×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Ask Slashdot: How Many (Electronics) Gates Is That Software Algorithm?

neutrino38 Break down your algorithm (365 comments)

Hello,

It is probable that you can break down your algorithm -(I do not mean code) into a pipeline of elementary processing and find implementations (IP) for each of them.

to give out an estimate:
- subdivise your algorithm into simpler pieces
- find for each simple piece how it can or could be implemented in hardware and the complexity of each piece.
- do the sum.

  Indeed an hardware designer or consultant would be of a great help here.

about a year ago
top

Break Microsoft Up

neutrino38 The press knows how to run Microsoft ... good ! (355 comments)

Hey its AMAZING to see so many people in the tech press that know exactly how to run microsoft. I thought that CEO of this kind of giant company were pretty difficult to find. Its a relief to see that there are plenty of candidate for the position ...

Seriously, in a perfect world, I would force such people to open a successfull bakery before being granted the right to send 'advises' to entrepreneurs or company bosses.

about a year ago
top

QUIC: Google's New Secure UDP-Based Protocol

neutrino38 Fed up with google "standards" (97 comments)

Here we are again.

After VP8, protocol buffer, Google is a it again providing some free replacement of some existing standard (DTLS here http://www.rfc-editor.org/rfc/rfc4347.txt)

But of course, Google's people know better and have more money. And the list can go on. Dart as a replacement of javascript. Protocol buffer as replacement of ASN.1, SPDY to replace HTTP. With Jingle google tried to replace SIP protocol as well but at least the extended an existing standard but they dropped the support when stopping Google talk. For couse everyting is free, open source and Not Evil. So why bother?

Well as an aging network engineer, I am starting to be fed up with such "innovations". More consensus building would be refreshing.

about a year ago
top

France Demands Skype Register As a Telco

neutrino38 Re: Short sighted not to regulate (209 comments)

French telecommunication regulator is right to try to impose operator burdends on Skype.

1/ More and more people are adopting this service a primary phone service because of SkypeIn and SkypeOut feature. This means that there will be more and more case where user will need to make emergency calls. This lack of emergency call support is a shame. So the post above is ... very shortsighted. One day you may need it yourseff.

2/ VOIP Technology / Skype are more and more displacing regular phones. They play the same role so they need somehow to be regulated in the same manner. There is in France a declarative licence for small telcos, the so called "L33-1". I know a couple of medium sized company operating VoIP service that applied to this without any problem. So it is not like it is unbearable for companies like Microsoft.

3/ I am so amazed by comment like: Skype should cut skype in/out, or avoid physical presence in France (replace by country xxx if you want) to avoid any form of regulation.

Damn ! these regulations are non discriminatory and made for the common good. Its like on the road, if you have no rules, you end up with a dysfunctional traffic. I see in all these comment some kind of selfish, short sighted spirit, 'I want the lowest cost regardless the consequences" that is a worrying trend.

Just because someone sees the work "governement", "regulation" they jump to the roof, say its bad, andy freedom and they try to avoid it without even pondering the consequences or the actual need for regulation. I see this ultimately as some kind of subtul selfishness.

As much as I agree that freedom and freedom to innovate should be preserved and fostered, it should not be a the cost of forgetting the notion of common good.

about a year and a half ago
top

Firefox and Chrome Can Talk To Each Other

neutrino38 Re:Finally (121 comments)

yeah an just an API so ... imagine a socket API that does not allow you to connect to a server because the underlying protocols are not yet compatible. THAT would be useful.

Don't get me wrong: webrtc is a good thing (well would be better if they chose H.264 for interoperating with the rest of the world) but networking and protocols are now getting over 30 years old and its time that when an standard API is proposed, the interop work is done before so application developpers can really thrive doing their business. Not debugging details of DTS-TLS or STUN / ICE obscure stuff.

about 2 years ago
top

Firefox and Chrome Can Talk To Each Other

neutrino38 Finally (121 comments)

HTML5 is supposed to be a standard, no? Interoperbility is long overdue. That should have been done in the first place.

about 2 years ago
top

Profile of a Real-Life Jedi Academy

neutrino38 Re:Clone Ware = some Buddism rip off (128 comments)

Hello,

Indeed but what I find hugely amusing is how much clone war episod are inspired by meditation / buddhist precepts (e.g. Padme = passion) It's almost a rip off. So all this Jedi stuff might lead some people to study serious stuff for greater good.

For those who are interested, the notion of "Force" is probably a rip off of Irina Rockwell and Chögyam Trungpa about Shambala:

http://nalandabodhi.webpossystem.com/ViewProduct.asp?ModelNumber=199

more than 2 years ago
top

French Power Company Fined For Hacking Greenpeace

neutrino38 Re:At least the French didn't murder anyone this t (196 comments)

Bla bla bla ... the French ... bla bla Slashdot ... bla bla surrender ... bla bla bla unrelated. Pffff

The fact is that two execs from a powerful public utility got jail sentence. So it is not "unlike the rainbow warrior case" but it is rather very good sign on how justice worked in France for this particular cases regardless of the past and despite the fact the French govt would have more interest in supporting nuclear business.

about 3 years ago
top

French Power Company Fined For Hacking Greenpeace

neutrino38 Re:Um, OK. (196 comments)

Dude,

Some exec got jailed.

about 3 years ago
top

If the FCC Had Regulated the Internet From the Start

neutrino38 Re:Minitel again (191 comments)

Ah ah!

  this alternative history of the Internet is sooooo american that it becomes exotic. I especially like the idea that the FCC would mandate the French minitel to fix bob. Eh eh ! Microsoft protocol fixed by a French (socialist) govenment mandated cheese carrying protocol. Bob must be VERY BAD.

Joke aside, although it is a good thing that Minitel has been superseeded by the Internet in France, it WAS a success and brought millions of people online way before the Internet was widespread. It also enabled a generation of French telecommunication engineer to have a market outside the telecommunication adminsitration (France Telecom was still public at that time). I do not share at all the view of some of my compatriotes that it slew down the rollout of Internet in France.

Finally, it haf this kiosk feature that would enable users to be charged of service usage on their phone bill without hassle. Apple store and iTune replicate this in a much shinier and user friendly way but which one is more 'neutral'? A market operated by a single company or by a public administration?

The answer would probably different on both sides of the atlantic.

more than 3 years ago
top

Online Forum Speeding Boast Leads To Conviction

neutrino38 Re:Similar case in France (457 comments)

Here, we had a guy who mounted a camera on his motorbike and recorded his feats. He got controlled by the policeman and the had the good idea to size the device and review the recorded video.

[fr] http://www.lejdd.fr/Societe/Faits-divers/Actualite/Un-motard-filme-ses-infractions-205788/

The found 65 counts of infraction to road regulations including a HUGE speed excess and the guy had the "good" idea to record the speed indicator to prove it to his friends. Bad idea. The material was not posted on the Internet rather extracted directly from the camera. I was very difficult to deny it did not happen in real life in this case.

more than 4 years ago
top

Online Forum Speeding Boast Leads To Conviction

neutrino38 Re:Similar case in France (457 comments)

Here, we had a guy who mounted a camera on his motorbike and recorded his feats. He got controlled by the policeman and the had the good idea to size the device and review the recorded video.

[fr] http://www.lejdd.fr/Societe/Faits-divers/Actualite/Un-motard-filme-ses-infractions-205788/

The found 65 counts of infraction to road regulations including a HUGE speed excess and the guy had the "good" idea to record the speed indicator to prove it to his friends. Bad idea. The material was not posted on the Internet rather extracted directly from the camera. I was very difficult to deny it did not happen in real life in this case.

more than 4 years ago
top

Online Forum Speeding Boast Leads To Conviction

neutrino38 Re:Similar case in France (457 comments)

Here we had a guy on a motorbike that mounted a camera and recorded his feats.

