nav search
Data Centre Software Security DevOps Business Personal Tech Science Emergent Tech Bootnotes

* Posts by rcxb

19 posts • joined 22 Aug 2018

Early to embed and early to rise? Western Digital drops veil on SweRVy RISC-V based designs


You won't find many drives that can sustain more than 1Gbps, even sequentially, definitely not random reads/writes. You'll only see that briefly to/from cache. Besides, SAS and SATA are higher speed in part so they can be shared across several drives. Ethernet switches give everybody the full 1Gbps. And let's not get into overhead. USB3 claims 5Gbps, but is actually a bottleneck to drives than can't sustain 1Gbps.


With that kind of CPU, WD should be able to sell individual hard drives with built-in ethernet, instead of just SATA or SAS interfaces.

It's a, it's a, it's a SYN flood: Quick, ditch that packet


Syn flooding has been adequately addressed for decades. DDoSes don't bother with such tricks anymore, they just send a huge amount of traffic.

Peak tech! Bacon vending machine signals apex of human invention


This doesn't sound like the USA I know... That bacon should be chocolate-covered!

Technical foul: Amazon suffers data snafu days before Black Friday, emails world+dog


Relevant Information

I may be able to shine a little light in the darkness... I e-mailed a week ago because I got a spammy e-mail specifically offering money to write product reviews on Amazon This is to an e-mail address I only give out to family and retailers I similarly trust with my credit card data.

It's not the first time I've gotten targeted emails that seem to know I'm a highly rated reviewer on Amazon, but this time they failed to use the BCC field and supplied me with a list of dozens of e-mail addresses that clearly look valid. Not remotely sequential, not dictionary words stuck together, not brute-forcing all random combos, etc. Clearly a list of personal e-mail addresses.

I requested they check the list of addresses against their user database to confirm or disprove my strong suspicion that their website is somehow being coaxed into leaking private customer e-mail addresses. Then came the Amazon e-mail early this morning...

Purely speculating now, I wonder if this is related to the phenomenon of lots of new merchant accounts popping up on Amazon, which claim to have millions of items at absurdly low prices, then either send a tracking number for unrelated packages (to stall for time) or else don't even bother pretending they have ever shipped anything. In either case they're playing a numbers game, waiting until their feedback and refund rate is bad enough that Amazon blacklists them, but in the mean time collecting angry e-mails forwarded through Amazon's e-mail proxying system of people asking where their items have gone.

Symantec execs cooked the books to protect their fat bonuses, investor lawsuit alleges


So if bad actors are liable for illegal behavior that caused a drop in stock prices, do they also get all the credit from their illegal behavior that caused a stock price rise some time before the fall? Maybe the shareholders will end up having to pay them.

US draft bill moots locking up execs who lie about privacy violations



A senator in the minority party (which doesn't control the house, senate, or the presidency) proposes a strict privacy law a few days before a major election? I'm sure it'll sail right through.

Official: IBM to gobble Red Hat for $34bn – yes, the enterprise Linux biz


Re: Amidst all the wailing and knashing of teeth here

Linux has long had pretty much everything you say it doesn't:

Live OS upgrades: KSplice has been around for a decade.

Inline memory compression: Compcache / zram has been around for a decade, also.

Hypervisor overcommit memory: KVM has had over-commit for at least a decade, Xen even longer. VMware longer still.

ASO/DSO (automatically tune the operating system: Linux systems need vastly less (if any) tuning of parameters, compared to traditional crufty Unix systems.

Workload Partitions: Linux has rather advanced containers in OpenVZ/LXC/Xen for over a decade.

Suspend / Resume: KVM/LXC/etc. suspend / resume just fine.


Re: You may have got it the wrong way around!

"IBM sold off the x86 hardware business to Lenovo and the Apple/Microsoft partnerships are not interested in alternatives to OSX and Windows."

Hmm,.. I recall Dell occasionally steps into the fray with Linux developer laptops and Windows-free desktops. Dell isn't as much of a direct competitor to IBM as others like HP, Oracle, etc, so a partnership where Dell boxes get shipped with IBM logos at a marked-up price to big IBM shops might work.

Yes, Americans, you can break anti-piracy DRM if you want to repair some of your kit – US govt


Re: Breaking DRM to perform "unauthorized repairs"

Copyright is one of the issues both sides agree on. Hollywood is a major contributor to Democrats who doesn't want to see that well dry up, and lots of other business interests make money from longer and stricter copyright, so the Republicans are on-board too. The lack of opposition is why copyright has been extended practically indefinitely, despite that being blatantly unconstitutional. Robbing the public domain while giving nothing back has been highly profitable for Disney and many other mega media corporations.

Chinese biz baron wants to shove his artificial moon where the sun doesn't shine – literally


Re: Drag

"So, HOW BIG does that mirror need to be?"

They say 8 times as bright as the moon. Moonlight is under 1 lux, so call it 8 lux. Full sunlight is around 100,000 lux. So you need a surface area of around 8/100,000ths the area of the city you intend to illuminate. If I did my quick maths right, You need a reflector of 48x48ft for every square mile of city you wish to illuminate.

Leaked memo: No internet until you clean your bathroom, Ecuador told Julian Assange


It sure is nice that Assange is a man of his word and he immediately agreed to be extradited to the US when Pres Obama commuted Bradly Manning's sentence.

SUSE punts SES v5.5 out door, says storage is going software-defined and open source


Re: how is this different from red hat?

The article is fine, you just missed it:

"SUSE was the number-two contributor to Ceph open-source code, and said it typically brought out commercial versions of Ceph releases from the open-source community four to six months before Red Hat."

Intel's commitment to making its stuff secure is called into question


Re: Speed

- "Why not an ACTUAL jumper(s) on motherboards to enable diagnostic modes, management engines, BIOS/EFI updates etc? You should need physical access, more than USB or other socket on outside and NEVER default access by software without a HW jumper enabling it."

I'm not going to pay data-center staff to go around swapping jumpers on hundreds of servers every time we want to update the firmware, then put them all back again. That goes double if we want to do the firmware update in the middle of the night when load is low.

US mobe owners will get presidential text message at 2:18 pm Eastern Time


Re: "And EAS alert can be avoided with a mass media fast"

Register-to-English translation: Shut off your TV, radio, and mobile phones, and you won't see any emergency alerts.

'Men only' job ad posts land Facebook in boiling hot water with ACLU


Re: Equality in advertising

- "What people are born with doesn't change (race, sexuality, gender dysphoria, etc) and is something they have to live with through no fault of their own."

So you're saying you fully support age discrimination?

Dust off that old Pentium, Linux fans: It's Elive


You can make your OS as lightweight as you want, but if you want to browse modern web pages, Firefox / Chrome / etc are going to chew up at least a couple GB of RAM on their own, and make you sorry you tried it, if you have less. I only wish there was a lightweight browser out there which could render modern web. Now THAT would be a huge productivity boost for everyone.

Elders of internet hash out standards to grant encrypted message security for world+dog


Re: Cue firestorm

(1) That's just ignorant. Encryption is math, and mathematical proofs are absolutely fundamental, untouchable by any technological progress. It only just happens that the currently popular factoring systems of public key encryption ala RSA are potentially vulnerable to quantum computers. There are a number of alternative, existing methods of public key exchange which are absolutely invulnerable to quantum computers. There's even a full Wikipedia page just on the subject of "Post-quantum_cryptography".

The Register - Independent news and views for the tech community. Part of Situation Publishing