Beta

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common?

DeathByLlama Retro reference incoming (338 comments)

Mechanic: Somebody set up us the firewall. Operator: Main firewall turn off. CATS: All your [data]base are belong to us. CATS: You have no chance to survive make your time.

6 hours ago
top

Netflix Reduces Physical-Disc Processing, Keeps Prices the Same

DeathByLlama Reducing prices (353 comments)

Give... you... money?? Why would they do a silly thing like that when they could just.... keep it?

about two weeks ago
top

Genetically Modifying an Entire Ecosystem

DeathByLlama To add to: Summary is terrible (52 comments)

Actually, the paper that this summary is referencing goes the opposite direction and talks about the 1) numerous studies that have already been performed to evaluate safety and 2) outline numerous more that will need to happen.

Fourth, our current knowledge of the risk management (5,11,36,37,95) and containment (35,38) issues associated with gene drives is largely due to the efforts of researchers focused on mosquito-borne illnesses. Frameworks for evaluating ecological consequences are similarly focused on mosquitoes (39) and the few other organisms for which alternative genetic biocontrol methods have been considered (96). While these examples provide an invaluable starting point for investigations of RNA-guided gene drives targeting other organisms, studies examining the particular drive, population, and associated ecosystem in question will be needed.

Go ahead and check out the references (and the rest of the paper) if you're genuinely interested in this topic. This is not mad science, nor is it Pandora's Box.

about two weeks ago
top

Police Recording Confirms NYPD Flew At a Drone and Never Feared Crashing

DeathByLlama Incoming South Park Reference (310 comments)

/// Drone hovers lazily next to the river ///
NYPD: It's coming right for us! *BANG BANG BANG*

Every drone is an imminent threat.

about three weeks ago
top

Following EU Ruling, BBC Article Excluded From Google Searches

DeathByLlama Back to spending hours at the library... (239 comments)

Journalist: // Sits at the library sorting through articles, looking for that 2007 piece on O'Neal //
Journalist: Dang, I wish there was a better way of doing this
Google: I can help you!
EU: No. You can't. Journalist, I'm afraid you're going to have to do this by hand if you want the data.
Journalist: But the data is still there... can't Google just help me sift through it?
EU: No. Go home. There's nothing to see here.
EU: // Thinks about removing the data all together. Stupid libraries, always archiving news... We should just write our own history. //

about a month ago
top

Estimate: Academic Labs 11 Times More Dangerous Than Industrial Counterparts

DeathByLlama Academic Labs != Industry (153 comments)

The whole idea behind safety is that you follow certain rules. These simply *cannot* exist in academia the same way that they can in industry.

In academia, you're trying new things every day, often using protocols that you've made up, or have never used before at the very least. This is just the nature of the beast.

In industry you're generally making a well-defined product. You already know how to produce it, or your project would be in academia. If you already know what you're doing and have Standard Operating Procedures already in place, then OF COURSE you're going to make less mistakes!

about 5 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

DeathByLlama Same here (572 comments)

Yep, mine does the same thing. Always unnerving to know that others have access to -- what should be -- encrypted data / passwords.

about 5 months ago
top

Encrypted PIN Data Taken In Target Breach

DeathByLlama Re:sigh, lamestream press strikes again (213 comments)

I'm guessing they meant that the key necessary to decrypt the data was never on the systems which *stored* the data, but that's just a guess (since as you pointed out, if they used 3DES, the encryption key IS the decryption key, and I doubt they lied about that).

about 7 months ago
top

Software Lets Scientists Assemble DNA

DeathByLlama Entirely Overstated Article (149 comments)

The technology to synthesize DNA has existed for decades, but is limited in the length of DNA pieces that it can produce. Companies like genescript (mentioned in the article) can put the pieces together for you, but there's even a limit to how much they can put together for you. Plus they've been around for many years now. So first off, this is nothing new.

Second, the program that's reference here isn't really that amazing. There are scores of tools that exist for copying and pasting DNA sequences. Back in the day I used to do it in notepad (and still do from time to time). The fact that they let you essentially "edit the text of your essay" and that it integrates databases of "essays" is cool, but there have been lots of tools like this in the past, (I use them all the time).

