Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Measuring virus exposure risk using a CO2 sensor while traveling (isi.edu)

hardaker writes: I wrote up the results from studying graphs of CO2 measurement data during I took a trip from Sacramento, CA, US to London, UK to attend the IETF-115 conference. Since CO2 is considered to be a potential proxy for measuring exposure to airborne viruses, it provided me with a rough guess about how safe (or not) I was at various points of my travel. TL;DR: big conference rooms: good, busses: bad, everything else: in between.

Comment Re:Give us more money to do nothing more... (Score 1) 84

Oh, follow on: the root servers operate at a loss. They currently receive no money for the service they run. [Yes, Verisign receives (a lot of) money for other services they run, but most have no way to fund their production root-server operations and offer the service for the public good]

Comment Re:Give us more money to do nothing more... (Score 1) 84

I actually wrote a blog post about this [1] for apnic earlier this year, after giving a talk about it at DNS-OARC last year. The problem is a pain, as it does generate a bunch of garbage queries that are otherwise useless. Yes, our infrastructure can (and must) handle them, but there is a cost in terms of time, energy, etc.

[1]: https://blog.apnic.net/2020/04...
[2]: https://youtu.be/sh9Bbk_1bMQ?t...

Comment Upper management gets special treatment (Score 1) 181

At my last job, upper management had different password strength requirements because they couldn't handle the normal ones designed to make them use secure passwords. Instead of 8 characters minimum with at least one capital letter, number and special character, they simply got away with 8 characters. Why? Because they complained enough, couldn't remember their passwords, and had the power to exempt themselves.

Comment Blockbuster had video on demand in beta in 2000 (Score 4, Interesting) 385

While working at Enron Broadband Services in 2000, we had partnered with Blockbuster to create a video on demand service, and had all the main/regional CLEC/ILECs as partners to provide last mile connectivity. We were able to stream better than VHS, but slightly worse than DVD quality video over a 1Mbps Internet connection that required you to have a set top box. We had successfully demonstrated the technology in the lab and were going into the first run trials to beta customer homes when Blockbuster pulled the plug. So they could have beat Netflix to the punch by bypassing the DVD rental business entirely and going straight to VOD, but they decided not to. Also, a little known fact is that it was the pro-forma $150 million Enron booked as earning on that VOD project before it ever hit a customer home that brought increased scrutiny to their financials before they ultimately went out of business a year later.

Comment Ask yourself, what would RMS do? (Score 3, Interesting) 224

Ok, he'd chew his hair and wax poetic. We know that already, but what would the poem say?.

I suspect it'd say: I'm sorry, but CSS very much is code. Not in the sense true languages are like C++, Python and PHP are. Ok, I'm not so sure that PHP qualifies. But anyway, the reason that even so piddly not-real-languages are part of the code is that it's nearly impossible to use the real code with the underlying CSS underpinnings that, actually, pin the boxes to the right place on the screen. Go ahead, take some huge news site, remove the CSS from it and see if you can still use it. I bet you can't. It frequently ends up looking like an application that magically put all their widgets rooted at 0,0 in the window. It's useless. Sure, it's all there, but it's useless. Thus, it has to be a rather important part of the "code". It takes both the output of the underlying framework langue and the CSS to make the result usable. Otherwise it's like compiling C-code into assembly, but for the wrong chip.

I'm quite sure this violates the principal of the GPL. I'm not sure about the letter of the law, since IANAL. But it sure smells like a GPLv4 is ripe for the picking.

Comment Re:Obvious (Score 5, Interesting) 134

I would also state that in the vast majority of companies, managers are trained not to take risks. I work for a multibillion dollar company where the most common management decision at the mid-management level is simply to do nothing. By not making a decision, they believe they minimize the risk of making the wrong decision, never mind that doing nothing is rarely the right decision. It also means that most management decisions then come from the very top down, which means there's no innovation from the bottom, nor is there any real quality feedback loop since suggestions for improvement never make it up the chain of command. Of course, we're a health insurance company that wastes our members money on high administrative costs, but as long as we don't lose a substantial amount of members (and won't because the individual members don't decide who their company uses for insurance) we have no reason to change. We simply keep raising our rates. It's a very dirty business, and horribly run.

Comment Re:With a huge exception (Score 2) 268

The OS has nothing to do with it. Firewire ports are DMA, as are Thunderbolt ports if I remember correctly, which means access to the port means direct access to the RAM. That means you can not only read the data, but you can also potentially manipulate it (killing processes, injecting code into already running processes, etc.).

Comment Re:Misleading title (Score 1) 268

EXACTLY! Mod parent up please! This is not exactly new. Snagging encryption keys from hibernation files or RAM dumps is nothing new. And the Truecrypt win32 binary will allow you mount the volume in read only mode if you want to view the contents and have the acquired key. So, this does everything you can already do for free, but with the added benefit of being a $300 product. I guarantee you that law enforcement is going to be the biggest purchaser of this product, even though this capability already exists and has existed without spending a dime.

Slashdot Top Deals

//GO.SYSIN DD *, DOODAH, DOODAH

Working...