gift which costs them probably half that.

However, unlike other posters who say "If I'm not getting the benefit then F*** them" I think on it this way: If I were an employee and was told "This year instead of giving YOU a gift we're giving one to a poor child in need" then I would think about whether I was ENTITLED to a gift (no), or whether I just got spoilt and greedy and want want wanted a gift, and now I'm crying my big head to sleep on my big pillow.

Good on Alphabet. Good on everybody who supports helping out those in need.

P.S. I'm not a tax expert, lawyer, nor doctor. But I do write my opinions on the Internet.

Comment Don't hate on Microsoft (Score -1, Troll) 129

Powershell is no different than any other Microsoft product. Security is not a consideration. Consumer lock-in and revenue is.

This is no more "news" than "MPAA goes after another movie critic who shared a screener" or "IRAN says it hates the US in a new message."

Nothing to see here. Microsoft has never claimed to, never tried to, and has never made any software product that is resistant to hacks.


Slashdot Top Deals

Consultants are mystical people who ask a company for a number and then give it back to them.