[fr] http://www.lejdd.fr/Societe/Faits-divers/Actualite/Un-motard-filme-ses-infractions-205788/

The policemen had the good idea to seize the device and review the recorded video and just found 65 counts of infraction to the road regulations.
One of them was a HUGE speed excess and the guy even recorded the speed indicator just to "prove" it to his friends. Bad idea ...
Of course the difference is that this material was not posted on the Internet. The video was directly extracted from the camera mounted on the bike. So the driver could not really deny that it did not happen in real life.

more than 4 years ago
top

All GSM Phones Open To Attack, Tracking

neutrino38 Re:No details on the attack (119 comments)

All this article is pretty unclear about the attack method described.

All it says is that they supposedly find ways to tap in APIs that associate GSM phone numbers with names. I am not sure that such API are standardized.

Then they say that IF you have direct access to SS7 network and you are able to query the HLR, you are able to track down people (because you are able to get the attachement MSC and possibily the Cell ID using the MAP protocol).

This IF is a big IF. They did not demonstre haw you may break in to the SS7 network from outside of it.

Guys, you have to understand that SS7 network are not exactly working like a IP network. Most of the time, routing is statick and a peer to peer trust relationship must be established between your host and the network before you can eventhing of querying an HLR like this. So this "attack" supposes that the attacked network would basically allow you in.

Unless, they come up with something very new, this is pretty weak. The attack on GSM encryption for conversation was much more significant.

more than 4 years ago
top

Chinese ISP Hijacks the Internet (Again)

neutrino38 Re:go back to old school principles (171 comments)

IP V6 everywhere
static herarchical routing everywhere based on geographical IP addresses prefixex.
like in the old telecom way.

more than 4 years ago
top

Microsoft Previews IE9 — HTML5, SVG, Fast JS

neutrino38 Re:H.264 -- use codecs embedded in OS (473 comments)

Hello,

I wonder why using H.264 is such a big fuss in Opera and Firefox.

- modern operating systems have embedded H.264 codecs in it (through Direct Show API on Windows and through Quicktime on Mackintosh).
- more and more video GPU are embedding an H.264 decoder nowadays.

So apart from the "philosofic" approach, one could take advantage of these available H.264 decoders to perform video playback and decoding without having to pay any fee or breaking any licence. What remains to be agreed upon in the container file format. MP4 / 3GPP are covered by patents. I can support MPEG-LA for licencing codecs but I never understood anybody patenting a file format. Where is the innovation in a file format?

I my view, everybody should have H.264 as baseline for video (this does not exclude the support for Theora) and agree on a patent free file format or at least advocate the gvt to have these format freed from their patents.

more than 4 years ago
top

Google Proposes DNS Extension

neutrino38 Re:Google is already offering a free DNS service (271 comments)

So all this can be seen as a new way to "organise the Internet information" according to them.

In other word inviding again your privacy silently.

If this was to be implemented, one could associate the IP sub network with a web site names without any need to use a search engine. Great for profiling. If performance was the issue, a better set of regional DNS caches would be more relevant here.

I cannot help but suspect some hidden motives here.

more than 4 years ago
top

Universal Phone Charger Approved By UN Body

neutrino38 Re: SIP? a single RFC? LOL! (220 comments)

Hahahahaha !

SIP a single RFC? Can you imagine the number of SIP related RFCs and associated drafts? SIP WAS simple, it is now a mess. Even if we restrict to RFC 3261, if you can asnwer the following questions you are already a MASTER in SIP:

- what is the difference between request URI and the "To" header? Are they redundant?
- what is the difference between the "Contact" header, the "P-Asserted-Identity" header and the "From" header?
- what is the loose routign mechanism and what is the relationship with the "Via" headers?
- what is the need for "from tags" and 'to tags".

If we go a bit further:

- Why is SIP/SIMPLE do we need to introduce an "etag" and why not resuing the callid ?
- etc.

We are a company that is based on SIP and very in favor of this protocol mostly form market reasons but one should not be blind: this protocol has its problems like any other. At the beginning, it was sooo "simple" that it could not even support "announced transfer" or line supervision which is a must for corporate telephony then the real people jumped in and added what it takes to make it usable and added complexity.

Even the big telco that are hated so much in this forum jumped in and created the IMS standards based on SIP (under the ETSI Umbrella = European ...). They took it to the next level of complexity but they NEEDED IT because they are the guys who enable you and me to call from A to B without even thinking about how this is done (since more that 100 years).

If you imagine one second that you can only read ONE RFC to start working on the real SIP world, you are VERY WRONG (see RFC 3581, RFC2327, RFC 3264, RFC 3550 + all the RFC dedicated to packetization, SIP/SIMPLE, MESSAGING, ....)

Now if you compare SIP with H.323, I agree that initially, one can see a lot of advantages.
- H323 has a stupid protocol layering
- slow dialog establishment, etc?
and although they have improved this, this is still not perfect but they have advandages as well:

- camera control and double video streams are a reality in H.323 world wher in SIP it is still on paper only and badly documented.
- screen and application sharing are a reality on H.323 world. They are non existant in SIP
- H.323 has defined a clean standard for NAT traversal where SIP has a set of "best practices" spread in various RFC (keepalive, rport, symetric RTP, etc.).

if you cannot read the ITU standards that is basically because:
- most of them need to be bought
- they have a strong culture of separating the function and the encoding, which renders them difficult to grasp for field hackers
- ITU protocols are often based on ASN.1 BER encoding and therefore are compact an binaries and cannot be test with a simple TELNET connection, which seems to trouble a lot of Internet gurus.

Emmanuel
http://www.ives.fr/

more than 5 years ago
top

Is City-Wide Wi-Fi a Dead Idea?

neutrino38 Re: Technology matters (259 comments)

I disagree with the previous posts. In that case, technology matters.

A good city wide network should

- handle proper user density
- have a good coverage
- handle multi-media application such as audio / video over IP
- terminal should have a good battery life and reasonable costs

Please note that

- Wifi is certainly not designed to handle user density unless the number of access point is high. Until 802.11n, all users share the same radio channel in a pseudo random way. No frequency allocation,
- the above characteristics makes current wifi standard unfit for true bidirectionnal application such as video over IP as we do not have a true two way simultaneous communications. Even with 802.n, the number of available frequency is so few that only a few people would really be able to beneficiate the proper quality. This does not match the need of high density areas.
- it is a known fact that Wifi has not been designed with battery life in mind. A lot of wifi equipped terminal makers are struggling with this issue.

When comparing the other potential tehcnologies : 802.20e (Wimax) and 4G / LTE, there is no much choice

- 4G / LTE has the expected characteristics but is so complex that it is out of reach of medium sized organisation.
- only Wimax stand a chance.

Then you have to deal with safty regulation on radio protection.

Yes, technology does matter in that case.

http://www.ives.fr/

more than 5 years ago

Submissions

top

ATOS Healthcare seeks early contract termination in the UK

neutrino38 neutrino38 writes  |  about 9 months ago

neutrino38 (1037806) writes "ATOS Healthcare, subsidiary from the French service company ATOS has won a contract with UK govt in 2010. Atos Healthcare conducts assessments on behalf of the Department for Work and Pensions. Basically it implements David Cameron policy on social services fraud management.

It became so impopular that its employees are routinely insulted and threathened on social networks (about 153 threats a month according to the article). The company is now looking for a way out before the planned end of the contract in 2015.

Therry Breton, its CEO has declared that : "In its current form, the system does not work neither for the beneficiaries, nor for the DWP nor for ATOS Healthcare"."

Link to Original Source
top

Free coding school for geeks ande develoopers founded in Paris and called "42"

neutrino38 neutrino38 writes  |  about a year and a half ago

neutrino38 (1037806) writes "Xavier Niel, founder and CEO of the ISP Free Telecom, well known in France to be an agressive competitor of the big incumbent telcos like Orange, called a press event to explains a new mysterious intiative called "born2code".

