asharp | 12 years ago | on: Easy Amazon EC2 Instance Comparison
asharp's comments
asharp | 12 years ago | on: Easy Amazon EC2 Instance Comparison
You have a server with some disks, some ram and some cpus. You aggregate the disks together, then split them to form the individual disks for the virtual machines. You then use kvm/xen to provide isolation as well as to split the ram/cpu between the virtual machines.
So to answer your question: Storage/ram/cpu is sold in lock step because otherwise there would be resources sitting on servers that are unable to be sold. Bandwidth isn't constrained like that because bandwidth isn't a thing tied to a machine.
There are some providers out there that don't lock ram/disk together. This is mostly because they use a distributed storage pool rather than local disks. This is significantly more complex and is a 'fairly' new addition to the scene (~2010?).
This is also why certain providers still charge you for ram even when your machine is turned off, and why backups/migra tions/plan upgrades can be a bit of a pain in the neck at times.
asharp | 12 years ago | on: Seagate just reinvented the disk interface using Ethernet
asharp | 12 years ago | on: Seagate just reinvented the disk interface using Ethernet
asharp | 12 years ago | on: Seagate just reinvented the disk interface using Ethernet
asharp | 12 years ago | on: Nvidia's G-Sync: Attempting to Revolutionize Gaming via Smoothness
asharp | 13 years ago | on: Linode NextGen: RAM Upgrade
asharp | 13 years ago | on: FoundationDB — Not Your Standard NoSQL Database
asharp | 13 years ago | on: Damn Cool Algorithms: Cardinality Estimation
asharp | 13 years ago | on: Probabilistic Many-to-Many Relationships (with Bloom Filters)
That being said, if you stored your bitvector as an array of powers of two, then it would work. But that would be horribly inefficient in terms of space usage.
asharp | 13 years ago | on: Probabilistic Many-to-Many Relationships (with Bloom Filters)
A major problem is a lack of indexes in array elements, which then forces you to build an otherwise unneeded table.
That being said, it's definitely doable, to some extent.
asharp | 13 years ago | on: Ask HN: What are you working on (elevator pitch)?
To elaborate slightly. I mean hardware that you can run anything on, complete with full BMC, fast persistent disk storage (1K IOPS+), and any number of full layer 2 cross connectable networks. All pay by the second.
Already a major company in Australia with enterprise and government clients. Coming to the US soon.
asharp | 13 years ago | on: Some performance tweaks
An an improvement though, you only need two independent hash functions to run your bloom filter[1]. Strangely enough, this isn't well known and as such isn't implemented anywhere near as often as it should be (ie. it's not implemented here).
[1] www.eecs.harvard.edu/~kirsch/pubs/bbbf/rsa.pdf
asharp | 13 years ago | on: The Australian boys who built a $1b company in the cloud
Anyways, the major problem is that shares and options are taxed like income at the time of issue, with no easy way to defer the tax bill. This makes it essentially untenable to hand out equity to employees. This then makes it a lot harder to employ people as a bootstrapped startup.
asharp | 13 years ago | on: G-WAN - Web Application Server
asharp | 13 years ago | on: Pin is Australia’s first all-in-one payment API
ssltrip requires a valid root ca, or an ssl library that doesn't check the signing chain. After using it though, the parameters are unencrypted and so can simply be sniffed.
Are you attempting to reencrypt the parameters with another key? If so then why run that through https?
asharp | 13 years ago | on: 6.5 Million LinkedIn Password Hashes Leaked
1) You know the hash function beforehand 2) You know that they are salting in exactly this way 3) You know how they are doing their salting (HMAC vs., vs.) 4) You have enough time to create this new rainbow table 5) You have only just enough access to the system to dump the hashes (ie. the easier routes are blocked off from you)
That would in fact, with some probability (based upon the complexity of your rainbow table and the complexity of the users password), give you the passwords for a particular set of users.
I did say that it was more secure then it seems, not that it was perfectly secure :)
asharp | 13 years ago | on: 6.5 Million LinkedIn Password Hashes Leaked
For a targeted attack it really doesn't matter as the time complexity to produce the rainbow table is equivalent to that of simply brute forcing the hash, ie, you can't say 'well assume the rainbow table contains only some small number of usernames"...
It also is entirely unlike the WPA2 rainbow tables in that you don't have millions of users all sharing the same username (ie. factory default SSIDs).
Overall it's more secure then it seems at first glance but you still have to ask yourself why you'd use that over a random salt.
asharp | 14 years ago | on: Building a dependable hosting stack using Hetzner’s servers
You probably want to have an external dns host returning two ip addresses for a haproxy or LVS cluster, which you then route into your actual web tier.
asharp | 14 years ago | on: Building a dependable hosting stack using Hetzner’s servers
One way involves the use of cisco stacking switches, allowing you to use 802.3ad between two independent 'stacked' switches. You can also use the external PSU to provide redundant power to each switch (giving each switch redundant PSU's and having each switch redundant).
The second involves the use of the linux bonding driver in balance-rr configuration. This has a slight bug with the bridge driver in that it sometimes won't forward ARP packets, but if you're just using it as a web head or whatever, you don't really care about those.
The 'big boys' do use ibgp/etc. internally, but that's for a different reason: At large scale you can't buy a switch with a large enough MAC table (they run out of CAM), so you have routers at the top of your rack that then interlink. You can still connect your routers with redundant switches easily enough with vlans and such (think router on a stick).
That being said there are providers out there that sell it, and have been for years.