Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Meet the new boss: (Score 5, Informative) 134

Meet the new boss: same as the old boss.

You mean: "Meet the new boss, worse than the old boss". Gnome keeps removing features. Session saving for gnome-terminal was removed several versions ago supposedly because they have a new way of doing this. Only they didn't actually implement the new way. They just took out the old and left it.

Comment Re:Because no analog system has (Score 2) 245

No, it is not. If the remote analog access is by a dedicated wire (and that is what you do in analog), then the attacker has to have physical access to that wire

And that dedicated wire could control digital circuitry or even a conventional computer running software. So what is your point?

The only advantage of analog is that control methods are generally so limited that doing something stupid like sending a critical control signal over the Internet is not possible. However, the cost is very very high and it doesn't do anything that following a policy of never sending controls over the Internet would not do. Further, without such a policy, the security advantage is lost the first time someone gets the bright idea of inserting a repeater.

Comment Just in time to be obsolete (Score 2) 74

It is LTE. LTE-Advanced (the real "4G") is supposed to start rolling out this year.

The average vehicle life is 11.4 years. That means this car will have an obsolete wireless connection for nearly 11 years. At the rate that new standards come out and frequencies shuffle, you may not be able to get service at all in the last couple of years.

Comment Re:so much hate (Score 1) 310

I just wish they'd pick one time -- Daylight Saving or Standard, I don't care which -- and keep that year round

That is equivalent to abolishing Daylight Saving Time. Day Saving Time only works (for rather feeble values of "works") if the time changes. If it stays the same, schedules will simply readjust over time to follow the sun. A good example of this is Easter Island: the official time is two hours ahead of solar time. Therefore businesses open and close two hours "later" than they do on the mainland.

Comment Re:Not a subsidy? (Score 4, Insightful) 126

Right. It looks like NASA was simply selling fuel based on their own cost. They may have long term contracts and/or just not buy fuel all that often so it is possible for that on any given day, their costs are askew with average retail rates. Now I guess they will hire someone to monitor retail fuel prices every day to make sure they don't undercharge startups resident at Moffett Field when they occasionally buy fuel. Maybe this will make a little bit more money for Federal Government. Maybe the extra revenue will be lost in the extra overhead.

Comment Re:Or maybe... (Score 1) 149

Definitely. Facebook email is an awkward and crippled parody of email. It is something to put up with for communicating with people who don't use use real email or who you don't trust with your real email address. But, seriously, why would anybody want to use Facebook email for communication that doesn't involve Facebook?

Comment Re:What's this story doing here? (Score 1) 304

Consider what they may not be teaching in order to cover topics that are

state-specific: bankruptcy, the financial impact of gambling and charitable giving

The school year and the material that can be covered in it is finite. If you add hefty new requirements, something else will have to be dropped. Maybe they can trim out all the "controversial" science.

Comment Re:Oh, really? (Score 5, Interesting) 71

Note that apparently the KN-08 is a liquid-fueled ICBM, which means it is completely useless for defensive purposes (you don't store liquid fueled missiles fueled-up, you fuel them just before launch - which would take too long to allow them to be used to react to an attack), and only really useful for a first strike.

Not necessarily. Titan II used liquid fuel and could be kept fully fueled in the silo indefinitely.

Atlas could be fueled in 15 minutes. Late variants reduced this further but loading the kerosene in times of high tension, which could remain in the rocket for long periods, and only waiting to the last minute to load the liquid oxygen. These versions were also kept in silos so they were only vulnerable during the time needed to load the oxidizer.

Comment Re:The more simple you make it the less complex it (Score 5, Interesting) 876

In practice, I believe that the present text-based programming paradigm artificially restricts programming to a much simpler logical structure compared to those commonly accepted and used by EEs. For example, I used to say "structured programming" is essentially restricting your flow chart to what can be drawn in two dimensions with no crossing lines. That's not strictly true, but it is close. Since the late 1970s, I've remarked that software is the only engineering discipline that still depends on prose designs.

Funny that you should say that. For the last 20 years, the trend in Electrical Engineering is away from graphical entry and toward text based design languages. Hardly anyone designs logic by drawing gates anymore. We use languages like Verilog and VHDL, which look a whole lot like software languages. Even the analog designers make use of Verilog-A or even just Spice, all text based. When it comes down to building a circuit board or analog circuitry on a chip, there is still a manual "compile" step of drawing diagrams and polygons but that is only because the result is ultimately a three dimensional object (well, more lke 2.5D) and it is the only way to be sure you get what you intended. It is not because creating designs graphically is considered convenient.

Comment Compression could do this (Score 1) 106

Bad form, I know, to respond to your own posting. But it occurs to me that data specific compression could accomplish the goal. Credit card numbers have structure. If you create a mapping between only valid card numbers and the minimum number of bits then encrypt that then it doesn't matter how the data is decrypted. It always produces valid looking credit card numbers. The catch, though, is that the bit mapping needs to be exact. If the total possible credit card numbers is not a power of 2 then there will always be decryption failures that produces detectably invalid results.

Comment How does the decrypter know what to send out? (Score 2) 106

If the software is detecting that the key is bad then all the attacker has to do is use software that doesn't do this. This assumes that the attacker has direct access to the file. If not, then well known throttling techniques apply and the new wrinkle doesn't buy much.

Making bogus data come out without requiring specific software for decryption seems like a very hard problem. Every data type will need, not just unique software but unique encryption algorithms that are both secure and not trivial extensions to known algorithms.

Comment Tandy 1000 was a PCJr clone (Plantronics, not EGA) (Score 1) 178

I never ran into software compatibility problems with my 1000 (for non-game software), but it sucked that Tandy essentially put an EGA adapter in it, but then modified it enough that EGA software wouldn't work with it.. :(

It was not modified EGA at all. It had exactly the same video as the PCJr and output one bit per RGB + one bit luminance just like and compatible with CGA.

EGA was very different in memory layout and EGA monitors used two bits per component.

Slashdot Top Deals

The brain is a wonderful organ; it starts working the moment you get up in the morning, and does not stop until you get to work.

Working...