Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Re:What we've learned from Bitcoin (Score 1) 221

by crovira (#46468375) Attached to: The Future of Cryptocurrencies

Accountants LOVE the idea that every coin you spend is traceable.
  A BitCoin like crypto currency is likely in the offing as a supplement to cash and bank transactions
Backed by the full faith and credit of the US it is likely to be one of MANY co-existing currencies. (Just like we have now! [on paper.])

Comment: Only work if documents we on computer. (Score 1) 57

by crovira (#46303681) Attached to: S. Korea's Cyberwar Against N. Korea's Nukes

As things stand, I doubt that the NK is that advanced. It doesn't need to be. There were NO COMPUTERS when the first A-Bomb was dropped or when V2s flew.

The purpose of an atomic bomb atop a rocket is to get near enough to a target and detonate.

It does not need any sophistication to do so,

it just needs enough propellant, a crude guidance system (like a cheap GPS [use existing infrastructure,] some actuators for targeting and detonation,) air bursting at height seems to generate a big blast.

Comment: a long shot get mac os X on their hardware (Score -1, Offtopic) 513

by crovira (#46024911) Attached to: HP Brings Back Windows 7 'By Popular Demand' As Buyers Shun Windows 8

Fuggedaboudid. If it wasn't made by Apple, it is NOT running OS X. Apple doesn't care what YOU think or need. Apple cares about what THEY need, which is your cash. (I don't blame them. Its like being able to drop a Ford engine block into a chevy chassis. Its not happening unless you're really willing to do it, by hand, by yourself, without any support from either company.)

Macs are mostly there for people to build applications for the Apple ecosystem, which is primarily iOS anyway.

Comment: Learn Forth. (Score 1) 365

by crovira (#45903745) Attached to: Ask Slashdot: How Many (Electronics) Gates Is That Software Algorithm?

Charles H. Moore wrote it and extended it to be able to compile directly into silicon.

Forth is actually a TIL [Threaded Interpretive Language] but it is so easily extensible that it is possible to implement all the way to the gates.

Moore was working with Forth to do exactly that last I heard.

Comment: And will it attract bugs? (Score 1) 237

by crovira (#45716007) Attached to: Next-Gen Windshield Wipers To Be Based On Jet Fighter "Forcefield" Tech

Insects depend on high-frequency sound to attract mates.

I'd hate to find my windshield suddenly covered with horny (or angry) bugs while driving, in the rain, on a dark road, on my way to the ditch, picking up a few unwanted, unexpected pedestrians, who were waiting for a bus...

Comment: YES. YES, YES!!! (Score 2) 216

Its about time. What really pisses me off about the NSA isn't that its just a warmed over version of Pointdexter's TIA (Total Information Awareness) but the secrecy.

Forget about privacy. That toothpaste been squeezed out of the tube for years.

WE'RE paying for all of this in all the ways possible and we're not seeing any benefits.

Why not?

Because its all supposed to be a big secret.

SCREW the NSA's sense of entitlement to OUR data.

Comment: Hardware is just petrified software. (Score 1) 105

by crovira (#45175675) Attached to: Crossing the Divide From Software Dev To Hardware Dev

I fail to see the difficulty, or the divide, since hardware is a question of petrifying some software to enhance the operation of certain algorithms.

I remember reading articles several years ago by Chuck Moore about what he was doing to control a silicon foundry to produce chips which would hard wire some algorithms in silicon while leaving the rest as software implementations in Forth.

TILs (Threaded Interpreted Languages) lend themselves very well to this.

The level of interpretation, and the repetition of interpiling, depends on what you define and cache as interpreted code. That is only one step away from petrifying it in silicon.

Comment: The request was anything but polite... (Score 1) 279

by crovira (#45148181) Attached to: David Cameron Wants the <em>Guardian</em> Investigated Over Snowden Files

"when asked politely by my national security adviser and cabinet secretary to destroy the files they had, they went ahead and destroyed those files"

They knew they didn't have the only copy so they figured "WTF It's the only way we're going to get out of this basement so, screw it, we can always pick up a spare copy at our destination."

The security adviser should have told the cabinet secretary about the reach of the internet, but he didn't bother. LOL :-)

Comment: Uh, this is actually brilliant. (Score 1) 101

by crovira (#45107765) Attached to: Would You Secure Personal Data With DRM Tools?

"some entity other than their owners" but what if YOU own and enforce it.

"Publish" all of your data to a backup drive, apply DRM to "secure it*" and issue take downs to any intruder (like the NSA) to force them to remove it or face litigation and hassles from the sheriff.

All you need to do is have a warning page/file at the lowest lever on the backup drive and then encrypt your backup.

*) "Secure it" can be as flimsy as the original DVD DRM. The point is to insure the protection of the law, however unwilling the law might be to provide it.

Recent research has tended to show that the Abominable No-Man is being replaced by the Prohibitive Procrastinator. -- C.N. Parkinson