I guess what I'm saying is this: there's nothing new here, and even if it was... all you're getting in the mail is DNA -- not the organism. As others have stated, it's an entirely different thing. DNA is completely benign and is just a dry powder at the bottom of a vial. You could eat the suff, no matter the sequence.

about a year and a half ago
top

Monsanto Takes Home $23m From Small Farmers According To Report

DeathByLlama Re:Monsanto takes .. (419 comments)

Perhaps Monsanto isn't as bad as they're portrayed here...

That said, I believe the farmer who sold his seeds to the grain elevator was in the wrong, not the farmer (who didn't even know better) who purchased the seeds. This is similar to the file sharer being in the wrong, as opposed to the pirate.

When farmers use Monsanto seeds, they have to realize that they can't redistribute those seeds (or seeds made from those seeds). If this were legal, then Monsanto could be cut out of the picture after the first sale. Farmers could just go to "special" grain elevators who were known to have Monsanto seed progeny and pick up some good cheap stuff. In this case, Monsanto would never be able to recoup the time and billions of dollars spent developing those seeds. It's important to therefore realize that farmers who use Monsanto seeds forfeit their right to distribute seeds to grain elevators; this is their choice.

Farmers choose to use Monsanto seeds. If they still want to distribute seeds to grain elevators, then they can't use Monsanto's products. If it's so crucial that they use Monsanto products, then all hail Monsanto for saving the grain market -- it would have failed (or at least done more poorly) otherwise. And if Monsanto is price gouging, then competitors should have no problem creating alternative products and undercutting them... but they can't because of the aforementioned time and billions spent (which Monsanto needs to recoup or they can't make these "crucial" products).

Although it's easy to paint a David and Goliath portrait here and shed tears for the poor farmers getting sued by a big corporation, right and wrong aren't so black and white here. There's a reason why the laws (made by the people) are defending Monsanto's products here. It's simply not an easy case.

about a year and a half ago
top

Widespread Compromise Of Yahoo-Backed Email In New Zealand

DeathByLlama Re:Related to huge spike of spam? (47 comments)

I think it's much more likely that this problem exists for more than just New Zealand's yahoo servers. A couple years back I deleted my rarely-used Yahoo account because I got a hacked email sent to my common email address from it (as did others in my address book). I hadn't been logged in for quite some time, and I had a very secure password. Whatever the security flaw was, I really don't think it was at the user end (I consider myself to be pretty adept at computer security), and I didn't want any part of it.

about a year and a half ago
top

Mysterious Planet May Be Cruising For a Bruising

DeathByLlama We keep finding "earth-like" planets... (104 comments)

It's great to keep finding these earth-like planets, but wouldn't it make more sense to first focus our searches on:

1) Star systems of the right elemental makeup where planets could have iron cores
2) Star systems of the right age, where the earth-like planets with iron cores would likely still have a molten core capable of producing a magnetosphere

I think we've all but proven that finding planets of the right size, within the right distance of their star, are perhaps abundant enough (see mars). That's great, and we can postulate that there might be liquid water on them because of this, but what we really need to worry about is their ability to produce a magnetosphere capable of holding in all that good stuff against the sweeping winds produced by their star.

Does anyone have some insight as to how easy or hard it would be to try to identify star systems with these characteristics *before* looking to see if we can find earth-like size/distance planets?

about a year and a half ago

Submissions

top

Ask Slashdot: Which Router Firmware for Bandwidth Management?

DeathByLlama DeathByLlama writes  |  about 4 months ago

DeathByLlama (2813725) writes "Years ago I made the switch from DD-WRT to Tomato firmware for my Linksys router. I lost a couple features, but gained one of the best QoS and bandwidth management systems I have seen on a router to date. Admins can see graphs of current and historical bandwidth usage by IP, set minimum and maximum bandwidth limits by IP range, setup QoS rules, and see and filter graphs and lists of current connections by usage, class or source/destination — all from an elegantly designed GUI. This has allowed me to easily and intelligently allocate and adjust my network's bandwidth; when there is a problem, I can see where it's coming from and create rules around it. I'm currently using the Toastman's VPN Tomato firmware, which has about everything that I would want, except for one key thing: support for ARM-based routers (only Broadcom is supported). I have seen other firmware projects being actively developed in the last few years, so in picking a new 802.11ac router, I need to decide whether Tomato support is a deal-breaker. With solid bandwidth management as a priority, what firmware would you recommend? Stock Asuswrt? Asuswrt-Merlin? OpenWRT? DD-WRT? Tomato? _____?"

Journals

DeathByLlama has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?
or Connect with...

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>