Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:price? (Score 1) 328

Whilst CFLs worked as a stop-gap until LED lights could become feasible, I do wonder if they have done long term harm to people's acceptance of efficient lighting - for a long time, "energy efficient lighting" is going to be associated with "takes 5 minutes to get bright enough to see" thanks to CFLs...

That said, I might miss CFLs in my bedside lights if I ever have to replace them with LEDs - that's the one place where a slow start-up is quite nice!

Comment Re:Pilot priorities during an emergency (Score 1) 208

Calling Mayday properly requires selecting the Guard frequency to transmit on. Everybody normally flies commercial and military aircraft with the guard receiver selected so anybody around will hear the shout... and perform relay duties if required. But to make a proper Mayday call requires actually selecting the emergency frequency on the radio to transmit on. Some aircraft also allow the pilot to set the Crash Position Indicator transmitter going as well in advance of the crash so the satellite systems can pick it up and triangulate on them...

Comment Re:Armegeddon for indigenous marine life. (Score 1) 197

these will seriously fsck up the Severn Estuary ecosystem not to mention destroy the Severn Bore... and massively increase flood risk on the Gloucestershire flood plain... don't want another event like back in 2007 where we came within inches of the flood topping over the hastily constructed defences at the power distribution centre and killing power to most of Gloucestershire...

Comment Re:well (Score 1) 418

Yeah I never understood that, why try and recover the clock signal from the data stream? If I where designing it I would have my DAC monitor the stream to calculate what the clock signal is supposed to be then generate my own dam clock signal.

My guess is:

If you recover the clock from the stream, you just need to roughly control the motor (CD) RPM and stream what you read. If you run your own clock you need a buffer and you then either need to dynamically tweak the motor speed based on how fast the buffer is filling/draining, or you need to read the CD a bit too fast and stop/resume every so often. Clock recovery sounds much simpler to me.

Comment Line of sight? (Score 3, Interesting) 123

Will it have the same line of site limitations as current satellite Internet? I'm in Seattle, and with providers like HughsNet you need a very good line of sight to the south to get service. IIRC, where I used to work we had the dish pointed only 24 degrees above the horizon.

These sats are going into LEO, not GEO, so their position in the sky won't be fixed. I imagine you'll used a phased array antenna to track them. The good points being: lower latency, no requirement to see the southern horizon specifically. The bad point being that you'll need a view of a bigger chunk of the sky to avoid signal dropouts as the satellites move - how big a chunk depends on how many satellites they have up there (and therefore how many are above the horizon at the same time). If they have enough satellites, it may work out better for you.

Comment Re:Malware (Score 1) 181

If a program needs to look at stuff in other file structures then give it read access

Great! $malware got read access to your bank details.

You want it to be able to write to files in those other directories, fine, it reads in a file it isn't allowed to overwrite or change, and then saves it's own copy that it can molest in whatever way it wants.

So now instead of having a single copy of the file, you have a separate copy saved by each application that has been used to process it - creating a mountain of almost-identical files that the user has to keep track of is not a user friendly way of doing things.

Better is to have a versioned filesystem - each time a file is changed (by any application!) the delta is saved and the filesystem keeps the old data hidden away. Most of the time everything behaves as normal - you have one copy of a file, no matter how many times it is edited. If you need to roll back some changes then you just ask to see previous versions of that file, much like a source control system. And indeed, there are a number of file systems that do exactly this - if you care about such things there's nothing stopping you doing it.

It doesn't stop malware reading your files or modifying them, but it does mean you can recover the unmodified versions... but then doing backups (which everyone should be doing anyway) gives you similar protection.

Comment Re:Malware (Score 1) 181

And, hell, why do applications get the run of every file I use under my account? Should they not have to request such things first? Even on Unix-likes, if you get on as my user, you can trash all my data - why?

Because anything else would require popping up numerous "would you like to allow this application to do $foo" boxes, and then you end up training the user to just hit "yes" on everything because it's too damned annoying to make a decision every time when the vast vast majority of access requests really are legitimate.

Sandboxing based on applications making their own decisions and being relatively trustworthy might not be a bad plan though - i.e. if your web browser has an immutable list of files it needs access to, and you trust your web browser, that provides some level of protection when some malware compromises the browser, so long as the immutable list really is immutable and the malware can't modify it.

I'm sorry, but the very concept of a virus scan happening "at scheduled intervals" or after you've already double-clicked on the file just tells you that it's too late before you start.

Well no, if you can roll back everything that happened between the "all clear" scan and the "you've been cracked" scan then that's certainly much better than nothing.

Fact is, I didn't install it and I have no idea what it ACTUALLY does.

You don't know what most software ACTUALLY does, even if you did install it - most software people use is closed source, but even the open source is a black box unless you actually audit it.

Slashdot Top Deals

Repel them. Repel them. Induce them to relinquish the spheroid. - Indiana University fans' chant for their perennially bad football team

Working...