Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Pay the $3.99 (Score 1) 371

To be really really obtuse - only the rightsholders who's work he based his own on (DOSBox) are in a position to say if he is violating their licenses or not - the authors could have collectively licensed the sotware to him and not spoken publicly about it.

I realize that didn't happen.... but for the sake of argument.

Comment Nope. (Score 1) 341

This all depends on how you define egg. Is it the egg that the first "chicken" came out of, or the first egg a "chicken" laid?

I would argue that the egg came first, because at some point, a creature that was genetically different enough to not be considered a chicken laid an egg, and out of that egg came something that we consider a chicken. Therefore, the egg came first - the first egg that a chicken came out of - the first chicken-egg.

Comment Re:Why not just open fs.blocksize to 64-256k? (Score 1) 205

TRIM isn't about blocksize - it's about letting the drive know that a block can be freed up and reset to a fast-writeable state - only the filesystem driver can do that in a meaningful way - the drive can't automatically know on it's own.

You an cleverly hack around with GC and spare blocks and whatnot to keep SOME blocks free and available all the time, but they won't necessarily represent what the filesystem thinks are free - so it's sub-optimal. TRIm isn't an abstraction layer - it's a simple command to effect a simple action that wasn't previously necessary because this limitation simply does not exist on magnetic media - we don't have to erase it before writing to it again.

Comment Re:My experience with SSD & a Mac (Score 1) 205

"Any controller will detect a block of zero's as being unused data and just mark the block as such." - can you cite a source for that? It makes sense, as long as we're talking about full, raw blocks full of zeroes.

And it's still a hack, compared to a simple command like TRIM which simply says "No longer in use - zap away" - it's just something we never had to worry about before, and now we do - there are lots of other clever hacks - but it's still necessary.

Comment Re:OS X has nothing to do with it (Score 1) 205

Care to post your xbench results?

The write performance can and should drop significnatly as soon as you've burned through all the unused blocks - so unless you are really sparse on the disk writes over the last year and haven't hit that point, or the drive was already degraded when you got it (which is still good and damn fast compared to the non-SSD drives) - this sounds suspicious.

Comment Re:Relativity is just a model (Score 1) 279

"We just want to know how the universe behaves; we don't need to calculate anything fancier."

If we had a set of laws that predicted everything we could observe in the universe precisely,then not only would we not need to calculate anyhting fancier, the entire concept of calculating anything fancier would have no meaning, as we would already have the theory of *Everything*

Comment Re:I think I had an astronomy prof that talked abo (Score 1) 279

Right - but the mental model you work with to figure out how much counterbalance and weight you need on a construction crane, or ballistics for firing large rounds from a warship doesn't need to include relativistic effects. You don't need to consider spacetime or einstein when doing these things... newton's model is just fine.

And let's be clear - both are just models. Relativity goes further to model more about cosmology and goes off on a bigger, deeper scale - but it's not the theory of everything, and we know that. It's still just a model.

So fundamentally - you apply the correct model to the correct situation. Neither newton nor einstein have the whole picture, nor could they, nor shoudl they - they just worked with the evidence and observations they were capable of making, and came up with models.

Comment Re:AI DDOS Monitoring (Score 1) 164

40 years? Check your history a bit.....

Also, how would that system work, exactly? 1 million infected machines from all over the world, from hundreds, if not thousands, of networks, suddenly opening a few connections a minute and sending a relatively small amount of traffic at a target host looks just like normal traffic, unless you are on the receiving end and run out of bandwidth HARD.

(but yeah, in the end, some kind of automated alert system and cooperation between ISPs will probably be needed to combat this type of thing if nothing else changes... if only to cut down on the manpower needed right now to track it down. eg: let someone punch in an attack signature and find all requesting hosts globally, then request that they be blocked at their component ISPs, subject to the approval of those ISps, etc.... something like that.

Comment Re:It depends on the scale of your operation (Score 1) 164

Having been on the receiving end of huge, huge attacks - I can say with certainty that, push come to shove, in the end it's about bandwidth.

They'll try resource attacks first - to see if they can take your app down (syn flood, perhaps HTTP app-level attacks....) - but in the end, they just *hammer* you with hundreds of thousands of hosts with useless traffic - like UDP floods (which won't hit any application at all) and syn floods that are dead easy to filter out. It's quite rare to see a well-thought out application level attack these days - though it still happens.

Larger botnets can generate tens of gigabits of traffic.... even highly profitable business can't keep enough bandwidth around to deal with that - which is why you end up with dedicated solutions that work close to the core (eg: You get attacked, you re-route your traffic through them, they sanitize it, and send you back the clean stuff.

Comment Re:Dear China... (Score 1) 164

Sure about that? They were 12 years ago - where on machine could syn-flood a huge machine - but nowadays it's actually really tends or hundreds of thousands of zombied machnes all sending a few requests. Botnets are all the rage, and have been for ages.
Networks these days have proper egress filtering (as well as other filtering - like your cable modem or whatever) and plain old spoofing is harder than it used to be.

Slashdot Top Deals

We will have solar energy as soon as the utility companies solve one technical problem -- how to run a sunbeam through a meter.