Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Verizon Blocking 4chan

whydna Re:NSFW!!!!!!! (677 comments)

no they're not ;-P

more than 4 years ago

The best pizza I have ever had, I found ...

whydna Re:New York (920 comments)

If you're in Gainesville and love good pizza, you _must_ go to Satchel's Pizza... holy jebus, it's amazing.

more than 5 years ago

eBay Denies New Design Is Broken, Blames Users

whydna This doesn't surprise me at all... (362 comments)

I went to a presentation a few years ago by a pair of eBay's senior engineers where they were discussing their architecture and technology. They explained their Java-on-Windows two-tier architecture (web front-ends which are handling all of the business logic, database backends, little-to-no caching, etc). They explained how they have pools of servers for handling different page types (i.e. search vs. gateway vs. help, etc) and how they sometimes have brownouts in some pools because they mis-predicted the number of servers they needed in that pool.

During the Q&A, somebody asked them, "what's the biggest challenge that you guys face?"; the response was "fitting enough information in the browser's cookie... 4k really isn't enough information for us". A follow-up question was asked about why they didn't just use a session-id key and store as much data as they want in a database or cache, etc. They basically admitted that they didn't have the technical strength to build something like that at their scale.

I asked them why they allow users to post JavaScript in their posts as it basically turns all of eBay into a cross-site scripting bug. I know for a fact that sellers have been able to include JS in their posts which can record the max-bid of the buyer. Sure, it's against the TOS, but only if they catch it. Their response was that it's what their customers (read sellers) want.

The point I'm getting to is that eBay, despite having one of the most popular websites in the world employs some bass-ackward technical solutions and business policies. What's reported in this doesn't surprise me at all.

more than 5 years ago

Warrantless GPS Tracking Is Legal, Says WI Court

whydna Seems reasonable (594 comments)

If it's only vehicle location track, how is this different than having the police tail the vehicle or follow it via helicopter, etc. This seems like a lower-cost mechanism for doing the same thing. Is there more to it than that?

more than 5 years ago

What Data Center Designers Can Learn From Legos

whydna Re:lego in the plural (210 comments)

It's due to trademark laws... the IP lawyers where I work remind us that trademarked brand terms should be used as adjectives and not nouns (despite the fact that they're generally referred to as nouns amongst "lay people"). For instance, Apple refers to the iPod(R) as the "iPod(R) mobile digital device" if you dig deeply into their docs.

It's the same thing for Lego... they're Lego(R) bricks, despite the common vernacular of Legos. :D

more than 5 years ago

$25M for Rackable to buy SGI is mostly ...

whydna Re:Sad to see it come to this (165 comments)

SGI played a part in that movie; namely the "famous" 3D file-system scene provided by the 'fsn' (file system navigator) demo app. Also featured were an array of Macintosh Quadra 700's and a group of Thinking Machine's Super Computer (which I'd bet is the only actual sale TM had, but that's my guess).

Quadra 700

Thinking Machine Supercomputer

SGI Indigo

SGI was responsible for all/most of the CGI graphics.

more than 5 years ago

40-Gbps DDoS Attacks Worry Even Tier-1 ISPs

whydna Re:what's scarier, or not (146 comments)

Back in the day (about a decade ago), you could "smurf" folks, which is a form of reflective amplification. The process was fairly simple: you'd ping a network's broadcast address with a packet spoofed to appear to come from your victim. At the time, most networks weren't filtering the broadcast traffic. As a result all the hosts on that network would respond to the ping. Back in the days of 14.4 modems, you could easily blow somebody offline while generating a very tiny volume of traffic.

---> ping (src: victim [spoofed], dest: broadcast address of large network)
<=== large number of icmp responses (src: addresses in large network, dest: victim)

I'd guess that the attack is similar in concept.

more than 6 years ago


whydna hasn't submitted any stories.


whydna has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?