Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Sherpas to Clean Up Everest's "Death Zone"

Hugh Pickens writes: "BBC reports that a team of 20 Nepalese Sherpas is planning to clean up 3,000 kg of old tents, ropes, oxygen cylinders, food packaging and camping stoves from Mount Everest and bring the bodies of dead climbers down from the mountain working above 8,000m (26,240ft) — in what's known as the "Death Zone" because of the thin air and treacherous conditions. Seven-times Everest climber Namgyal Sherpa is running the expedition and says this is the first time anyone has cleaned up trash at this altitude, but that it is important to do so to preserve the environment and make the mountain safe. "I'm a climber and I can say frankly that I'm a little bit angry when I climb Mount Everest because of the rubbish," says Namgyal adding that the task will be dangerous, but that his team is experienced enough to cope. "We need to focus on avalanches and the different crevices. If you have the technique and if you have proper experience, it's not so dangerous." The team will also bring back the bodies of three climbers who perished while attempting to climb Everest including American mountain guide and climber Scott Fischer who died on Everest in 1996 in the mountain's worst-ever climbing season. Namgyal says some families have expressed the desire to leave the bodies on Mount Everest, as they feel this is what the climbers would have wanted. however, the expedition project co-ordinator, Chakra Karki, says that Nepalese people do not want the mountain to become a graveyard. "We respect the sentiments of the family of anyone who has died on Everest," says Chakra. "But it is a holy mountain and our government policy is clear — there should be no dead bodies on the mountain."

Submission + - Digital Photocopiers Loaded With Secrets (

skids writes: File this under "no, really?" CBS news catches up with the fact that photocopiers, whether networked or not, tend to have a much longer memory these days. When they eventually get tossed, very few companies bother to scrub them. Coupled with the tendency of older employees to consider hard-copy to be "secure", and your most protected secrets may be shipped directly to information resellers — no hacking required. "The day we visited the New Jersey warehouse, two shipping containers packed with used copiers were headed overseas — loaded with secrets on their way to unknown buyers in Argentina and Singapore."

Comment Get control of your hardware purchases. (Score 1) 349

Commonality of hardware is what your going for, and to try
and use software to make up for it results in more work for you/the admin.

Having a base hardware profile for your "workstations" is important , and if you can have hardware commonality between your workstations, and servers, all the better. Your generic pc's can be whatever...

If your pushing your work stations hard, your on a 2 year (or less) upgrade cycle, so unless you overplan, and building expandability, your gonna be spending an average of 2-5k per upgrade cycle, per machine.

As a straw man (since these are my keystrokes), I would pick a server/ws vendor who had the fewest common SKUs for their machines. My fav so far is introtrend/uniwide. They have this clever little daughterboard that sits ontop of the main board that allows an additional 2 CPU sockets, and an additional 16 dimms to be added. You can run the 4 CPU boxes in a 2 cpu mode, with a little bit of fiddling. The advantage is that you can get a bunch of 2x core 8000 opterons cheep of of ebay, and then as the users wine for more power (a year down the road), swap them out for 4x core, or double them up, placeing 4x CPU in each box. Because this is running one generation behind, your gonna save some coin. You get 2 16x slots, that can fit double wide vid cards, not to shabby.

You stock the same spares for your work station, as your servers. If you have to run win7 , then you can only use 2 physical CPU's, (but all 32 memory slots), or of you install 2007r2 you can hit all 4.

Vid cards are another matter, if you have "performance issues" , then your gonna have to get set to play musical drivers, its a fact of life. You can limit the family and supported chipsets (nvidia) for the ones you buy, but only if you get the backing of the people who hold the purse strings.

If you explain to $ holders, that you can save the cost of 3 or 4 computer purchases over the equipment lifetime, and that the upgrades will be "low cost", just getting additional memory and CPU, vs a whole new machine.

You can also let them know that you can keep one spare motherboard around, and fix your servers, or a workstation.

I happen to have 5 of these boxes (the 940 sockets) at home, and should be setting up a few more as they get retired from datacenters, Photoshop rocks with 60gb of memory.

In one place that followed this plan, these machines are in front line use, after 5 years. They started off as 2x cpu's, went to 4x cpu's, the vid cards got SLIsed, than put into slower boxes as better vid cards came out, and then into the servers.

You can do this with any high end bit of kit, just set standards, and follow them, high end server and workstation boards tend to have a multiyear life, the mid end commodity pc's tend to last a year before they fade away . The Tyan n6650W was out in 2008, and should be around for a few more years.

If you are unable to set standards and follow them, your kinda screwed anyway.

