Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:This is why standard protocols help (Score 2, Informative) 69

Hello? You can buy Bluetooth-USB-modules for as little as $3 from Amazon. And that is the price for a single item sold to a consumer. The prices of development-kit-level items is hardly comparable to the actual price to implement Bluetooth in a mass-produced gizmo.

I wonder how come you didn't find that the 433MHz wireless modems cost $40 at Sparkfun as well..

I believe a large reason, if not the largest, for not using Bluetooth in simple wireless gadgets is the amount of electricity it takes compared to a simpler custom-protocol device on the 433MHz band.

Comment Re:Now if IPv6 could get fixed... (Score 1) 460

..did it configure the DNS for you as well? No? How did you configure that then?

I'm guessing you had already IPv4 configured (manually or via DHCP) and used its DNS settings. I suppose that's a decent solution for the time being, as most hosts already are configured to IPv4. But I suppose at the same time they could have their IPv6 address assigned over DHCP too, even if via a DHCP extension..

(Although I run radvd also, and it's great, until you have accidentally ran it on a host that used to do teredo, and you're no longer running it: happy times removing the IP from all hosts.)

Comment Detecting CPU consumption (Score 1) 216

The article isn't loading for me, but: can't they simply measure the amount of CPU used during the benchmark and use that information in the benchmark? I don't think it's basically evil to perform that kind of offloading (except in this case when the rules of 3DMark forbid using empirical data on it to optimize performance; but then again, I would imagine many other pieces of software also get this treatment without bad effects on quality or game experience), but dynamically detecting the situation would definitely be complicated; and it might even sometimes give the wrong answer.

One pretty useful heuristic for this kind of optimization would however be "is the CPU usage high without offloading GPU work to CPU: if so, don't do it". Hey, maybe the drivers could have a 'profiling'-mode, which would perhaps slow the performance but figure out the optimal parameters for running the program.

Comment Re:Interconnect is NOT at FSB speeds (Score 1) 303

However, Infiniband latency (according to Wikipedia) is in the range of 200 nanoseconds, which is around 100-1000 faster than a gigabit network. That can make a huge difference in certain operations. Also it seems to me the Infiniband protocol is more suitable for clustering than just shoveling data over local network, with operations such as direct memory access and transactions.

Also I wouldn't say the 8Gbit Infiniband latency is anything to sneeze at, after all, 10Gbit Ethernet gear is just coming.
 

Image

Teenager Invents Cheap Solar Panel From Human Hair 366

Milan Karki, 18, who comes from a village in rural Nepal, believes he has found the solution to the developing world's energy needs. A solar panel made from human hair. The hair replaces silicon, a pricey component typically used in solar panels, and means the panels can be produced at a low cost for those with no access to power. The solar panel, which produces 9 volts (18 watts) of energy, costs around $38 US (£23) to make from raw materials. Gentlemen, start your beards. The future of hair farming is here!

Comment Re:Still limited (Score 1) 297

Well, of course RIAA can also look for certain titles of interest on the web, but it's more difficult than simply searching for generic pirated content.

But, you mention posting links to torrents instead of uploading them as images. Where do you put the actual data in that case?

Comment Re:What? (Score 1) 297

A program that will clear out meta data of the file (not difficult to expect on a image hosting site, even if only to remove unused thumbnail data) will also eliminate such content. Also, it is easy to automatically detect images that have (significant amount of) content other than image data. Detecting these hid.im-files would require a specific algorithm written for it - although, not a very difficult one. (But prone to fail should the format be changed.)

Comment Re:Why the fuck MUST it be hackable? (Score 1) 208

There's a difference between hacking a device you own and you use, and a system that's used by others.

It's not just IT people. People all times have fiddled with devices they've had, and I believe this is in part how many inventions have been made. It just is that some people do it with computing devices and other people do it with, say, cars. Software-based devices are much more malleable than devices built out of screws and bolts; just changing a few lines can go a long way making the device do what you like, instead of doing what the device builder thought would be good.

It is quite difficult to turn a toaster into a waffle iron. But how about making your mobile phone location-awarely be silent automatically while you are in the movie theater? How about interfacing your car GPS with your mobile phone's GPS to mark the spot where your car is at the moment? It can actually be fun to do those things, which is actually the biggest reason why people do it! Don't you have any spare time? All work and no play?

Regarding the "unpredictability" - well, if they're doing it for themselves, it's just them that need to worry about it. It's not like that all commercial devices behave fully predictably. Why would "an ordinary user" make use of my device? It is each person's personal choice to make use of a customized - or self-built - device.

I too can see that there are interests to not make systems hackable. But where is the downside? History has shown that it has been an excellent way to make a device or platform more popular by giving people the possibility to play around with it. Perhaps an open source project about D.C. metro signalling would indeed allow people to find issues in the system and fix them? Of course, it's not likely to attract a lot of eyes, because many have a metro system they can run at home - not that fun.

Comment Re:Why the fuck MUST it be hackable? (Score 1) 208

It appears you don't have a clear idea of what is being discussed here. How is a PDA-class device with navigation going to cause a car crash? And what would be lost if someone indeed managed to change software on my device without permission, I can always just reflash the firmware and I'm set again?

Having hackable devices means that when you find something that doesn't work or doesn't work the way you like, instead of bitching and whining to the vendor, you are actually in the position to do something about it. Possibly even share the solution with someone else. Which also means that the solution might already be out there.. You might actually learn something while fixing the software, too.

If everything just worked Just The Way I Wanted(TM), there would be no need - or atleast much less need - for hacking. Unfortunately, until the world is perfect, that's not going to happen. I prefer hackable devices over non-hackable just for the capability, even if I never did do any alterations to it, though - why take the chance?

Comment Re:TomTom (Score 1) 208

Well, it seems to me N810 has the development side much more official and open: for one, it isn't called hacking ;-). Also I doubt the mapping software itself on the TomTom unit is GPL.

But on the other hand, the built-in GPS of N810 is not very sensitive. You also need to pay extra for the navigation features (obviously no source available for that component). The navigation software doesn't seem as nice as the older TomTom software I've tried on a S80 phone. I haven't tried Navit (just read about it on this thread) so no idea if it's any good.

Comment Re:Not-so-green phone (Score 1) 246

You know what's more ridiculous? Blasting a megawatt of power and have no use of it at all!

Oh yeah, well, someone might be using it for receiving..

I don't think it has yet been suggested - by others than Tesla, or atleast by Nokia - that we should be building separate broadcasters just for broadcasting power to these devices with their abysmal power-efficiency.

Slashdot Top Deals

Recent investments will yield a slight profit.

Working...