Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re: We really need some laws against false adverti (Score 1) 90

Most online video services will automatically change resoloution and/or compression level based on detected throughput. So simply throttling traffic to/from known video distribution servers should be sufficient.

The goal is almost certainly not to catch every single video. It's to drive down the average usage per user.

Comment Re:Speed or density? (Score 1) 139

Traditionally transistors are made by doping the surface of a silion wafer. The interconnect is then built on top by laying down alternate layers of oxide and either metal or polysilicon. So while you get multiple layers of interconnect you only get one layer of transistors.

"3D" ICs aim to have not just multiple layers of interconnect but also multiple layers of transistors.

Comment Re:is that math correct? (Score 1) 148

Currently IANA has already allocated a number of /16 blocks to the RIRs

Actually they allocated them /12s . There are also some smaller older allocations. So currently less than 6 /12s of global unicast space have been allocated.

Currently IANA has already allocated a number of /16 blocks to the RIRs, and it's up to them to allocate it as they wish. While ARIN has been assigning blocks like birdseed (the way Jon Postel did in the early days of IPv4) downstream in /48s, RIPE and APNIC have been more conservative, and assigning them in /56 blocks.

The standard allocation for an ISP is generally a /32, they then suballocate to customers in smaller chunks (/56 is currently considered best practice as a default allocation for small customers).

The way address exhaustion is likely to occur is not distribution (for obvious reasons) but rather, lending structure to those addresses. While route optimization seems to have been abandoned for now

Mainly because the Internet is NOT a network with a strict and static heirachy, it's a network of private companies involved in constantly shifting relationships.

Like let's say Acme, Inc has 2001:db8:beef:1a00::/56.

If Acme is as big as your next sentances imply they should have no trouble getting at least a /48.

Messy internal routing due to poor initial layout may be a slight issue but I would expect it to be much less of a problem with IPv6 than with IPv4.

The other option would be to subnet even further to /80 or /96, at which point, one is breaking some IPv6 protocols like SLAAC, ND

AIUI the actual neighbour solicitation/advertisement parts of ND are independent of subnet size.

SLAAC is indeed broken by nonstandard subnet sizes but DHCPv6 can be used instead.

Submission + - The timing of error messages contributes to them being ignored (byu.edu)

sandbagger writes: A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly — while people are typing, watching a video, uploading files, etc. — results in up to 90 percent of users disregarding them.

Researchers found these times are less effective because of "dual task interference," a neural limitation where even simple tasks can't be simultaneously performed without significant performance loss. Or, in human terms, multitasking.

Submission + - Kim Dotcom's Mega 3, with Bitcoin: two bad ideas that go worse together (rocknerd.co.uk)

David Gerard writes: "Colourful racing identity" Kim Dotcom has a scheme for his third Mega enterprise: combining MegaUpload with Bitcoin. It is entirely unclear how anything about this makes sense, but I'm sure that with a trustworthy soul with an impeccable track record like Dotcom at the helm, nothing can possibly go badly for anyone involved.

Submission + - Ask Slashdot: Handling Windows Updates after October 2016 (slashdot.org)

An anonymous reader writes: We've read about the changes coming to Windows Update in October 2016. Average Joe and Grandma Flo will end up getting the cumulative update via WU each month which includes non-security updates. For more discerning users with existing Win 7 / 8.1 systems, one can disable WU and download the security-only update each month. But what happens when it's time to wipe and reload the OS? Or what about installing Windows on different hardware? Admittedly, there are useful non-security updates worth having, but plenty to avoid (e.g. telemetry).

How does one handle this challenge? Set up a personal WSUS box before October to sync all desired updates through October 2016? System images can work if you don't change primary hardware, but what if you do?

Or should one just bend the knee to Microsoft, go to the nearest drug store, and stock up on KY?

Submission + - SingularDTV: using Ethereum for DRM on a sci-fi TV show about the Singularity (rocknerd.co.uk)

David Gerard writes: SingularDTV is an exciting new blockchain-based entertainment industry startup. Their plan is to adapt the DRM that made $121.54 for Imogen Heap, make their own completely premined altcoin and use that to somehow sell two million views of a sci-fi TV show about the Singularity. Using CODE, which is explicitly modeled on The DAO ... which spectacularly imploded days after its launch. There's a white paper, but here's an analysis of why these schemes are a terrible idea for musicians.

Submission + - Mobilize to attack climate change just like we did in WWII (newrepublic.com)

mspohr writes: Bill McKibbin has an article in the New Republic which lays out the case for a broad effort to mobilize our resources to fight climate change.
"For years, our leaders chose to ignore the warnings of our best scientists and top military strategists. Global warming, they told us, was beginning a stealth campaign that would lay waste to vast stretches of the planet, uprooting and killing millions of innocent civilians. But instead of paying heed and taking obvious precautions, we chose to strengthen the enemy with our endless combustion; a billion explosions of a billion pistons inside a billion cylinders have fueled a global threat as lethal as the mushroom-shaped nuclear explosions we long feared. Carbon and methane now represent the deadliest enemy of all time, the first force fully capable of harrying, scattering, and impoverishing our entire civilization."
"By most of the ways we measure wars, climate change is the real deal: Carbon and methane are seizing physical territory, sowing havoc and panic, racking up casualties, and even destabilizing governments. "
He includes analysis of just what it would take in terms of industrial mobilization to stop polluting with CO2. The answer is, a lot, but it is possible.

Submission + - Internet Voting Leaves Out a Cornerstone of Democracy: The Secret Ballot

Presto Vivace writes: Maintaining the secrecy of ballots returned via the Internet is “technologically impossible,” according to a new report.

That’s according to a new report from Verified Voting, a group that advocates for transparency and accuracy in elections. ... A cornerstone of democracy, the secret ballot guards against voter coercion. But “because of current technical challenges and the unique challenge of running public elections, it is impossible to maintain the separation of voters’ identities from their votes when Internet voting is used,” concludes the report, which was written in collaboration with the Electronic Privacy Information Center and the anticorruption advocacy group Common Cause.

Comment Re:Get with it cloud providers. And network provid (Score 1) 148

insanity like the Cogent-v-Hurricane split of the IPv6 internet (holy crud... it's SEVEN years now since Hurricane baked Cogent that cake begging them to peer with the world's largest IPv6 network... and it's still broken),

It's irritating that those companies care more about interconnection politics than about serving their customers but I don't think it's that important in the grand scheme of things. Decent hosting providers are usually multihomed and thus reachable from both HE and Cogent.

Submission + - Internet user may get 3-yr in jail for viewing torrent site/blocked URL in India (intoday.in)

An anonymous reader writes: It is official now. The the punishment for rape is actually less and not carried out properly. But, the Indian government about to introduce a new law. The Indian government, with the help of internet service providers, and presumably under directives of court, has banned thousands of websites and URLs in the last five odd years. But until now if you somehow visited these "blocked URLs" all was fine. However, now if you try to visit such URLs and view the information, you may get three-year jail sentence as well as invite a fine of Rs 3 lakhs (USD 4468.398). Some users think that this is all fault of Bollywood/Hollywood movie studios. They are abusing power, court and money and setting up the "Cargo Cult State" in India, that has copied the worst aspects of the West.

Slashdot Top Deals

How many surrealists does it take to screw in a lightbulb? One to hold the giraffe and one to fill the bathtub with brightly colored power tools.

Working...