Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Not fragile: Redundant. (Score 1) 33

This actually looks good to me. Most helicopters can be shot down with a rifle. They are huge engines with large fuel tanks and large, whirling blades, and it is not that difficult to get them to destroy themselves with their own momentum, height, or fuel.

I concur. Helicopters are a collection of single-points-of-failure, disasters waiting to happen. (Particularly the pilot - they have to be continuously controlled and crash almost instantly if anything incapacitates him.) Their vulnerability is justified only because their extreme usefulness oughtweighs it. With eight rotors I'd be surprised if this vehicle couldn't at least come to ground safely with at least two of them destroyed, and the multicopter approach has been under autonomous computer control from the start - made practical only by the automation.

I envision this thing's missions as being primarily extreme rough-country ground transport, with short hops to bypass otherwise impassible terrain, reach otherwise inaccessible destinations or targets, attack from above, or put on a burst of speed when time is of the essence. Think a truck-sized "super jeep" ala Superman. Being primarily a ground vehicle lets it perform longer missions and reduces its visibility and vulnerability compared to a helicopter.

Just because you CAN fly doesn't mean you DO fly all the time. As is pointed out in the webcomic Schlock Mercenary: "Do you know what they call flying soldiers on the battlefield?" ... "Skeet!"

Submission + - Theo De Raadt's Small Rant on OpenSSL (gmane.org) 1

raides writes: Theo De Raadt has been on a better roll as of late. Since his rant about FreeBSD plating catch up (here), he has something to say about OpenSSL. It is worth the 5 second read because it is how a few thousand of us feel about the whole thing and the stupidity that caused this panic. Enjoy

Comment Re:Hardware requirements (Score 1) 641

A lot of that hardware does not have Linux drivers either.

So write one!

(Ba-dah-bing! Thank you, thank you. I'll be here all week.)

Seriously, though. If you're buying hardware with an embedded Windows OS as a necessary component, that's what you signed up for. Take that into account when negotiating with vendors for the replacement.

Comment Just at Microsoft (Score 1) 641

I never thought I'd see the day that anyone would claim Windows Vista was the pinnacle of OS innovation...

Looks to me like the claim was that XP was the pinacle of OS innovation AT MICROSOFT.

After that they jumped the shark with creeping featureitis and failure to support (or provide an adequte, clean, easy upgrade path for) important functionality.

Nothing was said about OS innovation OUTSIDE of Microsoft.

There's also the issue of whether OS innovation was even a Good Thing (TM) for the users of the functionality of the time. (It can still be enabling and yet be a net loss if its costs outweigh its benefits.)

Comment When Harlie Played One (Score 1) 169

I learned this one at Genericon, but it's older than that:

Music: "The Children's Marching Song"
Robert Osband, c.1974
This machine, it played one.
It pushed start and program run.
It's an IBM 360/85;
This computer came alive.

This machine, it played two.
Overloaded voltage to the CPU.
It's an IBM 360/85;
This computer came alive.

This machine, it played three.
Designed its memory to 1 IC.
It's an IBM 360/85;
This computer came alive.

This machine, it played four.
Changed its logic from AND to OR.
It's an IBM 360/85;
This computer came alive.

This machine, it played five.
Memorized data from tape drive.
It's an IBM 360/85;
This computer came alive.

This machine, it played six.
Told the CE what to fix.
It's an IBM 360/85;
This computer came alive.

This machine, it played seven.
Printed out the road to Heaven.
It's an IBM 360/85;
This computer came alive.

This machine, it played eight.
Shipped itself to Rome, Air Freight.
It's an IBM 360/85;
This computer came alive.

This machine, it played nine.
Told the Pope it was divine.
It's an IBM 360/85;
This computer came alive.

This machine, it played ten.
To sing once more push start again.
It's an IBM 360/85;
We computers are alive.

Comment Mod parent up. Legal point for case against Sony (Score 1) 306

That is an explicit claim associated with Sony Pictures Movies & Shows. To get that, Sony had to upload content to the YouTube content system saying "I own this content. Anyone matching it is in copyright violation."