It appeared to be the launch of a new computer programming school, based in Paris, codenamed "42" in reference to Douglas Adams books. The cursus is quite revolutonary in regards of the traditional French education system:

- the admission requires no prior background, only to pass the selection tests (and age limit from 18 to 30).
- the selection tests are in two phases: first tests are online. It will preselect 4000 candidates. The second tests need the people to come and be involved in actual intensive programming tasks (15 hrs / day) during one month in a dedicated room called "the pool". Out of this will 1000 student be selected.
- once admitted in the school, no tuition fee will be required nor any future contribution as a professional.
- the school will not deliver any diploma. Mr Niel argues that companies are hiring on skill and experience basis rather than on diploma (note: french HR are badly addicted to Diplomas)

Mr Niel blasted the traditionnal education systems saying it produces "standard engineers" that are not innovative and that existing private schools are too expensive and prevent real talents to emerge by selecting student over money. It also reject traditionnal education in favor of a 2.0 education, peer to peer and project centered education that are in line with today's connected society

The goal of this school is to train 1000 "genius" every year. The proclamed purpose is to help IT companies to find suitable people for innovation, helping in this way the country competitivness.

Mr Niel will be funding the school on its own money during 10 years by putting 50 M euros on the table. Hehopes that other IT companies will take over as he is conviced that "only private initiative" can bring this kind of renewal.

The school is due to open next fall and be equipped with brand new 27 inches iMacs."

Link to Original Source
top

Google investigated for tax evation in France

neutrino38 neutrino38 writes  |  about 2 years ago

neutrino38 (1037806) writes "Google is being investigated in France for tax evasion. Most of the sales in this country are accounted in Google Irish subsidiary through a complex financial setup involving the Netherland and know as the "Dutch sandwitch".

The local IRS considers that most of this revenue is sold though Google employees located in France that issues invoices in French language. Therefore it seeks to requalify the amount of taxes paid by Google up to 169 M euros / years from the 5 M euros actually paid.

Accounting information was seized in Google French premises. Google lawyers tried to invalidate the procedure .. without sucesss.

Looks like France may get a big one time payment but future customer will have to call Irland and receive invoice in English to be served."

Link to Original Source
top

IP location taken seriously by telecom regulators

neutrino38 neutrino38 writes  |  more than 3 years ago

neutrino38 writes "Locating IP calls is becoming an increasingly important subject.

- More and more persons and companies are equiped with VoIP access
Service provider as us may be interested or required to provide video call access to emergency services.

- The transport of location information is already well described and standardized by IETF and the ECRIT commitee and is using XML format (how verbose!) called LO-PIDF. Its handling in SIP protocol is decribed in the following draft: location conveyance.

Finally, telecom authority are starting to take notice and OfCom, the British regulator has produced a fairly comprehensive report about this. Good reading."

Link to Original Source
top

Side By Side assemblies: DLL Hell 2.0

neutrino38 neutrino38 writes  |  more than 5 years ago

neutrino38 (1037806) writes "This is an alert for all developers using Microsoft Visual Studio 2005.

At the beginning of January, Microsoft issued a security fix for Visual Studio 2005 forcing the use of news dynamic libraries (DLLs) by all application compiled with this IDE. Basically, the application compiled with Visual Studio 2005 will not work anymore on ordinary (non dev) PC unless the newer DLL are to be installed. And we found out that happened on fully updated PCs. I posted a detailed article here: http://www.ives.fr/index.php/blog/post/19 for those needing more technical details.

For those who are not familiar with the Microsoft world, native microsoft applications written in C++ rely on dynamic libraries. Two of them are famous or infamous: MSVCRT.DLL and MFCxx.dll. Because of the evolution and other security fix, multiple version of these DLL were often present in the system causing application instability. Where Linux resorted to some simple suffix notation on the dynamic libraries, Microsoft created a new beast in 2001: the Side By Side assemblies http://articles.techrepublic.com.com/5100-10878_11-5032712.html. These are basically DLLs with a comanion XML files that identify them. The XML file contains a digital signature and when the system binds these DLL dynamically to an application, it checks the match and check that the signature of the DLL matches the DLL itself.

When everythings runs well, this is pretty transparent. But when issues arises, it becomes excruciatingly difficult to troubleshoot and fix. DLL hell is not over."

Link to Original Source
top

OpenSER project forked, VoIP world upside down

neutrino38 neutrino38 writes  |  more than 6 years ago

neutrino38 writes "On August 5, OpenSER project was renamed Kamalio and the project board took a technical decision as developpers were deadlocked in disagreement. Right after, a new project called OpenSIPS was created as a fork from OpenSER.

What look like a technical argument between two lead developers could have some serious consequences on many business as former OpenSER was used in commercial environment to manage thousands of VoIP calls. Many of them should face soon the hard decision to choose between the two for continuing their business.

This happened already before an OpenSER was a fork of the SER projet supported by IPTEL company.

To sum up:
  • Original SVN repository contains Kamailio source code and the effort behind it seems to be led by historical contributors and it is ment to remain the free codebase. Will they have the horsepower to make the software evolve?
  • OpenSIPS is supported by the Romanian company Voice System. They 0wn the openser.org domain name that is redirected to OpenSIPS. Their site is leaner and the list of event that they will attend outlining the efforts to add more features more quicky. But will this software remain entirely free?

Caught between two fires, OpenSER's users wonder about future compatibility of the two engines and are seeking for guidance..."

top

SIP client for iPhone proposed by French ISP

neutrino38 neutrino38 writes  |  more than 6 years ago

neutrino38 (1037806) writes "Free, the third largest ISP in France, started offering an [fr] VoIP SIP client for the Apple's iPhone.



It is interesting to know that this ISP provides a SIP account for each broadband subscription and SIP account allows you to call nationwide for free and to be called. In effect, this iPhone add-on enables to use this SIP access if a Wifi network is available.

This is an innovative form of competition as Orange has an exclusive deal with Apple for iPhones in France. This software creates a loophole that causes a loss of revenue for Orange as outgoing calls are charged by Free and the incoming calls fee will not be collected by Orange anymore. However, the installation procedure indicates that the phone must be "jailbreaked". This could have serious legal implications."
top

AMF specifications get public

neutrino38 neutrino38 writes  |  more than 6 years ago

neutrino38 writes "Adobe released the specification of the AMF format. This was the format used by Flash Remoting, the equivalent of AJAX for the Flash world.

The article did not refer to the AMFPHP project and the fact that some German and Canadian guys already reverse engineered the format a long time ago. This disclosure will also remove a long standing legal uncertainty that prevented to use AMFPHP for commercial projects too openly.

Secondly, we need to note that Adobe does not document its RTMP protocol used to contact Flash Media server. This later protocol is more iteresting in terms of possibilities as it provides:
  • Sessionful operation
  • Media streaming
  • Remote procedure call both client side and server side using AMF format
  • Shared objects between several sessions and server side events


Fortunately, this protocol has partially been reverse engineered by people of the red5 project. I would suggest that the W3C should take a look at the whole Flash ecosystem if they think about upgrading the HTTP protocol."

Link to Original Source
top

Unlocked iPhone available for sales in France!

neutrino38 neutrino38 writes  |  more than 7 years ago

neutrino38 writes "Orange and Apple did not close any deal yet for reselling the iPhone in France. It is unlikely that the device will hit the sheves for Chrismas.

Oh wait! Le Monde newspaper reports that some supermarkets have [fr] imported a stock of unlocked iPhones and are reselling them without any deal with Apple. Neat. Except the price of 999 euros which is outragious."

Link to Original Source
top

Ex HP over hyped CEO hired by Fox News

neutrino38 neutrino38 writes  |  more than 7 years ago

neutrino38 (1037806) writes "The International Herald Tribune reports that Fox News hired Carly Fiorina ex HP CEO. Such an interesting move will certainly bring support to those who viewed her as the over hyped CEO who killed the orginal corporate engineering culture know as the HP way.

The article, off course does not elaborate on this aspect of things. Slashdot has previously reported her demise from HP and some comments mentioned some HP employee dancing in the cubicle then.

Carly on Faux News? Must be slashdotted!"

