Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Isaac Asimov: How Do People Get New Ideas?

mveloso Better reading: ad agency processes (139 comments)

If you want a process for fostering creativity, read something like this:

http://smile.amazon.com/Young-...

Ad agencies have to come up with ideas all the time, and their processes for doing so have worked for over a century. Each agency is different, but all of them have to be creative on demand.

yesterday
top

The Physics of Why Cold Fusion Isn't Real

mveloso Black bile and the humors (345 comments)

When I read this, I remember "the humors" and imagine someone ranting about the lack validity of a competing theory because they can't account of the lack of black bile in the solution.

4 days ago
top

Apple Announces iPad Air 2, iPad mini 3, OS X Yosemite and More

mveloso Yeah, but you're not using your XPS anymore (353 comments)

Dell's equipment service life is 3 years. The difference between your XPS is the Black Macbook is that the guy was still using the macbook for daily tasks. Your XPS is probably on a shelf somewhere.

My late 2009 i7 iMac is unfortunately still going strong, with 16gb of ram and a 4TB fusion drive. It'll last for another few years. I have a mac mini 2009 that's been cranking away in a colo 24x7 for the last 4-5 years with no issues.

You can see the difference between Apple products on eBay every day. I've been trying to pick up a old Mac Pro, and Mac Pros from 2009 are going for $1k+. It's unreal and sort of ridiculous.

Even the prices for iDevices are crazy. Look on glyde.com: the 3GS is still $48, $100+ for a 4s. These phones are ancient. You can't give old cellphones away that aren't iPhones.

about a week ago
top

VeraCrypt Is the New TrueCrypt -- and It's Better

mveloso Wow, that's a lot of iterations (220 comments)

Wow, going from 2000 to 327,661 iterations sounds like a big deal. Does that actually add any value, or is that like doing rot-13 a million times?

about two weeks ago
top

Texas Health Worker Tests Positive For Ebola

mveloso Spanish nurse (421 comments)

She thinks she may have touched her face with a glove. Nobody is really sure. However, if she did that would show that Ebola is way more contagious than the CDC thinks. That implies transdermal transmission.

about two weeks ago
top

Ask Slashdot: How Would You Build a Home Network To Fully Utilize Google Fiber?

mveloso you need some wireless backhaul (279 comments)

What you need to do is get one of these wireless backhaul things and put one at one end of your house, and one on the other.

http://www.microwave-eetimes.c...

Then you've got a 4Gbps backhaul from your fiber point to the rest of your house. Stock up on a bunch of those, and you should be able to exercise your fiber like crazy.

As a bonus, you can cook your dinner by just putting your food in the beam pathway.

about two weeks ago
top

Glut of Postdoc Researchers Stirs Quiet Crisis In Science

mveloso Don't pay them and they'll go away (283 comments)

If they had to pay their own way, the number of PhD students would drop tremendously and all the postdocs would leave to get jobs in the real world. Problem solved!

about two weeks ago
top

Details of iOS and Android Device Encryption

mveloso What about the data? (146 comments)

Encryption is only one part of the announcement. Apple also said that they're not going to sell your data, for the most part. What did google say about that?

about two weeks ago
top

User Error Is the Primary Weak Point In Tor

mveloso Security is too hard (70 comments)

If security is too hard for criminals to use, it's too hard for normal people to use.

about three weeks ago
top

Apple Allegedly Knew of iCloud Brute-Force Vulnerability Since March

mveloso Exploited in real life? (93 comments)

Has anyone actually shown that this was exploited by anyone?

about a month ago
top

Study Links Pacific Coastal Warming To Changing Winds

mveloso But - what's changing the winds? (207 comments)

But - but - what's changing the winds so the coast is warming? Global warming! Duh!

Warming is warming, unless there's no warming. Then it's still warming, but a different kind of warming than the other warming. I mean change.

about a month ago
top

Apple Sells More Than 10 Million New iPhones In First 3 Days

mveloso Billions and billions (206 comments)

Android phones now account for 823 phones out of every phone sold. That's progress!

about 1 month ago
top

Hundreds of Thousands Turn Out For People's Climate March In New York City

mveloso But what about the hiatus? (200 comments)

There hasn't been warming for over a decade, but the warming/change advocates have ignored that because it confounded their model - until a bit ago, when they sized upon the ocean as a heatsink due to another study.

How many billions of dollars have been wasted chasing that chimera?

If they really cared about reducing their carbon footprint, they'd all kill themselves. As a westerner, they have a massive carbon footprint that they'll never erase. At least that way they'd be able to give back by fertilizing a tree or something. Of course, if they choose cremation that'll release even more carbon and waste, since they'll need an urn of some sort.

about 1 month ago
top

Ask Slashdot: Is iOS 8 a Pig?

mveloso it's a you problem (504 comments)

Installed across my devices, it seems fine.

iPad 2, 4, air, iPhone 6, 5.

about a month ago
top

Next Android To Enable Local Encryption By Default Too, Says Google

mveloso Which android version? (126 comments)

Well, it doesn't do any good right now if it's on an android version that nobody uses. What about Pre L versions?

And won't this really be a carrier option? And what about that sharing data part?

about a month ago
top

Court: Car Dealers Can't Stop Tesla From Selling In Massachusetts

mveloso No standing, no case (155 comments)

Interesting tack by the court. Did Tesla try that argument in the other states as well?

about a month ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

mveloso No, they won't. (267 comments)

Have you heard the good news about Big Data? It's, like, the new thing.

about a month ago
top

Researcher Fired At NSF After Government Questions Her Role As 1980s Activist

mveloso Re:Wrong Title (499 comments)

The article says that they asked her about a group affiliated to the two groups with which she associated, and specifically if she ever was part of a terrorist group.

I doubt she had any idea that the third group even existed. Not sure what to think, except her response must not have been to their liking.

Sucks to be her.

about a month and a half ago

Submissions

top

If you could rewrite your application, what would you do differently?

mveloso mveloso writes  |  more than 2 years ago

mveloso (325617) writes "Lots of readers are in development — web, software, etc. After a few iterations everything gets crufty — requirements change, hacks get put into place, the architecture doesn't fit, and real-world performance is terrible.

With the benefit of your current experience, how would you have rewritten your application given what you know today?"
top

Tracking zombies and botnets?

mveloso mveloso writes  |  about 7 years ago

mveloso (325617) writes "Like many people here, I run a couple of servers that do various things. The machines run firewalls as a matter of course, and have large numbers of log entries showing machines that, for one reason or another, are poking and prodding them.

But — besides proactively shutting off access to the machines by blocking their IPs (which may or may not be useful), I was wondering: is there a repository somewhere for tracking infected machines or botnets? Some of the signatures match known vectors used by infected machines, and some don't...but it all may be useful informtion for somebody.

Does anyone know of a blacklist-type service that can use this information?"

Journals

mveloso has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?