Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Malicious actors will not follow rules (Score 2) 176

" In addition, the research doesn't include the possibility of someone maliciously trying to hit an aircraft."

Why are we continuously discussing rules and regulations that will have zero impact on a malicious actor. If it's available to the general population but "regulated" only those bent on malicious actions will break those rules.

I'm all for reasonable rules; "don't fly your drones around an airport; don't discharge a firearm within city limits; drive on the proper side of the road; ..."

Will any of those rules stop someone from attempting to down an aircraft using a drone? Someone attempting to plow through a crowd using their car?

It would seem the things that give us the most freedom, aka liberty, are those things that are most regulated. A drone gives us a huge amount of freedom to do so many different things, including observe authority. It would seem those making the rules have a conflict of interest here...

Submission + - Birth of a black hole caught on camera (

infodragon writes: For the first time the birth of a black hole has been caught on camera. RAPTOR, or RAPid Telescopes for Optical Response, was able to quickly detect the initial changes that prompted a closer look. What resulted was the largest gamma ray burst ever detected and greater than theoretically possible. To say the least, this is a valuable and exciting find that will add to our understanding of the universe!

Submission + - Apple: Don't make nuclear weapons using iTunes ( 4

infodragon writes: Excerpt from EULA Paragraph G: "You also agree that you will not use these products for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of nuclear, missiles, or chemical or biological weapons."

Comment Re:Wayback machine? (Score 1) 480

Its not so grey as one would think.

Unless he was an employee (i.e. work for hire), which I doubt as he states contract; and unless the contract has some extremely strong language as to who owns the copyright then the originating developer has the copyright, the client has a license (This is the default of copyright law.) I have been in the situation of developing code as a contractor, there was lots of legal paperwork involved up front, but nothing stipulated the transfer of copyright to the corporation. This was a fortune 500 company and the code was for the only profitable division of the company for three years. When I wanted the code for another project that had nothing to do with them I stated this clearly when my contract ended. All their best attorneys got involved and I just maintained my right to the code, I did not get any attorneys involved. The end was a very nicely worded contract stating they, the client, would receive unlimited license to the code and a gentleman's agreement I would not compete with them. Fortunately it was a good relationship and I did not need an attorney. In the end their attorneys conceded that there was no way for them to obtain a true copyright unless the original contract started this was the intent, or that I signed it over at the end (which I was unwilling.)

To sum it up, employees are screwed; contractors have the option not to be screwed.

Hope this helps...


Submission + - How do you store sensitive data on your mobile devices?

infodragon writes: I'm just now seriously diving into the mobile world and have many questions surrounding all the devices, apps and options. However, one stands out; How do I protect sensitive data? On Linux this question is easy, I use RAID 1/5/6, depending on need, with LVM in the middle and topped with LUKS. This setup is very powerful and extremely flexible. Is it possible to match the strength of LUKS on Android? iOS? What are the solutions the /. crowd has used?

Comment Re:You're asking the wrong question. (Score 1) 878

I picked up a large base of C code of a guy who would only code when he was drunk. It was the biggest mess I ever saw, except a small part that was commented, "I did this sober because it had to be fixed yesterday..."

In his case mind altering substances helped, but he had no business coding to begin with.

I had the misfortune of meeting one of his team mates who was consulting for the firm to "bring us up to speed." 60's throwback begins to describe him, which explained the other mass of rambling code I had to deal with. You could tell, by the names of functions and variables, when he had the munchies/giggles and it got dark when he was paranoid. Humorous to go through, terrible to maintain. Oh yea, did I mention this software was operating networks of ATMs, as in peoples money?!?

Comment Re:Umm (Score 1) 510

They were on a pretty good UPS system connected to a GFI breaker. The room was climate controlled so unless something very weird happened I don't think electrical or environmental were an issue.

Comment Re:Umm (Score 1) 510

I couldn't agree more... But what's best often meets real world. It was a skunkworks project with no budget. It was amazing we got things working the way we did and the results got the attention it needed and then the resources were allocated.

The server was the old 737(?) pin first gen amd64 bit system. 64 bit Gentoo linux with software raid running the 5 SATA 80GB Seagate HDs. 2Gb of ram for a DB of 150GB of which 80% of the data was accessed on a daily basis... It was CRAZY project put together with the lowest of budget that achieved results good enough to actually get resources allocated rather than "it's good! keep it up!"

Gotta love the reactions on /.

Comment Re:Umm (Score 1) 510

That and the fab process is so precise that a fault is replicated so precisely that after 90 days of 24/7 operation they all failed within 24 hours, 4 failing in 8 hours. So it was engineered bad luck!

Anyway I glad those days of system admin are behind me, I'm with my passion now which is HPC C++ development. Those experiences stuck with me and give me much more respect for the admin of the HW I now use. It's funny and sad to watch their expressions when I talk to them intelligently and with respect. It's like they've never had that happen before.

Comment Re:Umm (Score 3, Interesting) 510

[Sarcasm]Nothing like 20/20 hindsight... If I had done anything like trying to rebuild the array it would have fallen apart... Oh wait... If I had followed what you suggested I would have been SCREWED.[/Sarcasm]

I made a decision based on what on the information on hand.. The rebuild would have take more than a few hours, 80GB disk was SLOW, i.e. first gen SATA. By executing the DB dump I was hitting less than 1/2 the disk capacity on read than 100% disk capacity on a write. It would be significantly faster to retrieve the data than to rebuild. That time window was critical, 2 hours of read vs 4+ hours of write. I also knew I had all the data on hand and all the scripts tested monthly for rebuilding the entire DB on a different server. The decision was easy! Grab the DB data now, redeploy on another system and address the issue on the spot. The system ended up being down 3 hours rather than 24+.

Secondly The failure was abrupt with no SMART messages, I couldn't trust the others to not have the same non-reporting issues. I made a choice on the spot on how to proceed knowing full well I may have signed my own 24h torture warrant. Fortunately I didn't have the worst case happen and I learned a critical lesson.

A bit more information...

+- 30 minutes on each one
First disk failed...
2 hours later second disk failed...
2 hours later third disk failed.
2 hours later 4th disk failed
16 hours later 5th disk failed.

Slashdot Top Deals

I don't want to achieve immortality through my work. I want to achieve immortality through not dying. -- Woody Allen