Link to Original Source
top

France rejects OOXML but proposes convergence

neutrino38 neutrino38 writes  |  more than 7 years ago

neutrino38 writes "Following internal meetings, the French national standardization organisation AFNOR rejected OOXML standard [fr] as member of the relevant ISO comitee.

The decision was mainly based on the fact that an equivalent standard ODF is already approved. However, in a detailed comment, the organisation proposes to work on a convergence path:

OOXML would be split into two parts, the core would be a simplified version that would be rendered ISO compliant on date format metric system adoption, by adoptiong other existing relevant XML DTD already in force and by excluding the proprietary VML vector graphic description.

Then, ODF would be revised to converge with this Core-OOXML. Finally, compatibility with existing Microsoft documents would be described in a Extended OOXML which would not be mandatory as a standard."

Link to Original Source

Journals

top

Bouddhisme engagé et actions justes - partie 1 - pourquoi agir ?

neutrino38 neutrino38 writes  |  about 6 months ago

Préambule : tout ce qui suit ne peut pas Ãtre considéré comme enseignement. Il s'agit simplement de réflexions personelles sur la vie en générale et sur ma compréhension limitée du Dharma. Je suis un simple pratiquant et je m'excuse par avance des erreurs et imprécisions qui pourraient figurer dans ce texte.

La Voie (le Dharma) nous propose un chemin pour faire cesser la souffrance. C'est la quatriÃme noble vérité. Il s'agit d'apprendre à ne plus Ãtre atteint par la souffrance par un entraînement de l'esprit essentiellement basé sur la méditation. Une des caractéristique de la méditation et le "lÃcher prise" et le "non-agir" qui permet d'acquérir un calme intérieur et une lucidité mais aussi d'échapper progressivement à la loi des causes et conséquences (karma).

A force d'entrainement, la réalisation permet aux Bouddhas de se libérer de la vie ordinaire (samsara). Logiquement, un Ãtre réalisé serait incapable d'action, totalement transparent et heureux car la moindre de ses actions le re-lierait inévitablement au samsara et ses conséquences. On pourrait donc croire que la Voie nous enjoint à nous détacher du monde. Il n'en est rien car on tomberait alors dans l'indifférence qui l'un des trois poisons, causes de la souffrance.

Comment comprendre alors les mots d'action éveillée (ou juste), accomplies et bouddhisme engagé ?

La premiÃre observation est que le chemin de certains pratiquants consiste à s'en tenir exclusivement à l'entrainement par la méditation dans un cercle de pratique (sangha), de débarasser leur vie du superflu et de se tenir à l'écart des tentations. C'est le chemin proposé par la Voie des Anciens (Theravada). Cela conduit parfois à ce qu'un grand cercle de laÃques soutiennent matériellement financiÃrement, avec beaucoup de dévotion et de révérence, un sangha de moines qui, dégagés des obligations matérielles, cherchent par la pratique la réalisation à l'écart du monde. C'est la pratique ou la vie ordinaire mais pas les deux.

Ce chemin-là nous livre deux enseignements trÃs précieux :

  1. il faut commencer par faire le ménage chez soi avant toute chose. Vouloir sauver le monde en n'étant pas bien dans ses baskets est illusoire. Si l'on est en grande souffrance soit-mÃme, on doit d'abord s'occuper de soi. Sinon, on risque de "contaminer" ses propres actions à cause d'une vue faussée par notre propre souffrance.
  2. Au moment de mourir, on perd tout. Il faut savoir se dépouiller de ses biens et ses réussites avant de souffrir de leur attachement. Quelque que soit la noblesse et/ou la réussite dans nos actions, il nous faudra laisser cela derrirÃre nous.

Pourquoi agir alors ? Comment agir ?

Certains pratiquants ne se satisfont pas de cette démarche de réalisation centrée sur une Sangha. Cela choque notre sens de la justice et du bien commun. Pour ceux là (dont je fais partie), une pratique spirituelle ne peut Ãtre séparée de l'amélioration de la société. La Voie du Grand Véhicule (Mahayana) propose précisément de qu'une fois avoir acquis une certaine stabilité soi-mÃme, on commence à s'occuper des autre avec le but de soulager puis de supprimer la souffrance pour tous les vivants. Objectif immense à tel point qu'un de mes enseignants l'appelle Le Véhicule Démesuré.

Ce chemin nous propose une nouvelle figure : le boddhisatva. Si nous comparons la vie ordinaire à un labyrinthe, un Bouddha est un Ãtre qui a trouvé l'unique sortie. Il qui se tient au seuil et transmets ses instructions à ceux qui lui sont proches (ses disciples). Eux-mÃme
transmettent à leur tour aux gens un peu plus loin. Le bouddha ne peut bouger et sa mort est sa sortie définitive de labyrinthe.

Le bodhisattva est au seuil de la réalisation mais il garde un pied dans la vie ordinaire. Dans le labyrinthe, le bodhisattva a également trouvé la sortie mais il replonger volontairement pour guider des personnes plus loin en leur tenant la main ... quitte à se perdre à nouveau.. Il déploie son activité dite "éveillée" à l'intention de tous. Mieux il fait de l'action vers les autres son propre chemin d'éveil.

Pourquoi agit-il ? Car il a vaincu les voiles de l'indifférence et que sa clarté de vue va lui permettre de voir oà sont les vrais nécessités mais également d'évaluer instinctivement les conséquences des actions.

TrÃs trÃs inspirant! Je suis inspiré en tout cas et me considÃre comme aspirant bodhisattva. Le mot bouddhiste engagé est pour moi la traduction correcte d'aspirant boddhisattva. Quoi de plus inspirant que de voir Thich Nhat Anh faire la navette entre les vietnamien est les franÃais pendant la guerre du Vietnam ou l'actuel Dalai Lama - qui se dit simple moine refuser la violence et demander l'autonomie du Tibet. Mais plus encore, le fait de savoir qu'il existe un moyen d'agir à la fois pour son bien et celui des autres, concrÃtement et au quotidien est un puissant moteur dans ma vie.

Facile à dire ... mais comment fait-on concrÃtement ?

Suite au prochain épisode. En attendant, que tout vous soit propice.

top

Dédicace aux éclaireurs de la nature

neutrino38 neutrino38 writes  |  more than 2 years ago

Nous voici les éclaireurs ... formons tous la grande ronde ...

La nature nous appelle ... Répondons pour le bien du monde ...

Soyons calmes st soyons clairs ... Les fruits murissent doucement ...

Parcourons les chemins fiers .... parmi les vents du changement ...

Autour du feu et des pierres ... Chantons pour tous les vivants ...

Voyez ce signe dans l'air ... Suivez le inlassablement ...

Nous irons jusqu'aux étoiles ... on y arrivera surement ...

(fredonner une derniÃre fois l'air en ralentissant à la fin)

(silence ... namasté).

top

Chinafrique - musing about Africa's development with China

neutrino38 neutrino38 writes  |  more than 6 years ago

Un article étonnant est paru sur lemonde.fr intitulé "L'Afrique est ruinée ? La chine est preneuse !". Il dessine les contours d'un avenir assez inattendu pour une partie de l'Afrique subsaharienne. La citation choc de l'article "L'Afrique travaillerait à sa recolonisation qu'elle ne s'y prendrait pas autrement" peut porter à polémique mais ... pourquoi pas ? imaginons ...

La Chine déverserait 300 millions d'individus, au hasards des intérêts économiques et des contacts personnels dans un certain nombre de pays d'Afrique. Ces individus, industrieux et commerçant lancent la machine économique Africaine puissamment aidé par des programmes d'infrastructure financés sur fond public chinois. La chine y gagne les matières premières et la nourriture, les pays d'Afrique, les devises et l'activité économique. Ca et là se produisent des réactions de rejet à cause de la concurrence effrénée que les chinois mènent à l'industrie local mais globalement, l'apport économique est apprécié. Contrairement aux occidendaux, les chinois ne sont pas perçus ni comme colonisateurs, ni comme arrogants par les africains (alors que ... ) . Contrairement aux occidentaux, les chinois, sont capable d'endurer l'inconfort et les pertes humaines pour faire du commerce et de l'industrie loin de leur base.

