Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:The issue is not title 2 (Score 1) 124

Why ipe in the ground fiberoptics from the 70's will carry that same 80+ gbps as what you install today. Not quite as far but no real matter.

Pipe have problems they get full, companies will relay the same infrastructure but in gear on poles to make it cheaper and less reliable. It starts to be a competitive advantage to have them full so the next guy can not put his own in place or have to wait. The last mile needs to be unified and firmly under muni control. Once you get to the CO it's trivial to throw a big bundle to your own space and not have to live by the CO rules and have the muni cross patch you in the CO. Now nothing says the muni can not outsource the maintenance etc of the fiber plant either. It simply needs to maintain a even and fair connection to any that care to provide services.

Oh sure companies will complain say they will not serve the market etc etc.

Comment Re:The issue is not title 2 (Score 2) 124

Only 10gbps get a dark fiber run and you can cost effectively get to 80gbps via a cwdm passive mux.

We should be decoupling provider services and the last mile with an all passive all optical last mile. Providers can meet at the CO (or backhaul or pay others to backhaul) and hand off a CDWM channel to the muni. Macsec encryption can keep the muni from sniffing anything. If the muni is smart it rolls out muni access. Throw in IPv6 and it become easy to have a single router send things across the muni next vs their transit provider since using the closest match is a basic ipv6 function. So the muni gets a /32 or whatever thats 4 billion subnets and we can give out 4 billion of those. Now everybody has basic access to public services schools etc. Businesses pay a couple of line fee's to get a leased line in town well less than 100 a month for a 10ge to an expansion office or provider.

Comment Re:Does this work for any phone? (Score 1) 89

Open dots it's not wireless rather a contact layout.

http://www.eetimes.com/documen... it pretty clear at this point the only one with any market penetration is Qi.

VL-Bus predated PCI to market being the way to connect vid cards in the 486 days, PCI come out with the pentiums. SCSI was better and still is better, servers are still using SAS and most SATA devices use the SCSI protocol over the SATA bus. I can not think of a case where parallel ports vs usb was a choice maybe later generation zip drives.

In any event I do not see a whole lot of public wireless charging ports. Starbucks being the big one but they are using the powermat devices.

Comment Re:...actually that's kinda cool. (Score 1) 89

Still want a VoIP desk phone with a Qi charger, bluetooth cellphone and headset connectivity. Something where I could charge my phone, use the better handset/speakerphone of my VoIP phone and a bluetooth headset. A perfect world would also allow multiple phone ringing for inbound calls, some contact sync, and possibly calendar/task sync as well.

Comment Re:Does this work for any phone? (Score 4, Informative) 89

It is Qi so most will work it's pretty much the winner. It's only 1080P (ish since it uses AMD's sync protocol). It's a PLS panel so none of the IPS goodness.

Pretty much is a fairly meh monitor with a qi charging puck shoved into the base they are literally a few bucks added to the BOM.

Plenty of people have modded bases, keyboard, desks etc etc etc to add qi charging this is just a cheap gimmick to try and make a meh monitor look cool.

Comment How about those backdoors (Score 1) 80

Exploits that were watermarked to the client that your sold them to.

These are not tools that should ever be in police hands. Requiring that outside firms do this sort of thing and thus need to keep the paper trail of warrants that allowed each and every event. Require that they be audited and a special prosecutor look into any apparent/potential breaches of law and prosecute them to the full extent (no plea deals). Require that all security vulnerabilities be disclosed to the public in 30-90 days. Tighten up these warrants in the first place and full public disclosure of the same after a reasonable investigatory period say 90 days.

The NSA etc should have these tools and a very big firewall between them and law enforcement.

Comment Re:tip of the iceburg (Score 1) 157

Oh we know how, it requires time and thought.

Now the ECM should be able to send things to the BCM and Infotainment gear. The reverse should be very limited, pretty much remote start and that should be thoroughly checked for sanity. Old school would be serial in one direction yea there are some hardware hacks but not that problematic.

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...