Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Waiting... (Score 1) 144

OK, here's a site with an interview with IDEO's designer. It has the key pictures without the UI from hell.

This is the Eric Schmidt vision of the future. People will still go to offices and have meetings. They'll just have better cars and presentation tools, and better delivery services for physical stuff.

Will we really need that many office workers? That's the huge question. Given the head counts at newer companies, probably not.

Comment Waiting... (Score 1) 144

3% loading...
Page with 3 icons loads. Click on first icon. Background sound loop of birds chirping with wihite noise and gap at the end of the loop starts. That's all that happens.

Firefox 33 on Ubuntu reports: Media resource http://automobility.ideo.com/a... could not be decoded. automobility.ideo.com
TypeError: e[0].play is not a function main.js:1
TypeError: e[0].pause is not a function main.js:1

Don't they test their code?

Comment My interpretation (Score 1) 36

Walker read the WSJ http://online.wsj.com/articles/kimberley-strassel-scott-walkers-2016-challenge-1415923731.
This is basically an open letter from Rove telling Walker that if he has any ambitions, he'd better prick a finger and sign on the goatskin.
Walker, sanely, is gauging whether his soul is worth wading through the wreckage in the wake of #OccupyResoluteDesk.

Comment When cars are self-driving and shared (Score 1) 454

...they'll all be owned by Uber.

There's a network effect for shared vehicles. Availablility is best if you have one big pool of cars rather than lots of little ones. So there will be a single winner in that space for each city.

Imagine Uber having the power of GM and Google combined. Run by the current team of assholes.

Comment Re:Police legal authority (Score 1) 165

I know, the stingray is essentially a hacking tool. That makes you think though, why on earth is there a large wireless network carrying sensitive data without TLS (transport layer security), or encryption between the modem on the phone, and the carrier? Either the contents are not sensitive, or the carriers / cell phone manufactures are complicit or worse.. incompetent.

GSM dates to 1987. When it was created, the previous mobile telephony standard was analogue - you could listen in on calls just with a regular radio. There was a very small amount of digital signalling to the network, but the field of commercial crypto hardly existed back then and subscriber cloning/piracy was rampant. GSM introduced call encryption and authentication of the handset using (for the time) strong cryptographic techniques. It was very advanced. But it didn't involve authentication of the cell tower to the handset, partly for cost and complexity reasons and partly because a GSM base station involved enormous piles of very expensive, complex equipment that had to be sited and configured by trained engineers. The idea of a local police department owning a portable, unlicensed tower emulator was unthinkable, as the technology to do it didn't exist, and besides .... trust in institutions has fallen over time. Back then it probably didn't seem very likely police would do this because they could always just get a warrant or court order to turn over data instead.

When 3G was standardised, this flaw in the protocol was fixed. UMTS+ all require the tower to prove to the handset that it's actually owned by the network. Little is publicly known about how exactly Stingray devices work but it seems likely that it involves jamming 3G frequencies in the area to force handsets to fall back to GSM, which allows tower emulation.

The latest rumours are that the company that makes Stingrays has somehow found a way to build a version that works on 3G+ networks too called "Hailstorm", but it's dramatically more expensive and as mobile networks phase out GSM in the coming years police departments are having to pay large sums of money to upgrade. The whole thing is covered in enormous secrecy of course so it's unknown how Hailstorm devices are able to beat the tower authentication protocol. Presumably the device is either exploiting baseband bugs, or is using stolen/hacked/court-order extracted network keys, or it was built in cooperation with the mobile networks, or there are cryptographic weaknesses in the protocols themselves.

Comment "4:3" vs "4x3" (Score 1) 330

It's not 4:3, it's 1:1

Yes. And he was saying "4x3". As in "put 12 display in an array. 3 row of 4 screens each."
You end up with a giant wall, with 4:3 aspect ratio (as each tile is square).

Then you buy 132 more displays, arrange them in 16 columns of 9 (16x9) and you can cover a building's facade with your very own 16:9 tiled jumbo diplay in LD ("ludicrous definition") and create an open-air cinema with your neightbours

But, as he mentionned, driving 144 display tiles in total is going to be a little bit complicated.
(5 display max per Radeon card. 4 Radeon cards per motherboard. 20 displays per PC Tower. You could probably driver 2 tiles per display port using splitters like matrox is down, so you need 1 PC tower per 40 tiles. So at least 4 bit PC towers to drive all this).

But totally worth so you and your neighbours can together brag about being the first "Ludicruous Definition" cinema of the city (256x the resolution of Ultra HD).

Slashdot Top Deals

A meeting is an event at which the minutes are kept and the hours are lost.

Working...