10 à 15 ans plus tard, les chinois sont assez nombreux pour constituer une minorité importante et agissante dans un certain nombre de pays africains au point de pouvoir influencer la politique locale. Des écoles et universités chinoises à l'étranger ouvrent pour éduquer les enfants des expatriés chinois en Afrique. Les chinois sont assez intelligent pour y faire entrer l'élite Africaine locale. Certain pays se ferment à l'influence chinoise mais sont soit marginalisés économiquement soit deviennent des satellites d'autres groupements tels que l'union pour la méditerranée qui prend corps. Les intérêts de chine en Afrique sont devenus tellement important que de façon ouverte ou cachée, plusieurs conflits sont réglés par l'Armée Populaire de Chine. Des bases militaires permanentes font leur apparition en chine et certains pouvoirs s'abritent à l'ombre de cette nouvelle force comme au temps de la Francafrique.

30 ans plus tard, l'élite Africaine éduquée par les chinois arrive au pouvoir, sinophone, elle introduit l'usage du yuan et du chinois dans la vie courant d'un certain nombre de pays en parallèle avec les monnaies locales. Ces pays se groupent dans une union économique pilotée par la chine et prend une influence déterminante au sein de l'union Africaine. Des tensions apparaissent avec le magreb et le proche orient plus proche de l'Union européene et membre de l'union pour la méditerranée. Une imigration africaine en chine se fait jour provocant une montée du racisme anti-africain dans ce pays. Les couples mixes existent mais c'est une curiosité réprouvée par la société chinoise.

50 ans plus tard, les pays de la sinafrique ont bien changés. Ils ont perdu leur aspect sauvage pour se couvrir d'immeubles ternes, d'usines et de grandes plantations. Le pouvoir autoritaire n'a pas disparu mais l'économie va bien. Certains phénomènes climatiques provoque des désertifications et une pression migratoire importante vers la Chine qui commence tout juste à régler ses propres problèmes économiques. Par l'entremise des gouvemenements locaux, la CHine impose sa politique d'enfant unique à une bonne partie de l'Afrique provocant de sanglante révoltes durement réprimées et peu raportées par les médias. Peu à peu, la situation se stabilise et une certaine prospérité apparaît sous la pax china.

100 ans plus tard, propérité, éducation sont là. L'Afrique est globalement sortie d'affaire. Mais politiquement c'est le point mort, autoritarisme et censure sont de rigueur. Des mouvements d'indépendence par rapport à la Chine apparaissent dans certains des pays les plus prospères. Dans ces pays un improbable intégration entre africains sinisés et chinois africainisés on eu lieu mais ces mouvement d'indépendance, comme en yougoslavie séparent brutalement les communautés provoquant l'éclatement de certains de ces pays. Des parties contrôlées par les chinois demandent leur rattachement à la chine ainsi que certains pays où les africains sont devenus minoritaires. L'ONU et les occidentaux s'opposent. La CHine hésite à importer de nouveaux problèmes. FInanement, de nouveaux pays sont créés.

top

LDAP : The mystery of base 64 encoded entries

neutrino38 neutrino38 writes  |  more than 6 years ago

I happend to manage an LDAP directory. It contains users with French names. Those names contains accents (you know é è à and so on ...). LDAP has a nice support of this. It encode such entries in UTF-8 and reencode the result in base64 to be compliant with the original LDAP format.

By default, Fedora Directory Server use cn= as the first part of DN. As a result, when a user happend to have an accent in his/her name, it produced a base 64 encoded DN !!!

Example:

dn:: Y249SE/LTCBNaWNoZWwsb3U9cGVvcGxlLG91PXdlYnNvdXJkLG91PWFib25uZXMsZGM9aXZlcyxkYz1mcg==

Yeah. Now, how to we delete, manage such entries ? I spent a lot of time and found the solution:

1- make sure your terminal emuator is configured to handle UTF-8 as char encoding.
2- express the DN directly in UTF-8 to manipulate the entry and NOT in its base64 encoding.

For instance to delete the entry which has the above DN, do not exeute

ldapdelete ': Y249SE/LTCBNaWNoZWwsb3U9cGVvcGxlLG91PXdlYnNvdXJkLG91PWFib25uZXMsZGM9aXZlcyxkYz1mcg=='

but

ldapdelete 'cn=HOËL Michel,ou=people,ou=group,dc=example,dc=com'

I spend so much time on it...

top

I have found the link!

neutrino38 neutrino38 writes  |  more than 6 years ago

I have finally found the link of this famous comment about implementing RFC1349. I reproduce here the relevant extract of the comment

One suggested solution that has not worked so far, and is unlikely to work in the foreseeable future, is voluntary bandwidth allocation protocols such as RSVP. Few people bother to use them, partly because they are poorly understood and partly because they are not widely implemented at the consumer end.

However, there is room for QoS in a limited, but still useful form. This uses an existing mechanism in IP, the TOS field. Some applications already set TOS to sensible values, which is commendable - it would be nice if some notice was taken of it at the points where it really matters.

I think there is reasonable provision for three general TOS classes:

  1. Low Latency, Limited Bandwidth (both directions) - for VoIP and shells
  2. Interactive Browsing, Limited Upload Bandwidth, Unlimited Download
  3. Bulk Traffic, Unlimited Bandwidth (both directions) - for P2P and unmarked flows

This simple priority scheme can be implemented within each queue in the above traffic shaper, perhaps combined with SFQ or similar just to give things an extra boost. It still doesn't require packet inspection beyond the TCP header, even with SFQ - and not even that if it's just a P-FIFO.

What it achieves is isolation of consumers' typical usage patterns from each other, within their own traffic streams. At the same time, applications have an incentive to correctly mark their traffic - if they just shove it in Low Latency regardless, they will get limited bandwidth, which isn't good for P2P! Malicious abuse is also avoided by the isolation of the intra-user priority from other users' flows.

That was easy, wasn't it?

I notice that Comcast is implementing a functionally similar scheme with this year's round of cable equipment updates. This appears to be just the bandwidth equalisation, which is implemented at the edge modems with help from the cable's upload receiver. I can't help guessing that this solution occurred to them only when they talked to BitTorrent Inc. I wonder whether the latter suggested it? Enquiring minds want to know.

Hat's off Mr funkman

top

Four steps to manage the Internet bandwidth

neutrino38 neutrino38 writes  |  more than 6 years ago

I am not a proponent of maximal network neutrality that states that "every IP packet should be treated equally". This egalitarian approach works well when a network is quasi empty but fails when in come close to saturation. However, the need for uniform rules is obvious and I am sympathetic to arguments that would avoid that some content providers get more priority on the network than others just because they have . The calls for more investment in the Internet infrastructure are not going to be answered unless there are additional revenue streams. To me, managing the Internet bandwidth is about addressing the following issues:

  • how to avoid that 5% of Internet users uses 50 % of the bandwidth
  • how to prioritize legitimate content over peer to peer file exchange
  • how to decrease SPAM
  • how to address real time media transfer?

I recenty read some material about TCP algorithm evolution and noted an interesting proposal in the comments (see my next post). All this lead me to the following four steps to regulate internet bandwidth:

Step 1 - define three type of service uniformly across all DSL and Fiber connections on the user side

This is the most sensible proposal I have ever read and the Web. Let us imagine a typical European DSL with 8 Mbit/s download and 800 kbit/s upload. The idea is to provide worldwide support for type of service as defined RFC 1349.

Under this system, applications that would choose TOS 'maximize throuput' would have access to the full capacity of the DSL link (upload and download) but with lower priority. By default all FTP, SMTP wouls be assigned this TOS.

Application that would choose 'minimum delay (latency)' would have access to a fraction of the DSL badwidth e.g. 2 Mbit/s download, and 600 Kbit/s upload) but with higher priority. It is expected that common Web surfing would use this.