Data Storage

Submission + - The 1 terabyte SSD arrives (

An anonymous reader writes: Over recent years Solid State Drives (SSDs) have moved from luxury to affordable additions to one's PC, but mechanical hard drives are still king when it comes to capacity. That was until the revamped Colossus LT series Solid State Drive came along this week. With up to 1TB, the drive offers offers massive storage capacities of the level normally not seen in SSDs. While 1TB of SSD space hits right at the heart of the traditional hard disk market, it comes at a high price — at around $4000 for the 1TB model, these drives are in the realm of aspirational rather than practical.

Submission + - Colasoft Capsa: the most easy-to-use Network Analy ( 1

Jenny Herben writes: A month later, Capsa 7.1.2 is released . With the redesigned Start Page, it is regarded as the most easy-to-use network analyzer.
“Colasoft Capsa 7.1.2 provides you with enhanced user experience by redesigning the Start Page. And some new features and changes are provided, too. The new Start Page design is intended to give users a clear guide so that users can spend time capturing and monitoring, other than learning how to use the software”, said Roy Luo, CEO of Colasoft. “Some functions are added while some are deleted, it’s our ultimate goal to make Capsa the most easy-to-use network analyzer”.

Comment Re:Going cheep (Score 1) 260

If your just looking for longer run time, you can take a look
into larger battery packs.

If your into doing things cheap, use a surplus APC 3000 chassis in the
manner as i've done at home. 4x 120ah 12v batteries, or for longer run times
8 6v golf cart batteries. Each setup is good to run 15 amps for a while.

So for less than 1k installed , NEXT to the machine room, not in it
(unless you want to pay for cooling things that are fine at 80 deg f)
you have lots of low cost power, just replace the battery every few years.

Test by running the system down to %80, then kicking in a gen set and
charging to %100, then switch over to "normal" power. Monthly.

If you include a 30 amp (continuous) rated gen set per UPS you should be
able to extend your run time. Your gen set should put out the maximum that
your UPS can, and what it takes to charge your batteries, plus about
%35 for overhead, safety and longevity.

A good way to size the UPS is to use the name plate amperage to limit the
machines that connect to it. Its an easy way to convince nontechnical people,
to give you the headroom you want.

Or you can do what I recommend large data centers do, buy used gen sets in bulk,
and have 2N for what you think you should have...

I like going to the ship breakers and getting the 60hz sets (or 50hz
convertible to 60) from them. Depending on the stock levels, you
can get quite a nice price on a few in bulk, then have them refurbished
to Lloyd of London specs (or better), and shipped.

At 2N, who cares if you drop a few a year, you can power your
whole campus during an outage, or peak shave and reduce your
power bill. It might even be cost effective to get more, than to rebuild.

Be careful what you order, and how its done, you could end up with a
bunch of miss matched parts, (no common spares) or the wrong thing,
or to big of a gen set...
when you wanted this

oohh look, my fav , and its ebay...

look its a 6 pack of used gen sets... air start, and natural gas.

or if you can find one of these, (or kludge something like this together)
you can drive your gen set to work.

Comment What have they done (other than lose your data)? (Score 1) 1

You haven't mentioned what your contractor has done to limit your exposure in this case, have they offered free credit monitoring to those affected?

If so, that would make things "a little less wrong": in my eyes.

Here is a situation report that would make such an event "more right" to me

                        time = ungodly early hour of the morning (ie 7am)

ring RING ring

ME: oighewhhnweeruhhhhhhhhuuummmmm....

THEM: Sorry to wake you , we had a break in last night at one of our employees homes while they were away at a movie, and they took all the valuables in the home, including your data.

ME: What have you done about it, what are you doing about it, what are you going to do?

THEM: The data was mounted on an encrypted o/s , and our person still have the encryption key around his neck, so that part is secure, your data was mounted on a software raid0 put across 4 usb drives that were encrypted with a different key (also safe) , not only was the database encrypted, but all non public data (like id numbers, ss numbers) was further encoded/encrypted.

The lowjack on the laptop started reporting once it was removed from the firesafe it was stored in, and our goon squad captured the thief, and he quickly invited his companions over. We have recovered most of the physical equipment, and are continuing to dismember the miscreants to ensure that they are nothing more than teenage hoodlums.

ME: Do I know any of them, are any linked to my company in any way?

THEM: We believe that this was a targeted crime on this house, and its marketable contents, not at your data or your project. They do not know who you, or what your project is.

ME: Anything else?

THEM: We will offer a full 2 years of active credit fraud monitoring to all affected persons, and will reimburse anyone for all reasonable expenses, such as new checks, or fraudulent activity.

ME: Sounds like its all taken care of, I will want a full report by the end of day.

THEM: No problem.

If they hit all the points above, then they go to the "preferred vendor list", because they can handle problems that crop up, and I know my stuff is safe with them. Anything less, and I start taking points away.

If they haven't done diddlily , ill sue them to provide notification and credit monitoring for those affected.


