Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Conditional recording (Score 2) 447

by Smallpond (#49364931) Attached to: Why the Final Moments Inside a Cockpit Are Heard But Not Seen

Perhaps they could video the cockpit (and the fuselage for that matter) and destroy the footage once the plane has safely landed. There could be streaming capability to the ground and if the feed is accessed, the pilots and crew receive a notification. Any unauthorized breach would be detected immediately. In the case of Germanwings, ground control would have been able to see what's going on once they detected the loss of altitude. It stifles me that in 2015, a young troubled copilot can end 150 lives in a way that can easily be prevented with simple technology.

How is it any different than a ferry captain or a bus driver? There are many more fatal accidents from both of those occupations and neither has much of any monitoring.

Comment: Re:a reversal to the open cockpit doors of the pas (Score 1) 447

by Smallpond (#49364925) Attached to: Why the Final Moments Inside a Cockpit Are Heard But Not Seen

would probably help more. exactly how many plane hijackings have been prevented by locked doors in the last 14 years ? that's the problem with security theatre - there's no stepping back until it takes a violent end (e.g. totalitarian society).

One Jet Blue flight was protected by locking the pilot out after he went crazy.

Comment: Re:How it's done: Link to article. (Score 2) 324

by Smallpond (#49158309) Attached to: Ask Slashdot: How Does One Verify Hard Drive Firmware?

That's a great article. So to answer the question in the summary, the way to verify your firmware is:

        Buy an identical replacement drive
        Use the vendor tool to install the same firmware version
        Use the tool described in the article to read the firmware from each drive over JTAG
        Compare the two copies to see if the suspect drive has been modified.

Comment: I've got one (Score 1) 129

by Smallpond (#49011777) Attached to: Replacing the Turing Test

A test of intelligence should be dealing with unforeseen input. The problem with chatbots is that they are just giving pre-planned responses. How about trying to land a rocket on the moon while being bombarded with spurious input from a radar device that was accidentally left on? Given the computers in use by NASA in 1969 that's pretty intelligent behavior.

Another would be landing a rocket on a small floating platform. We'll see how that plays out tonight.

Comment: Re:Guy allegedly does something stupid (Score 1, Insightful) 327

by Smallpond (#49008087) Attached to: Swatting 19-Year-Old Arrested in Las Vegas

If police response was less drastic, there would be no swatting. The problem is that police don't just show up, knock on the door, and ask if everything's OK They show up assuming that people in the house are armed and likely to shoot at them. The swatting perpetrator is hoping that people will die and should be prosecuted for attempted murder. If USA did not have its weird belief that guns make you safer then maybe fewer people would be pulling guns out during domestic disputes and fewer would consider it a pastime to incite armed invasions.

Comment: Re:Or maybe (Score 2) 252

by Smallpond (#48929581) Attached to: One In Five Developers Now Works On IoT Projects

Not the same. Embedded development was mostly about reducing cost by replacing custom mechanical and electronic devices with microprocessors and software. IoT is about taking inexpensive things and adding features in order to boost revenue, and also to create new revenue streams by collecting and selling personal data.

If you steal from one author it's plagiarism; if you steal from many it's research. -- Wilson Mizner