Application that would choose 'maximum reliability' would have access to a low symetric bandwidth such as 500 kbit/s but with garanteed troughput.

The same principle could be extended to Fiber and SDSL links. That would enable the ISPs to do bandwith provisionning.

The GIX nodes and peering interconnection would be critical in managing these TOS accross the Internet. It would the GIX responsibility to charge TOS traffic differently or in case of peering agresments, to weight IP traffic differently depending on the TOS. It is also possible to imagine bandwith limitation related to high priority TOS.

It is expected that on the user side, every application would ave the ability to choose its TOS although there would be defualt settings that would fit the average user's needs. This would dramatically alleviate the P2P bandwidth issue as such applications would probabily select the low priority / high bandwidth type of service to take advantage of the whole capacity offered. Normal traffic would then be processed with higher priority making the network to appear as more responsive. If a P2P application would chosse the high priority type of service, the bandwidth used would be limited.

Step 2 - separate e-mail traffic from the rest

The other source of bandwidth waste is spam. A lot of smart systems (SPF, cryptology, ...) have been designed to reject SPAM mainly when the messages reach the destination the mail. They do not prevent the SPAM to be transferred over the Network. I know that this proposal will hurt every person with a libetarian approach but what we need is to go back to an administred e-mail system.

Today every body can setup a mail server and hookup on the Internet and send e-mail by a few DNS lookup on MX records.

What we need is:

  • to enforce a mail server chain: private e-mail server --- ISP e-mail server ---- global exchange e-mail server.
  • to remove the access to SMTP protocol to Mail User Agent. SMTP would be solely used between PO and MTAs.
  • extend IMAP protocol to support e-mail sending by Mail User Agent and roaming (the ability to connect on a PO and have the connection relayed to the attachement post-office).
  • to have a simple (and free) administrative procedure to connect a private mail server to the ISP.

In that case, the ISP and the global exchange MTA would have simply the ability to pinpoint spam sources and to block them just by shutting down the transfer link between the incriminated e-mail server and the next MTA when they reach a certain quota.

Step 3 - manage media delivey differently

All the above does not address the need for some service providers that are offering VOD services. What we need is to have the ability to open IP virtual circuits from client to server and negociate the bandwith all the way long to be sure that the delivered media would be available with the requested quality.

For ToIP and media delivery, we need to go back to the congestion model proposed by the telephone network that reject new circuit overload without degrading the quality of established circuits.

Thess circuits would be high priority bandwith that would have a costs for the carrier. Content provider need to somehow share some of their revenue stream to ensure this kind of high quality transport and it is expected that the ISP would charge per minute and per kbit/s and share the revenue with the content provider.

Step 4 - multi-tiered Internet

All the above tend to outline the need to separate four types of traffic:

  • T1 - low priority reliable traffic for P2P and file transfert
  • T2 - store and forward traffic
  • T3 - high priority traffic for transactional application / signalling (banking, telephony control, supervisions, Web services)
  • T4 - media transport (RTP, streaming, YouTube) from content providers

Maybe the GIX for all this kind of traffic should be clearly separated with different accounting rules.

  • T1 would be accounted per volume,
  • T2 would accounted per message,
  • T3 would be accounted by the garanteed capacity offered,
  • T4 accounted by sessions (based on time and bandwidth requested).

This separation could be extended to some part of the core network of ISP.

Having said all that, I guess that I will be killed by Network neutrality proponents as this pave the way to differenciated charging of Internet services.

top

Sessionfull HTTP

neutrino38 neutrino38 writes  |  more than 6 years ago

This was recently posted on Slashdot (in the Firehose only). Here is my own views of things:

HTTP protocol has been originaly created to enable documents transfer. In the original idea, HTTP is pretty stateless: it consists in a series of transactions that are supposed to be more or less unrelated. Authentication has been added as a feature to enable simple access control on documents.

Of course with the evolution of the Web, appreared merchant sites which needed to:

  • Keep a context attached to each user in order to enforce a given page flow (i.e. forbid deep linking).
  • Maintain session based data for the user's basket)
  • Perform banking transaction for payment

The second evolution of the Web is AJAX and the idea of Web based application (GMail).

All this works with the overstretched old HTTP protocol. In the document that is linked to the post, the protocol evolution suggestions are very shy. I suggest much bolder changes:

To define a real sessionfull mode for HTTP that

  1. Is based on an explicit persistent TCP connection. Closure of the connection would be equivalent to end of session.
  2. That is authenticated only once at connection time
  3. Several transaction could be opened at once but would be identified by a sequence number
  4. Server based events would be explicily supported by clients and server alike.
  5. Standard transaction format / RPC protocol such as AMF would be proposed along with the ineficient XML format that I personally dislike for such applicatons.

This would be the proper foundation of web based applications. Note that in the proprietary world, Flash Media Server and its open source counter partn the red5 project are an interesting model or inspiration source for such standard work.

The truth is that such another session based protocol already exists: this is SIP and with some amendment, we could embbed it in Web browser and use SIP over TCP as a control protocol for web based / session based applications. This would be a pretty neat alternative and would avoid the ususal standard duplication that we witness at IEFT so often.

Emmanuel

top

Apache 2, Fedora Core, symbolink links and 403 Forbidden

neutrino38 neutrino38 writes  |  more than 7 years ago

While setup a web access to a directory outside the document root, I encountered a 403 Forbidden error. In error_log, this gives

  Symbolic link not allowed or link target not accessible:

This error message occurs in several situation. There are no tool to troubleshoot them apart manual inspection.

1. If you are running SElinux, make sure that SElinux configuration allows httpd to access the targetted directory.

You can check /var/log/messages about SElinux access violations and or temporary disable SElinux using /usr/sbin/setenforce 0 to discriminate the case.

2. Check that the sym link is sitting in a directory or a subdirectory that has FollowSymlinks option enabled in httpd.conf

3. Check whether any directory directive would restrict this option using -FollowSymLink. Check this in httpd.conf and all included files.

4. Last but not least, check that your targed directory and files is accessible to user apache. THIS MEANS THAT any parent directory of the target should have the proper permissions. Most probably, read and execute for the whole world.

top

More Chinese tainted products in Panama?

neutrino38 neutrino38 writes  |  more than 7 years ago

Well, it seems that the same component used for syrup has been used for toothpaste. I guess some local guy found an innovative way to recycle the product ...

As I said earlier. Commerce is the best way of spreading peace but when it is done on sane basis. Here we can see that greeds always taints unrelgulated markets.

top

In Kärcher we do not trust ...

neutrino38 neutrino38 writes  |  more than 7 years ago

Extrait du figaro :

Deux dissidents de l'UMP candidats pour les législatives dans le département de l'Isère contre des candidats officiellement investis, ont été exclus aujourd'hui de l'UMP, (...)

Ces exclusions concernent le député sortant Richard Cazenave se présentant contre l'ancien député-maire et ministre choisi par les militants, Alain Carignon, et le conseiller municipal de Grenoble Matthieu Chamussy

Comme prévu hélas.

top

[fr] l'arbre et l'etoile partie 2

neutrino38 neutrino38 writes  |  more than 7 years ago

Les trois modèles de développement

Le premier est peu ou prou la continuation de ce que nous connaissons, à savoir le développement économique et une adaptation a minima aux conditions climatiques changeantes afin de satisfaire au développement d'un maximum de personnes et de pays. Cette voie à mon humble avis condduit à l'extinction de l'espèce par deux mécanismes : par l'épuisement des ressources d'une part et par le déni complets du problème fondamental de l'adaptation radical de l'espèce aux défis de la rareté des ressources

Le second modèle est défendu par les écologistes radicaux et repris dans une certaines mesure par les écologistes politiques. Il consiste à ajuster nos modèles de vie et de production afin de rendre compatible notre vie sur terre à long terme. Cela passe par une diminution des des transports de bien et de personnes.Les radicaux pronent en plus une diminition programmée de la population mondiale. C'est à mon sens assez inévitable. Ce modèle a l'avantage de mettre en avant les nécessaires ajustements de nos technologies et de nos modèles de production à l'impératif de l'économie de ressources.