This is a very important legal argument to make in court. By submitting content to the system - or to YouTube in a way that would be interpreted as being "Copyright Sony, rights reserved" by the system - Sony knowingly made a claim of ownership.

This both disparaged BlenderFoudation's title and voided their license to distribute the content, making further distribution by Sony subject to the $150,000 statutory damages penalty.

Comment Worst idea I've heard in years. (Score -1, Troll) 175

And I've heard a LOT of REALLY BAD ideas.

Most of what has gotten worse in Unix/Linux over the last couple decades has been the progressive hiding of the system admimistration mechanisms - previously built on human-readable text configuratin files - behind GUI configuration interfaces and excessive complexity. (See upstart and systemd for examples of the latter.)

Now they want to bury the kernel error messages in a QR code? That REALLY takes the cake.

Comment Re:No Wireless? (Score 3, Insightful) 97

Uh, no thanks.

I much prefer that wireles to be on a mini-PCIe card so I can upgrade it if necessary.

Damn near everything that comes with Wifi/BT ends up being single-band b/g/n and BT 2.0. For $35 I can get a dual-band, a/b/g/n/ac card w/BT 4.0.

Slapping it on the board greatly reduces options.

Comment Routers are supposed to be "dumb as rocks". (Score 1) 149

I do not see why TCP and IP could not have been created as single layer.

That was one of the major divergences from other networking schemes of the time that gave TCP/IP an advantage.

IP is a lower layer than TCP. It's about getting the packet from router to router, and is as deep into the packet that core routers have to look to do their jobs. Core routers are supposed to be "as dumb as rocks", putting as little effort as practical into forwarding each packet, in order to get as many of these "hot potatoes" moved on as quickly as possible and keep the cost of the routers down (and to drop any given packet if there's any problem forwarding it).

TCP is one of several choices for the next layer up. It runs only at the endpoints of a link. It does several things, which are all about building a reliable, persistent, end-to-end connection out of the UNreliable, "best effort", IP transport mechanism. Among these things are:
  - Breaking a stream up into packet-sized chunks.
  - Creating reliability by hanging error detection on packets and saving a copy of the data until the far end acknowledges successful reception, retransmitting if necessary to replace lost or corrupted packets.
  - Scheduling the launching of the packets so that the available bandwidth at bottlenecks is fairly divided among many TCP sessions, while as much of it is used as practical.
  - Adding an out-of-band "urgent data", channel to the connection (for things like sending interrupts and control information).
Some other networking schemes of the time did this on a hop-by-hop basis, requiring much more work by the routers. TCP put it at the endpoints only.

Comment Adopton would have been far slower, too. (Score 2) 149

If TCP/IP had included crypto, we'd all be using IPX now days...

The reason TCP/IP proliferated was because it was light-weight and easy to implement. Crypto would have killed that.

There would have been more resistance to adopting it, too.

As it was, there was substantial resistance among people and institutions sited outside the US, because the Internet was a DARPA project, i.e. U.S. Military. Other countries, organizations within them, and even some people in the US, were concerned about things like what the US might be building in - like interception and backdoors for espionage and sabotage - or just because "Military! Bad!". Including encryption from the then officially nonexistent, deepest secret, communications spy agency would have boosted that resistance substantially.

Comment Try reclaibrating your (Score 1) 129

.... the only group I can actively imagine making use of [2nd amendment] against the government is also the group I least want to see use it against the government.

Then perhaps you should read a little history and see who has actually used privately-owned guns against their own govrernments - and what has happened when privately owned weapons were banned and confiscated.

You should also consider that privately owned guns are "used" against governments by simply being there, rather than fired.

Example: Richard Nixon is on record, during the Vietnam conflict, as having asked a think tank what would happen if the elections were canceled and being told that this would be a likely trigger for an armed uprising to overthrow him.

You should also know that there is a certain amount of posturing involved. With using nukes to prevent nuclear war via the Mutually Assured Distruction doctrine, Presidents had to put on a show of being just crazy enough to actually USE them - whether they were or not. In the case of individuals with small arms it may not be "crazy" (as in "blow up the world") - just "dedicated". But for the threat to be effective at averting conflict it must appear to be real.

Think of gun in private hands as paying an insurance premium.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...