Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Why do you need this stuff on the internet at l (Score 1) 52 52

If I decide to go out drinking and I'm out late, I can use my phone to tell my furnace to heat up my house before I get home. Normally it goes to 16C after 10pm, which is when I'm normally in bed. This way, when I get home buzzed / wasted, my house is nice and comfy.

Also the Honeywell controllers require fingerpoking to change outside of a subset of their normal range. I can't use remote to change outside of 4.5C to 32C... uh, okay, that's a little more range than I would have expected. Voice limits me to a little less than that, but you'd already be inside and could do a lot more damage by throwing my dining room chairs through 4 windows and the TV.

Comment Re:Amazon doesn't understand helicopters (Score 2) 102 102

That all sounds great, except that helicopter often operate at less than 500 feet above the ground. What happens when EMS is flying at 300ft and crashes into their delivery drone? What about law enforcement? Powerline and pipeline patrol?

I think the 'managed by exception' approach mentioned covers that. Given the gps and communications capabilities of the 'well equipped' drones they could automatically be ordered out of the area and/or excluded from the area. As they would would presumable be excluded from airports, infrastructure like powelines, etc.

In the North East, they even harvest Christmas Trees off the side of the mountain using helicopters, and that is well under 500ft.

The 'communications with other drones' mentioned suggests automated avoidance. Perhaps these 'well equipped' drones would listen for standard aircraft transponders, they seem to include such transponders since they are notifying air traffic control of their position. Avoiding low flying aircraft may be part of their normal avoidance.

I'm not saying they have it all figured out, just that they seem to be considering the sort of things you mention.

Comment That may well be what happens (Score 1) 183 183

Which is why this is pretty stupid. H.264 is "good enough" for most things. Particularly as bandwidth continues to grow. A more efficient encoding scheme would be nice, but it isn't necessary. We can already do 1080p60 video over most net connections with reasonable quality.

So H.265 will have to be appealing not only in terms of bandwidth saved, but in terms of cost. Companies won't move to use it if they have to pay a bunch extra for the privilege. They'll just keep using H.264 and more bandwidth.

Comment Don't try to piggyback on TrueCrypts popularity (Score 5, Insightful) 114 114

If its Linux only don't present it as a successor to TrueCrypt. A very important feature of TrueCrypt is(was) that it targets Linux, Mac OS X and MS Windows. Any archive being available to any of the three platforms.

The successor to TrueCrypt will most likely be something derived from the audited TrueCrypt source code. You just won't compare favorably given the single supported platform. You are just going to create a reputation of being one of the lessor choices, which may be entirely unfair.

Don't handicap yourself. Promote your software on its own merits, don't try to piggyback on TrueCrypts popularity, such a strategy will likely backfire.

Comment Its not closed if you have the source ... (Score 4, Informative) 85 85

The incentive for people to contribute to a closed source project isn't all that much. Remember that open source isn't a gift by your company to the public, it is an offer of trade -- you let the public have the source, the public provides you with feedback (bug fixes, enhancements, etc.) and gets its suggestions provided back to it. It's a circle.

You are confusing proprietary with closed, its not closed if you have the source and sometimes the source is available for proprietary code. Consider libraries with binary-only and binary-plus-source licenses. In the later case I've had the source, complete rights to modify and redistribute my modification just like the vendor supplied binary. There was a community and a circle of benefits. Licensees provided fixes to the vendor, the vendor incorporated fixes in the main source, the main source was available to binary-plus-source licensees. It was very much like an open source community. We had the source, the right to modify and use it, our future was in our hands despite the proprietary nature of the library. Its a model that has worked.

What this particular vendor is suggesting seems similar to the binary-plus-source model, the main difference being no charge for the source option. History suggests this can work, it worked when the source option cost extra.

Comment Actually it is like a model proven to work ... (Score 4, Insightful) 85 85

Yeah, you seem to want to have your cake and eat it too. Doesn't produce a lot of sympathy. Think again about how to make your software free but still want users to pay. What about keeping value-adding plugins or frontends closed and opening the core? If you open source but limit ability of people to make use of the core, what exactly do you expect to gain from such a "community"?

It seems not so much making the software free but making it open to customers. It seems reminiscent of various source licenses I had for various past projects. The vendor offered binary-only and binary-plus-source licenses, fortunately I was able to get management to go for the later. Having the source meant our future was in our hands. I did fix some bugs that we ran in to. One was extremely technical and took a few days to find and fix, reproducibility was extremely low. It was dependent on random memory containing a value that when loaded into an x86 segment register passed verification but led to later permissions violations. It was not something the developers or other customers were running in to, we just got lucky with that random value. For everyone else the random value was failing verification and the erring code path was never executed.

My fixes and the fixes of other customers were incorporated into the vendor's source. We all benefited from the community effort. We had the source and the right to rebuild and link binaries into our projects and redistribute. If we cared to we could have customized things. In practice it was very much like open source efforts for us. Such models work, proprietary with rights to source works.

Comment If Colin Powell had run for President ... (Score 1) 427 427

Furthermore, Colin Powell used the private email server as well as Secretary of State and all of his private emails were lost.

If Colin Powell had run for President it would have been an issue. That is the detail so many people are missing.

Now consider the additional rules and policies that were implemented after Powell, perhaps inspired by Powell's handling. Now consider the greater common knowledge of hacking, official pentagon and white house servers getting hacked, and no one rethinking of whether a self-administered basement email server is a good idea for the Secretary of State. Legal or not it shows a severe lack of good judgment, which is a very important thing to consider in a Presidential candidate.

Comment Sadly she won't (Score 4, Informative) 550 550

Because it is good advice for actual progress. Wu isn't a feminist, she's a professional victim. I mean that literally: She makes her money by whining about being victimized and guilting people in to donating to her pateron to fund her life. She's a developer in only the most basic sense. She has one product ever, a mobile game that is very poor quality. She has no track record for actually working to advance women's rights or gender equality. Her profession is literally being a victim.

So she has no interest in advice from actual successful women developers because she's not. Her issue isn't having lots of skill but being kept down because of gender, it is having minimal skills and then playing pretend about the source of her problems.

That's why she agreed to the Ask Slashdot. She wanted the "mean" questions she refused to answer because she can point to those as examples of "harassment" to further her cause. She's not stupid, she knew what she was doing.

However while she won't take your advice, hopefully other women will, because it is excellent.

Comment Re:NSA SELinux open source, in mainline kernel 12 (Score 1) 100 100

And yet, regressions and other bugs still get in. I'm a big fan of the many eyeballs theory, but there are limitations to it.

Yes, but successful exploitation is a very different story. And such attempts are a bit unlikely when the code is publicly coming from the NSA. Anything coming from them will get extra scrutiny by some.

Comment Licensing of operators, registration of drones (Score 1) 368 368

This is California. One idiot misbehaves and the legislature will pass laws to require licensing of operators, registration of drones, mandatory gps based logging during all flights with such logs preserved and inspectable on demand by a government representative. Failure to provide such logs resulting in a loss of an operating license, fines, etc.

Any given program will expand to fill available memory.

Working...