En revanche, les personnes qui le promeuvent véhiculent également un vieux fond anti-progrès, plus exactement anti nucléaire et anti OGM. Ce modèle véhicule également l'idée fausse que nous pourrons indéfiniment vivre sur notre planète. Tout ceci est un formidable barrage aux nécessaires transormations radicales que nous devons entreprendre pour relever le défi de l'espace.

Le troisième modèle que je défends, est basée sur l'idée de l'arche de Noe. Plus exactement, il nous faut prendre les moyens de permettre à une petite partie de l'humanité et de l'écosystème terrestre de s'adapter au voyage ou à la vie spaciale afin d'essaimer enfin hors de notre terre. Il est important mais tragique de comprendre que l'ensemble de l'humanité et de l'écosystème ne pourront être sauvé mais que le sacrifice de la majorité permettra la continuité de l'espèce grace à une minorité spécialement modifiée pour pouvoir vivre outre-terre voire outre espace.

Au premier modèle j'emprunpte la nécessaire continuité du progrès technique comme moyen majeur de créer les adaptations (génétiques, techniques, informatiques et sociologiques) de l'humanité et de son écosystème pour l'aventure spaciale. Au second modèle, j'emprumpte la nécessité d'adpatation à des conditions de rareté, de concentration à l'essentiel afin d'acquérir les marges de manoeuvres pour faire le grand saut.

Les changements décrits ici sont dramatiques et les implications mon font frissonner de crainte car ils ont en germe des sacrifices immenses et des comportements cruels. Les pires évènements du XX siècles risque de ressembler à d'aimables plaisanteries à côté de ce qui nous attends dans quelques siècles.

La nécessité de tout cela n'apparaîtra que dans un temps long qui devrait se mesurer en dizaines de millier d'années mais il nous appartient d'en planter les graines dès à présent pour que puisse germer les arbres et que leurs cimes puissent tendre vers les étoiles belles, froides et impitoyables.

Emmanuel

top

Sarko, where is your Karcher?

neutrino38 neutrino38 writes  |  more than 7 years ago

Just a night rant

Some may know that France will run parlemntary election next month. I happend to be an happy resident of the Grenoble area and an Entrepreneur. As such, it would seem natural that I could be inclined to vote for the candidates proposed by the party of our newly elected President Mr Sarkozy.

No way. Not because I disagree with the ideas but because one of the local candidates is trying to use the current wave of enthousiams for concervatives to get elected but the problem is ...

This guy, Mr Carignon, has been convicted a couple of yeas ago in a corruption scheme involving overcharge of local water distribution. Yes, he has served his setence and so on.

No Niko, I will never vote for any local UMP candidate. Unless ... your Kärcher is hanging somewhere around and can be usd to put a bit of pressure on the guy and remove him from these elections. Remember all those speeches about morality in politics and the value of merits. I take you on words.

And by the way, his local challenger, Mr Cazenave had interesting opinions on the DADSVI law and is pro Open Source.

PS: Mr Sarkozy and Carignon started politics in the same circles (they were know as the 'quadras' at these times. So it is very likely that Mr Carignon will be the local candidate for the MP position. Alas.

top

Liberte de circulation des biens ne veut pas dire naivete

neutrino38 neutrino38 writes  |  more than 7 years ago

On vient d'apprendre coup sur coup que des sociétés chinoises ont exporté de la nourriture pour animaux (genre croquette et pâté je suppose) contenant des produits chimiques (melamine) pas vraiment fait pour être ingérés à la base. Une affaire de sirop empoisonné aurait causé pas mal de mort en Chine même mais aussi ... au Panama

Trop c'est trop.

Le commerce est bien sûr porteur de paix et constiutue le meilleur moyen d'élever le niveau de vie mondial. Mais il doit se dérouler sur des bases saines. Dans le second cas cité ici l'attitude des autorités chinoises laissent sérieusement à désirer. Affirmer que le vendeur n'a enfreint aucune loi car il n'était pas autorisé à produire des médicament ... est d'une mauvaise fois impressionnante.

Si les autorités chinoises ne veulent pas faire le ménage, soit par fierté, soit à cause d'avantages économique entendus, nous (Européen) devrions les "aider" et instaurer rapidement un embargo total sur ces produits, jusqu'à ce que le nécessaire soit fait.

N'oublions pas que l'empoisonnement des animaux d'élevages pourrait conduire à l'empoisonnement de l'homme.

D'un autre point de vue, il est frappant de voir que la réalité mesquine de certain commerçants chinois si avides qu'ils sont prêts à tout pour s'en mettre plein les poches contraste avec l'image de sagesse orientale de notre imaginaire.

Hélas, une de mes connaissances qui fait de l'import-export me le confirme ; il faut un sacré bon rapport de force avec les fournisseurs chinois : ils vous appâtent avec leurs meilleurs produits. Une fois que vous êtes bien accroché, la qualité baisse lentement mais sûrement.

Assez de naïveté de notre part donc. Ils sont durs en affaire ? Soit. Soyons intransigeant sur la qualité, la sécurité et les condition de production (écologie, travail des enfants). Et n'hesitons pas à bloquer ces produits hors de nos frontières en cas de doûte.

top

Internet with circuits

neutrino38 neutrino38 writes  |  more than 7 years ago

Already sumbmitted in Slashdot but I but it here back in my journal fore records. Some guys are tring to thunk about a new design for Internet. There is no chance for this to be implemented but some of the ideas are nice.

In fact, I fully agree about the flow and the circuit handling. I really belive that we need such core mecanism like virtual circuit to finally handle real time medial (I mean video and audio here) end to end. Especially in congestion situation.

RTP is a sad hack.

Here is the URL:

http://cleanslate.stanford.edu/CleanSlateWhitepaperV2.pdf

top

[fr] L'arbre et l'étoile - partie 1

neutrino38 neutrino38 writes  |  more than 7 years ago

Je regardais jeudi l'émission A vous de juger avec Sarko comme invité. Il y a eu des moments intéressants sur le fond. Mon propos n'est pas ici de discuter de la valeur des candidats ni de mes penchants électoraux mais d'une idée qui me taraude depuis plusieurs années sur l'avenir à long terme de l'humanité.

Comme introduction, voici les morceaux de l'émission qui ont été le plus significatif quant à ce sujet :

  • Celui où il a été interrogé sur Airbus et où, en quelque phrases, il a défini clairement le possible rôle d'accompagnateur de l'Etat. Mais je ne suis pas d'accord quand il dit que notre pays doit rester généraliste. J'y reviendrai plus bas.
  • Celui sur l'éducation. Il n'a pas été convaincant du tout en proposant son grand plan de formation. Le sujet est pourtant primordial pour les génération à venir.
  • Le plus important et le moins spectaculaire fut le débat avec Nicolas HULOT. Il y avait vraiment deux visions qui ne coïncidaient pas sans s'affronter vraiment.

L'un - Hulot - revenu de ses voyages voit la planète changer et par la même une menace sur la civilisation telle que nous la connaissons. Il reproche aux politiques de traiter la question de l'environnement comme une priorité comme les autres alors que d'elle dépend tout le reste.

L'autre, Sarko est un responsable politique en exercice. Il rappelle le problème des moyens défend l'idée que la priorité ne peut s'imposer que progressivement. Les gens restants encore plus préoccupés par leur petit quotidien.

Les échanges d'argument sur l'écologie politique et l'affrontement sur le thème de la décroissance étaient - à mon avis - beaucoup plus denses qu'il n'y paraissait. Ceci m'amène à mon propos.

