Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:It's not as simple as "just switch over" (Score 1) 166

And you call the new employees a buncha goddamn whiners because they don't want to learn "old stuff."

They are probably concerned with investing a significant amount of time learning skills that may not be broadly marketable. Sure, it makes you highly marketable to a niche market, but it's continuously shrinking. That might seem risky to someone that probably has another 35 years of their career ahead of them. Being able to quit and move anywhere and find a job has it's advantages.

On the other hand, the work may not be interesting enough at the wages offered. Companies compete for employees with money, time off, and among other things, interesting work. If interesting work wasn't a factor there wouldn't be so many postdocs qualifying for food stamps.

Not sure I agree risk aversion or the desire for fulfilling work qualifies one to be a whiner.

Knowing old stuff makes you valuable.

That highly depends on what stuff you're referring to. I don't see many job ads for 8-track player repair techs, but maybe the handful of them out there are making good money.

IMHO, a more long term solution is, for a company spending millions on a piece of equipment, to have more control over the software. To do otherwise means you're at the mercy of the manufacturer, and sometimes it's not in their interest for customers to keep using the same, perfectly running, old equipment.

Comment Re:Porn (Score 1) 643

The system is rigged against men being men.

So if a subset of men behave in a non-masculine way, are they not "men being men?" Why is "men being men" only defined as being outwardly masculine?

Its not hate my generation is exhibiting, its masculinity.

Social norms change all the time. If you don't follow the norms, don't be surprised when you are ostracized. If you expect others to have thick skin, you need to as well, and not be troubled when "labeled racists, misogynists, homophobes, etc." and accept the consequences for your actions.

we have let the radical feminists decide what social norms are for the rest of us

It seems like you yourself are trying to define your own set of social norms, by deeming non-masculinity in men as undesirable. The very same thing you seem unhappy with "radical feminists" doing. Why do you get to define what being a man means?

The young men of the special snowflake generation are a bunch of pussies

You make the assumption that non-masculinity is not a choice a man would knowingly choose, and only the result of drugs suppressing that aspect. Why is being a "pussy" not a valid choice? Why not let men decide for themselves who they want to be without labeling them "jocks" or "pussies" when they don't conform to our expectations?

Comment Re:Would it really matter? (Score 1) 233

Wouldn't this be an example of selection bias? Pictures of bird deflections wouldn't be informative, unless most deflections resulted with birds leaving a visible smear on the aircraft.

We can't really quantify the probability of a strike vs. a deflection if we don't know the number of deflected birds.

Comment Re:Backups? (Score 1) 159

Which is why it's important to validate backups. The most common story is the proverbial organisation routinely backing up to tape, only to find out the tape was bad when they needed to restore. A random spot check is better than nothing.

An alternative is to setup version control for each file, and if the delta between changes increases by X%, it should send an alert to the user.

Comment Re:You mean (Score 1) 128

If you're a Carrier network or large Enterprise, you have two options- Juniper or Cisco. Nobody else makes hardware that even comes close when you're talking routing and switching.

Cisco has the market in the enterprise, but the service provider space is a bit more competitive, simply because service providers generally don't like to single source major components to their core business. Many are now looking into white box configurations with SDN.

There's no good reason you should even have the device's management interface directly exposed to the public internet.

Many times the management interface of a routing device are not used in leu of a management IP address on a software loopback interface. This is so the device is reachable in the event of a link failure, because the management address is associated with an interface (software) that will never be withdrawn from the routing table. All the management IP needs to be reachable is at least one functioning routed interface.

If you want to be able to remotely manage your equipment, you setup a VPN

I'm not sure I would trust an SSL, or better yet a TLS encrypted tunnel over an SSH connection. The OpenBSD guys tend to be pretty paranoid about security; the OpenSSL community doesn't have the same reputation. Ultimately it comes down to the implementation that is more trusted; for example, I would trust an an OpenBSD based OpenSSH server over a Cisco device for receiving SSH connections directly from the internet.

which will then give access to your internal, privately addressed (i.e. not publicly routable) management network, and access the equipment from the inside

I don't think of private addressing as a strong security measure. Having adequate access controls at administrative boundaries would be more effective and less complex. It's been repeated many times on this forum and others, NAT is not a security feature.

You should ***NEVER*** be able to directly open a connection, either via SSH or any other method, from the 'wild' internet... it's just flat out stupid even if there are no flaws in your equipment.

Multiple layers of security are definitely helpful. It diminishes the effectiveness if the same credentials are used to secure each layer.

