Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Just damn (Score 2) 411

I loved his acting as much as anyone, but I disagree that it was necessarily a sad day. He was, after all, 83 years old. He beat the average life expectancy in this country by a wide margin. He made an impact on a huge number of people, as well. He was ready to check out and move on. Really, what could you reasonably expect an 83 year old man to do beyond this point anyways? I'm happy for him and all he's done.

Yes, he truly lived long and prospered...

Comment Re:GNUradio? (Score 1) 135

Test equipment is allowed to transmit and receive on those frequencies. If it looks like a radio, it can't. I have a number of cellular testers hanging around here that can act like base stations, mostly because I buy them used as spectrum analyzers and never use the (obsolete) cellular facilities. Government has different rules regarding what it can and can't do in the name of law enforcement, although FCC has been very reluctant to allow them to use cellular jammers.

If you can afford it, something from Ettus would better suit your application.

Comment Re:Predicting the future is hard (Score 1) 347

Joel Spolsky has a take on this problem, called Evidence-Based Scheduling, which tracks past estimates against their deliveries, and uses that to improve future estimates.

That is a good idea, but you have to be careful how you track work. We used to do estimates based on hours worked and thus come up with a price. Since the work was fixed price the actual hours were irrelevant to the customer's cost; but very relevant to our team. Going over was bad; and going under yielded us no benefits other than having to explain low utilization; even if we had huge profit margins. As a result, our total hours billed to a project always exactly matched the estimate. One word of caution, never let the sales person estimate the cost or duration; they are rewarded on sales and so have an incentive to underbid to get work and let the team try to deliver.

Comment Re:Simple methodology (Score 2) 347

A well defined project can be estimated. Change Orders estimating needs to be done properly and BILLED - the cost of re-analyzing is a real cost and the business needs to see it. Once you get that across the number of change requests decreases dramatically.

Software engineering is Engineering... some of the costs are inverted, but otherwise it's the same project management as other engineering projects.

Correct. Our rule was "Give away the initial project because we'll retire on the change orders..."

Comment Re:Schneier's opinion isn't what it once was (Score 1) 114

This isn't like a door lock where its possible to overcome them and we can't stop them from being overcome, so we take advantage of locksmiths when we screw up. Locks can not be 100% secure, encrypted data can be effectively 100% secure and thats a different environment.

While I agree with most of your points there is no such things as 100% secure data; some is only harder to get than others. It only take step right approach to get it.

Comment Re:"Proprietary So I Get Paid", from Bruce Perens? (Score 1) 135

Hi AC,

Matt Ettus has a story about a Chinese cloner of the USRP. The guy tells Chinese customers that it is illegal for them to buy from Ettus, they must buy from the cloner instead. Then, when they have problems and require serivce, he tells them to get it from Ettus. Who of course made nothing from their device sales and can not afford to service them.

This is not following the rules of Open anything. It's counterfeiting.

So, sometimes it is necessary to change the license a little so that you will not be a chump. I discussed the fact that the hardware is fully disclosed but not Open Hardware licensed with RMS, the software is 100% Free Software, and there is a regulatory chip you can't write. We can go for Respects Your Freedom certification that way..

I've paid my dues as far as "Open" is concerned, and Chris has too. This is all we can give you this time.

Comment Re:Why custom punched end panels ? (Score 1) 135

The case selection was so that we'd have at least one case that would work. We did not take much time on it. We'd be happy to have other people designing and selling cases.

The version after this one requires cases that look like real radios. That is going to be a bigger problem. We don't yet have a mold-design partner, etc.

Comment Re:GNUradio? (Score 2) 135

We implement it as a chip that intercepts the serial bus to the VFO chip, and disallows certain frequencies. On FCC-certified equipment we might have to make that chip and the VFO chip physically difficult to get at by potting them or something. This first unit is test-equipment and does not have the limitation.

Comment Re:How about international versions? (Score 1) 135

Anyone who is good at electronics can get around regulatory lockouts. We're not allowed to make it easy. But nor are we technically able to make it impossible.

U.S. regulation only allows Part 95 certified radios to be used on GMRS, and Part 95 requires that the radio be pretty well locked down. But all of those Asian imports are certified for Part 90 and there are lots of users putting them on both Amateur and GMRS. If FCC wanted to push the issue with any particular licensee, they could.

Comment Re:awesome! (Score 1) 135

The D-STAR issue is not really ICOM's fault. JARL designed D-STAR (not ICOM) and put the AMBE codec in it because nobody believed that you could have a good open codec at the time. We now have Codec2 (a project I evangelized and recruited the developer) which is fully open. And we do have a software AMBE decoder in Open Source, although the patents won't let us use it. That is why I am working on the patent issue (as noted in the last slide of the presentation).

I know about the counterfeit FTDI chips, and Matt Ettus told me what has happened with the Chinese clone of USRP. We know what to do.

Comment Re:Many are leaving ham radio too (Score 1) 135

And it's because of No-Code. We looked at the licensing statistics and thought we'd preside over the end of Amateur Radio in our own lifetimes. That's the main reason I worked on no-code. There was really strong opposition among the old contingent, and ARRL fought to preserve the code for as long as they could. Someone even asked me to let Amateur Radio die with dignity rather than sully it with no-code hams. Gee, I am glad that fight is over.

Comment Re: Many are leaving ham radio too (Score 1) 135

Though a nice compromise might be to allow such things in certain bands only.

That is why there are different radio services. Hams really only have a few corners here and there of the radio spectrum. There really is a service for everyone, although you should be aware that the entire HF spectrum would fit in a few WiFi channels, and all of the Amateur HF spectrum would fit in one. So, we don't really have the bandwidth at all. And people who want the bandwidth on UHF already have WiFi and the various sorts of RF links, etc.

Comment Re:Many are leaving ham radio too (Score 1) 135

The internet really sucks and we don't want another one on ham radio. Nor could we possibly have the bandwidth to support one. The entire HF spectrum fits in just a few WiFi channels.

To satisfy the demands of the "it should be anything goes" crowd, we have CB radio. And there are all of the common carriers, etc.

So, I can't sympathize, and even if I did, there are not the technical resources there.

Sorry.

Comment Cryptographic keys (Score 1) 135

I am afraid that's not the way it works. Public-key encryption doesn't really give you the capability to decode the communication of two other parties unless you get the secret (rather than public) key, which they have no reason to give you. There is also a session key that is randomly generated and lives only for the duration of the connection, and there is the potential for VPNs or tunneling that further obscure the actual communication. It's actually very difficult for a monitoring station to even get 100% of the packets reliably, although the two stations in the communication do get them. So you may not be able to reconstruct all of the bits in the stream, and this will break decryption too.

All of this adds up to so many technical hurdles that in practice you have to be NSA to decode the communication, hams who are attempting to self-regulate will not have the appropriate resources.

Slashdot Top Deals

"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno

Working...