En regardant plusieurs centaine de millénaires dans le futur (voire dans qq millions d'année) il apparaît comme évident que tant que l'humanité reste liée à la planète Terre, elle est condamnée. On peut émettre deux gros scénarii :

  • 1- Game over : L'humanité consomme toute les ressources de la planète est s'empoisonne. Elle meure faute de quoi manger, boire ou respirer.
  • 2- Je reste chez moi - L'humanité réussit à préserver suffisement son environnement mais ne consacre pas suffisement de ressource à la conquête de l'espace et fini par s'éteindre suite à une catastrophe naturelle dont celle inévitable qui surviendra quand le soleil deviendra une géante rouge et grillera la Terre

Face à cette constatation, j'ai une doctrine contradictoire avec M. Hulot : non seulement il faut préserver l'environnenment mais sa préservation n'est pas une fin en soi. Pour moi, son sacrifice afin de permettre à l'humanité d'essaimer dans l'espace est nécessaire.

Seul ce choix permet d'envisager un troisième scénario où l'humanité sèmerait des graines dans l'espace avant de s'éteindre sur Terre.

On parle beaucoup de classification politique et les deux plus courantes en France sont : droite / gauche et libéral / conservateur. Je voudrais dans mon prochain article faire l'inventaire de quatres positions politiques beaucoup plus fondamentales (et dérageantes). Parmi ces quatres positions, une seule me paraît moralement acceptable. Dans un article suivant, je vous entretiendrai alors des conséquences d'une telle prise de position sur les choix politiques.

top

Microsoft to pay royalties to Alcatel for MP3 what a mess

neutrino38 neutrino38 writes  |  more than 7 years ago

I guess everybody read about this huge royalty fee that Microsoft has to pay to Alcatel Lucent for embedding MP3 in Windows Media Players.

What a mess !

Some slashdotter would probably rejoice that Microsoft has been burned by patent fee as they are playing the same game with others. Personally I find it very stupid. How many years is the MP3 format around? More that $1 billion for supporting a file format and a compression technology.

Well one reader of Le Monde newspaper summarized my own opinion:

[fr] Le point positif de cette affaire: faire prendre conscience du danger que représentent les "brevets logiciels", qui sont autant de monopoles posés sur des idées abstraites et en général tout à fait triviales - brevets que les lobbies en propriété intellectuelle voudraient désormais légaliser à Bruxelles. Enfin, ironie du sort, c'est l'un des plus fidèle partisans des brevets logiciels qui est ici condamné. Juste retour des choses ?

Xavier Roche 23.02.07 | 11h01

I am not fully against technology patents but here we can see how absurd it can becomes when a company seek legitimate interoperability with a widespread format, it gets punished.

My view is if they want to make a format a standard then all patents about it and the associated technology should be dropped. In order to reward the developpers of the standard, I would propose that each company that seeks interoperatbility should pay a one time fee to standard body which in turns would transfer back the money to the standard developpers.

Update:

Microsoft already paid $16 Million dollars to Fraunhoffer Institute for MP3! This is becoming more ridiculous. So the guys who sold the patent fee said: "Ok, we take the money" Then a few years later "Euh... by the way, it was MUCH MORE expensive. Can you give us MUCH MORE money? You disagree? Fine. I'll sue."

I am not aware of any major improvement regarding MP3 format in the meantime so this monies does not match any actual work. Stupid !

Emmanuel BUU
IVèS

top

France is getting ready for Fiber to Home Internet Access

neutrino38 neutrino38 writes  |  more than 7 years ago

Orange (Ex France Telecom) will launch [fr] Fiber to Home Internet access

on March 1st, 2007. The offer includes 100 Mbit/s of downlink and 10 Mbit/s of uplink and unlimited nationwide call for 44.90 euros. This initial deployment will be limited to central areas in five cities of France were only 14000 people will be able to beneficate from the offer. The full scale deployment is due on 2008.

This follows intense competition with the challenger Free Telecom which [fr] announced a 1 billion euro investment on Fiber to Home Internet access. This offer is supposed to be available mid 2007 and provide: 50 MBit/s symetric + static IP and unlimited nationwide calls for 30 euros / month (29.90 exactly including V.A.T.). Of course, no bandwith cap whatsoever.

This will certainly kill part of the SDSL market where companies pays premium prices (400 to 600 euros / month) for 4 Mbit/s symetric access. I also suspect that a lot of people will start to host their own server at home.

top

SIP over TCP - using it in NAT friendly way

neutrino38 neutrino38 writes  |  more than 7 years ago

I have recently browsed through the latest SIP RFC looking for ways to be more NAT friendly for VoIP.

What I found is not very conclusive: The latest RFC indeed tries to push TCP as default transport for SIP (Yessss signalling links are making a come back) but the use of TCP connection is left to a lot of ambiguities.

We will assume the following situation. User runs a SIP phone (User Agent is RFC terminology) on his internet connection at home or at the office. He is most likely behind a NAT / Firewall and connects to a SIP proxy located on the public Internet with a public IP address.

Specifying a NAT Friendly SIP behavior

In order to be NAT friendly, SIP behavior between User Agent and proxy should be the following:

  • On registration, user agent shall initiate a TCP connection to the proxy. If the registration is successful, user agent and proxy MUST maintain TCP connection open.
  • If TCP keepalive is supported, it SHOULD be used
  • If TCP keepalive in unavailable, User Agent SHOULD send OPTION request to proxy regularily (every 30 seconds) and expect the answer 200 OK. These queries can be omitted if other SIP traffic occurs.
  • In case answer is not 200 OK or not received after a timeout, connection shall be terminated and registration process restarted.
  • Proxy MUST base User Agent availability upon TCP connection status and TCP or option keepalive.
  • User agent MUST reuse connection when initiating and outgoing session.
  • and the most important: proxy MUST reuse open inbound connection when signalling an incoming call to the User Agent.

This also addresses the case where a company would run an internal SIP proxy which in turn would connect to another public SIP proxy.

On the contrary, this is not adressing the RTP issue that is more of a headache for NAT traversal. This will be the topic of another article.

For reference, here is an abstract of the current RFC

18 Transport

The transport layer is responsible for the actual transmission of
requests and responses over network transports. This includes
determination of the connection to use for a request or response in
the case of connection-oriented transports.
The transport layer is responsible for managing persistent
connections for transport protocols like TCP and SCTP, or TLS over
those, including ones opened to the transport layer. This includes
connections opened by the client or server transports, so that
connections are shared between client and server transport functions.
These connections are indexed by the tuple formed from the address,
port, and transport protocol at the far end of the connection. When
a connection is opened by the transport layer, this index is set to
the destination IP, port and transport. When the connection is
accepted by the transport layer, this index is set to the source IP
address, port number, and transport. Note that, because the source
port is often ephemeral, but it cannot be known whether it is
ephemeral or selected through procedures in [4], connections accepted
by the transport layer will frequently not be reused. The result is
that two proxies in a "peering" relationship using a connection-
oriented transport frequently will have two connections in use, one
for transactions initiated in each direction.
It is RECOMMENDED that connections be kept open for some
implementation-defined duration after the last message was sent or
received over that connection. This duration SHOULD at least equal
the longest amount of time the element would need in order to bring a
transaction from instantiation to the terminated state. This is to
make it likely that transactions are completed over the same
connection on which they are initiated (for example, request,
response, and in the case of INVITE, ACK for non-2xx responses).
This usually means at least 64*T1 (see Section 17.1.1.1 for a
definition of T1). However, it could be larger in an element that
has a TU using a large value for timer C (bullet 11 of Section 16.6),
for example.

All SIP elements MUST implement UDP and TCP. SIP elements MAY
implement other protocols.

Making TCP mandatory for the UA is a substantial change from RFC
2543. It has arisen out of the need to handle larger messages,
which MUST use TCP, as discussed below. Thus, even if an element
never sends large messages, it may receive one and needs to be
able to handle them.

top

French national assembly officially embrace open source

neutrino38 neutrino38 writes  |  more than 7 years ago As previously reported by Slashdot, the French national assembly committed to use Open SOurce software. It's now official [fr].

Slashdot Login

Need an Account?

Forgot your password?