Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Inexcusable (Score 1) 157

There is a large group of consumers that actually do want a lot of those silly things. Just look at some of the Kickstarter projects that are out there, or some of the IoT stuff that people want for example (Internet connected light bulb anyone?), or people who buy new phones as soon as a new model comes out jut because it's the new model with cool new features. Of course, I agree that there is also disconnect between what consumers want and what a company thinks they want as well. It's both.

Comment Re:Inexcusable (Score 1) 157

Its' not the engineers that think that. It's their managers and the marketing department: new cool features can be charged for and gives a competitive edge, because that's what your average consumer wants. In contrast, security is seen as a cost. You need dedicated people for security, code review, etc. and all of that costs money. It can delay a product. It can make the product more expensive. This is counter to what the consumer wants: cools stuff as cheap as possible. This is why security sucks.

Incidentally, part of the blame here lies with the consumer. With the pressure to go cheaper and cheaper, corners are cut, manufacturing is moved overseas, coding and engineering are outsourced to copy-paste OEMs, all in the name of making things as cheap as possible. Then, that same consumer complains that jobs are taken away. Not saying this is the only reason (profit being the obvious other one), but it does have an impact. This all in the end means security is seen as not important, so no one cares.

Comment Re:As a C programmer (Score 1) 315

You can't compare arbitrary pointers in this case. You would have to cast them to integers (e.g., unsigned long) first and do the comparison there. Basically, the workflow is a) cast source and destination to long integers, b) compare if they overlap (dst - src >= len) and if so do a forward copy, otherwise a backward copy. The reason for not using a backward copy in all cases has to do with a speed penalty (for preserving alignment).

Submission + - Internet of Things: This Is How We Build It (technology.org)

An anonymous reader writes: The problem with the Internet of Things is that few people truly understand what it is really about.

A large percentage of people who do understand it tend to discard it as yet another marketing hype such as “the cloud” with very little real substance. Due to all kinds of news reports on security issues, vendor lock-ins and lack of open standards, cost overruns, etc. these people tend to see their opinions confirmed.

We also tend to agree with this group – to a point. The reason we do is that we see the same mistakes being made as countless numbers of times before. However, we do see the great potential of internet connected devices. Probably not the refrigerators and such, but closer to the origins of the Internet of Things: machine to machine, also known as M2M.

Submission + - Internet of Things – less hype, more M2M (iottechnews.com)

PurpleAlien writes: The problem with the Internet of Things is that few people truly understand what it is really about.

A large percentage of people who do understand it tend to discard it as yet another marketing hype such as “the cloud” with very little real substance. Due to all kinds of news reports on security issues, vendor lock-ins and lack of open standards, cost overruns, etc. these people tend to see their opinions confirmed.

We also tend to agree with this group – to a point. The reason we do is that we see the same mistakes being made as countless numbers of times before. However, we do see the great potential of internet connected devices. Probably not the refrigerators and such, but closer to the origins of the Internet of Things: machine to machine, also known as M2M.

Comment Re:It's Economics not Cryptography (Score 1) 48

Same here. I see the same things. We design everything with security in mind from the get-go. However, this has meant having to skip customers who just didn't care (and wouldn't cover the costs that come with it). Most businesses wouldn't do that, so this all leads to horribly insecure crap.

Comment Re:We aready have this (Score 1) 33

Over here in Europe we have http://www.eurocircuits.com/ You can get prototypes of your board in single digit quantity for very little money ( 100Euro easily). Seven days later, you have your boards in the mail. No issues with double sided boards, or even multilayer. They also take Eagle files directly, so no need to generate Gerber files etc. In addition, their web interface allows you to visually inspect your boards to make sure all the design rules are correct, and this also helps getting to a lower class of complexity of the PCB and lower your cost even further.

Comment Re:I am an embedded developer - just do both (Score 1) 323

It is memory, registers and ports, e.g. BSF STATUS,5 would mean set bit 5 in the STATUS register. The reason why it is called 'File' is for historical reasons from terminology such as the 'register file'. This is apparent in other instructions such as FSR (File Select Register). The 'register file' is an array of the processor registers.

Slashdot Top Deals

With your bare hands?!?

Working...