Comment Pizza Delivery (Score 1) 216

Seems like there's quite a few people commenting that taxis require special regulation because they are spending more time on the road than a normal person driving for personal reasons. Insurance companies take mileage into account when quoting a rate. How does this differ from delivering food and other products in a personal vehicle?

Comment Re:Ugh, no ex-military, thank you (Score 1) 299

If somebody's fresh out of the military, then they're not even considered.

Not sure if you are aware of this, but veteran status is a protected class in the US. This type of discrimination is not easy to prove though, so I'd be careful what emails you send concerning a candidate's military background.

Comment Re:Locator/Identifier Separation Protocol (LISP) (Score 1) 248

Thanks for replying to my post instead of keeping the non-brilliance of my ideas to yourself. My biggest concern when writing that post was that I was talking to myself. I'll attempt to address your concerns one by one.

No one router has a "full table" of all the routes. The routing protocols and the engineers work to make sure the tables are as close to lean as possible.

Just about all ISPs and backbone carriers carry full tables and many large organisations do as well for multihoming purposes. Global BGP tables are currently around 513,191 routes and this is what facilitated the issues mentioned in the article. One ISP made a mistake and started advertising more specific prefixes for blocks that were already summarized and this pushed the number of global routes beyond the limits of some older hardware. I would suggest reading about the Default Free Zone.

Your offered solution isn't necessary.

LISP is not something that I invented, it's something the IETF is working on to solve a perceived problem.(RFC6830) Some IETF contributors came to the conclusion the Internet routing system was not scaling well with the "explosive growth of new sites" and multihoming that many organisations now do. Problem Statement From all indications, the growth of the Internet does not appear to be slowing down, but accelerating. It seems like a prudent choice to evaluate different ideas as possible solutions to the issue of Internet scalability.

Your bitcoinesque solution for IPv6 allocation would make things worse.

It seemed like a technical solution to avoid the politics of Internet governance. I admit it wasn't well thought out, however I am curious how it would make things worse by allowing a small block of IPv6 addresses to be allocated in a decentralized way and adding cryptographic integrity along the way.

Plus, networks transit other networks all the time, meaning one network can advertise a prefix they don't own, legitimately.

I should have been more specific; I was suggesting originating advertisements would be signed as opposed to transient advertisements.

Routers that speak BGP are on the ISP and backbone level,

Medium to large organisations also use BGP to advertise their address space to their ISP(s).

and are physically secured.

Originating BGP route advertisement signing is not intended to supplant physical security measures.

Your home router doesn't speak BGP, and if it did, your ISP's router would ignore it.

None of this would really be necessary for a home user as their ISP would be doing all of this on their behalf.

To announce rogue routes, one needs to hack into the ISP and backbone peering routers -- which happened recently, but is rare.

To announce rogue routes, one only needs an ISP that doesn't filter incoming BGP advertisements properly. It seems apparent as the Internet grows there will be more and more BGP peerings and as a consequence of that not all of them will be competent or aboveboard with their implementations.

The Resource Public Key Infrastructure (RPKI) is a step in the right direction, however seems to be mainly for preventing mis-configurations from causing outages. Someone with malicious intent need only use AS path prepending to bypass this protection.

Comment Locator/Identifier Separation Protocol (LISP) (Score 1) 248

I noticed no one had mentioned LISP. I don't completely understand it, but I'll add my two cents anyway.

LISP is supposed to help with routing table exaustion and keep the global routing tables lean. It does this with a distributed database to basically map out endpoints and create tunnels around the internet. This is so no one router on the internet needs to have a full table.

In the short term for backwards compatibility, endpoints will be identified with IPv4 or IPv6 addresses, but it seems to work with any unique ID, like a serial number or GPS coordinate.

Locator/Identifier Separation Protocol (LISP)

My additional two cents...
I realize I'm risking any credibility I might have by mentioning anything related to bitcoin, but I think it's an interesting idea worth stating. Although I don't have any interest in using bitcoins as a currency, I think the underlying technology is interesting and could be useful in other applications.

The idea is for organisations to "mine" for their IPv6 allocation. They can then use their "wallet" to sign their BGP advertisements so that their peers can be certain (for various values of certain) they own that prefix. This also has the effect of decentralizing the allocation of resources, and considering the vastness of the address space of IPv6, it would be a waste of time for anyone to attempt to mine all of it and hoard it.

Slashdot Top Deals

If all else fails, lower your standards.