Submission + - Firefox Plugin Liberates Paywalled Court Records (

Timothy B. Lee writes: "If you want to access federal court records, you're often forced to use PACER, a cumbersome, paywalled website run by the federal judiciary. My colleagues and I at Princeton's Center for IT Policy have released a new Firefox extension called RECAP that allows users to automatically upload the documents they download from PACER into a public archive hosted by the Internet Archive. It also saves users money by automatically notifying them if a document they're searching for is available for free from the public archive. Over time, we hope to build a comprehensive, free repository of federal court records that's available to everyone."

Comment Re:WTF? Oh wait, I forgot about magic bit... my ba (Score 1) 4

the savings that you are talking about are so small, compared to the bandwidth we have today,it is beyond silly to look for savings compressing the http header.

If everyone had a 300 baud modem (0.3 kbit/s ), THEN I could see doing something like this, but this is not 1964, the unused bandwidth in our connections is massive compared to the "savings" of such a scheme.

please get a packet sniffer, such as wireshark, or a local HTTP proxy (charles or fiddler) this will allow you to understand the larger picture. once you see how insignificant the HTTP headers are, in the total transmission of data, let alone compared to the size of most broadband pipes out there, it is not even close.

the traffic on the Internet was constructed so that people could read and debug the output using the simplest of tools, and require a little bit of knowledge, and not a bunch of "stuff" between the person trying to figure out what is not working, and the data. Take a look at how microsoft stores email, and how thunderbird does. When the mail spool gets out of sync, guess the one ya can open with a text editor and fix. Guess the one that gives you a "tool" to try and automagicily fix most of the common errors, that sometimes "mostly works".

there is a old school fortune message that should help you out...
    A famous Lisp Hacker noticed an Undergraduate sitting in front of a
    Xerox 1108, trying to edit a complex Klone network via a browser.
    Wanting to help, the Hacker clicked one of the nodes in the network
    with the mouse, and asked "what do you see?" Very earnestly, the
    Undergraduate replied "I see a cursor." The Hacker then quickly
    pressed the boot toggle at the back of the keyboard, while
    simultaneously hitting the Undergraduate over the head with a thick
    Interlisp Manual. The Undergraduate was then Enlightened.
  ( )

until the above koan is understood, lets try something more tangible, how about we see what is happening with some of the traffic. lets assume 160 bytes (payload) per packet , 1 char per byte (for the sake of the non technical people following along), and look at what is happening (space wise).

the http header that you give in your example contains 247 characters,
spanning 2 packets. The second packet follows about 2ms (high average)
after the first, so this saves you 1 packet per request, and 2ms
per http header request, for a grand total of 28ms and 14 packets.

your web page
has 14 http header requests, (results in BYTES ).

Request Count: 1
Bytes Sent: 545
Bytes Received: 10,869
Requests started at: 21:15:48:3700
Responses completed at: 21:15:50:7720
Aggregate Session time: 00:00:02:4020
Sequence (clock) time: 00:00:02.4020000
TCP/IP Connect time: 452ms
        RESPONSE BYTES (by Content-Type)
  ~headers: 328
text/html: 10,541

Request Count: 1
Bytes Sent: 451
Bytes Received: 1,145
Requests started at: 21:15:50:8640
Responses completed at: 21:15:51:1610
Aggregate Session time: 00:00:00:2970
Sequence (clock) time: 00:00:00.2970000
        RESPONSE BYTES (by Content-Type)
~headers: 293
text/css: 852

Request Count: 1
Bytes Sent: 444
Bytes Received: 22,123
Requests started at: 21:15:50:8840
Responses completed at: 21:15:56:2780
Aggregate Session time: 00:00:05:3940
Sequence (clock) time: 00:00:05.3940000
TCP/IP Connect time: 156ms
        RESPONSE BYTES (by Content-Type)
~headers: 297
text/css: 21,826

Request Count: 1
Bytes Sent: 419
Bytes Received: 1,051
Requests started at: 21:15:51:3650
Responses completed at: 21:15:55:7770
Aggregate Session time: 00:00:04:4120
Sequence (clock) time: 00:00:04.4120000
TCP/IP Connect time: 3,136ms
        RESPONSE BYTES (by Content-Type)
  ~headers: 277
image/png: 774

Request Count: 1
Bytes Sent: 449
Bytes Received: 46,634
Requests started at: 21:15:51:6340
Responses completed at: 21:16:09:3600
Aggregate Session time: 00:00:17:7260
Sequence (clock) time: 00:00:17.7260000
        RESPONSE BYTES (by Content-Type)
image/gif: 46,355
  ~headers: 279

Request Count: 1
Bytes Sent: 437
Bytes Received: 408

Request Count: 1
Bytes Sent: 453
Bytes Received: 1,178
Requests started at: 21:15:52:3720
Responses completed at: 21:15:59:6340
Aggregate Session time: 00:00:07:2620
Sequence (clock) time: 00:00:07.2620000
TCP/IP Connect time: 3,105ms
        RESPONSE BYTES (by Content-Type)
image/gif: 901
  ~headers: 277

Request Count: 1
Bytes Sent: 457
Bytes Received: 621
Requests started at: 21:15:51:1710
Responses completed at: 21:15:51:3510
Aggregate Session time: 00:00:00:1800
Sequence (clock) time: 00:00:00.1800000
        RESPONSE BYTES (by Content-Type)
image/gif: 345
  ~headers: 276

Request Count: 1
Bytes Sent: 453
Bytes Received: 1,028
Requests started at: 21:15:51:3610
Responses completed at: 21:15:51:5340
Aggregate Session time: 00:00:00:1730
Sequence (clock) time: 00:00:00.1730000
        RESPONSE BYTES (by Content-Type)

~headers: 293
text/css: 735

Request Count: 1
Bytes Sent: 448
Bytes Received: 341
Requests started at: 21:15:56:3280
Responses completed at: 21:15:56:4350
Aggregate Session time: 00:00:00:1070
Sequence (clock) time: 00:00:00.1070000
        RESPONSE BYTES (by Content-Type)
image/gif: 67
  ~headers: 274

Request Count: 1
Bytes Sent: 446
Bytes Received: 320
Requests started at: 21:15:56:4080
Responses completed at: 21:15:57:4970
Aggregate Session time: 00:00:01:0890
Sequence (clock) time: 00:00:01.0890000
TCP/IP Connect time: 109ms
        RESPONSE BYTES (by Content-Type)
image/gif: 45
  ~headers: 275

Request Count: 1
Bytes Sent: 452
Bytes Received: 320
Requests started at: 21:15:56:4160
Responses completed at: 21:15:57:2150
Aggregate Session time: 00:00:00:7990
Sequence (clock) time: 00:00:00.7990000
TCP/IP Connect time: 110ms
        RESPONSE BYTES (by Content-Type)
image/gif: 45
  ~headers: 275

Request Count: 1
Bytes Sent: 448
Bytes Received: 883
Requests started at: 21:15:56:4450
Responses completed at: 21:15:56:6310
Aggregate Session time: 00:00:00:1860
Sequence (clock) time: 00:00:00.1860000
        RESPONSE BYTES (by Content-Type)
image/gif: 607
  ~headers: 276

Request Count: 1
Bytes Sent: 449
Bytes Received: 1,280
Requests started at: 21:15:56:6410
Responses completed at: 21:15:56:8880
Aggregate Session time: 00:00:00:2470
Sequence (clock) time: 00:00:00.2470000
        RESPONSE BYTES (by Content-Type)
image/gif: 1,003
  ~headers: 277

Request Count: 1
Bytes Sent: 449
Bytes Received: 1,246
Requests started at: 21:15:56:8980
Responses completed at: 21:16:00:2590
Aggregate Session time: 00:00:03:3610
Sequence (clock) time: 00:00:03.3610000
        RESPONSE BYTES (by Content-Type)
image/gif: 970
  ~headers: 276

the only thing (from your web sever) that gets loaded when people hit a different article is the main page (and new graphics/elements). all the other previously used subsets (css,gifs, etc) get loaded from cache, so for each "new" viewing you only save 1 packet, unless the minimum time has expired (4 hrs) and the browser hits the web server with a header request.

if you run tidy on your HTML, you will save a bunch of space,
even if you run gzip compression...

old 25850 post tidy 25059

old 51688 post tidy 49805

old 28392 post tidy 27595

you get the picture, if you open your .css files, you will notice a HUGE amount of comments that do not need to be transmitted, for example in your themes/fancy/style.css (this is not compressed with gzip), you could chop put the "fancy discription", saving you over 1500 characters, or 9 packets, or 10-20ms. If 20ms is no big deal, nor is %0.01 of my bandwidth, then leave your "fluff" in your content.
This is a great example of the fluff that can be removed.

Theme Name: Fancy
Theme URI:
Description: "Fancy" is a free WordPress theme which really lets your blog stand out from the crowd. Make your blog unique by changing the main blog color (pink, yellow, green), background pattern (available over 20 background variations), banner etc through an options page. In addition you have the ability to choose the color of sidebar blocks (violet, yellow, green). Tech folks might find interesting that we built this theme based on css framework "Blueprint". Valid CSS & HTML. Designed by a href= h tp: AZ Money a Web Design.
(blah blah blah, you get the point)

Slashdot Top Deals

Every nonzero finite dimensional inner product space has an orthonormal basis. It makes sense, when you don't think about it.