Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:This pretty much sums up IoT ... (Score 1) 136

The drying cycle takes the longest, is of variable length, and has a buzzer that works if I'm in the house but not so well if I'm outside or in the workshop.

The wash cycle takes longer than 24 minutes. It's timing is based on the load size and the wash setting, ie, how dirty the clothes are going in. It's relatively easy to start the wash cycle, forget that there's something in there, and only remember a couple of hours later. That's why I want some kind of notification.

Comment Re:15? (Score 1) 246

Microsoft eventually merged the consumer and business operating systems, but I think they missed a real opportunity. Windows 2000 should have been that merge point. Millennium never should have happened, and Windows 2000 should have had the functionality that was eventually put into XP, but with the less annoying multicolor taskbar.

Comment Re:00000-00000-00000-00000-00000 heh (Score 2) 246

Yep. 111-11111111 or something like that actually worked. There were other variants that were easy to remember at-the-time too.

Of course, that was back before every OS phoned-home or required registration, so it didn't matter if everyone on the planet used the same key. I suspect that Microsoft didn't make it hard because while piracy hurt their short-term bottom-lines it fostered a culture used to using Windows even though there were, at the time, several other choices, so those kids using Windows 95 continued on to become computing professionals that used the NT-based products at work when again, there were other options available.

Comment Re:wan port (Score 1) 120

While you're not going to stop the extralegal beat-the-password-out-of-you vector, if you're not one of the few-hundred people on the planet that have been pushed that direction, right now in the United States there's no requirement to surrender passwords. Currently in the 11th circuit the court has found that the Fifth Amendment prohibits the requirement to produce passwords, and the rest of the circuits are not as yet ruled. Should there be conflicting rulings this would find its way to the Supreme Court. One would hope that they too would not require passwords to be produced as a matter of privacy, but until that time it's simply not settled.

You are correct that it's much more likely that this AP will be up-to-date, but there still isn't exactly good precedent for devices running Google's OSes being updated like they should be, or for features to not become abandoned when their backend cloud-side stuff is written out from underneath. It might be up-to-date, or it might be abandoned and the few owners left to their own devices.

Comment Re:This pretty much sums up IoT ... (Score 1) 136

Define "things".

'cause I have all kinds of things that I deal with on a daily basis on my network. HVAC EMS controllers, freezer/fridge temp monitors, security access controllers, cameras, signboards, just to name what I can think of off of the top of my head.

The common thread among these things is that they're all based on communication being useful or essential before the medium is decided upon. It's useful for commercial freezers to alert when the temps approach the liquid point of water. It's useful for HVAC temperature programming to change when building use schedules change. It's useful for a central directory services system to authenticate keycard door access. It's useful to update the marquee sign from any PC with the right software and credentials as opposed to having to go out there with a ladder or to even be restricted to a single PC with a serial link.

I want the Internet of Things to tell me that the clothes wash cycle or dry cycle has completed, so I can be out in the workshop while laundry is being cleaned or dried. I want the yard sprinkler controller to alert me when it goes into 'rain' mode and pauses watering the yard so I would have the option to override if I choose to do so, and when it comes out of rain mode.

It doesn't have to be complicated, which is why most corporate approaches are wrong, they needlessly complicate it when simple notifications are all we need.

Comment Re:Stay quiet. (Score 1) 663

That actually is a good approach when it comes to meeting people.

Look at the population of a given society and its wealth/income. It's a curve, with more people toward the lower-end of the spectrum. If one wants to function in circles among more people, one's behavior needs to relate and be relatable to those people. On the other hand, there are people that one probably doesn't want to associate with down in that end because they're physical risks or mooches. At the other end there are fewer people, but those people understand the nature of the money and how it applies. The dangerous people there are those that promise to do good for you with your money, but essentially use legal means to steal it.

This is essentially the same kind of problem that the United Kingdom's Prince William had, and there was a lot of time spent courting Ms. Middleton before their marriage. She came from a family that had some wealth, so there was an understanding of money, and my guess is that there was a whole lot of vetting on his side of her side before his side would bless the marriage. They also met in college, which is a very good place for people from disparate backgrounds that otherwise may have something in common to get to know each other, where wealth or the lack of it may not matter as much.

Back to the subject of this discussion, he can either not disclose his money (the approach of the character Tom Bookman had in How To Marry A Millionaire) and court without getting into the details until the relationship seems to be working, assuming that his tastes are still affordably reasonable to the average person so his extreme wealth is not obvious, or he can look for 'society' circles to try to operate in, hoping that despite the smaller candidate pool that he finds people to interact with that he likes, and women that aren't out-for or uncomfortable-with his money. The former is difficult to do because if anyone learns of the wealth the game in that particular scene is up, but being wealthy, it's not hard to stop and start again elsewhere. The latter is hard because there could be a lot of boorish people or a lot of gold-diggers even among the already wealthy.

Comment Re:3 billion buildout 1.2 million served? (Score 1) 196

The problem is the cost per item. This is more than just a subsidy, it's simply paying for getting the entire job done and if that were the case, why doesn't the government just contract that job out.

No matter what the Federal government does, someone will be dissatisfied with the result...

  • - Contract to a big existing player like Century Link where CL owns the resulting network, see the arguments we see now about federal dollars being wasted on the profits of private companies
  • - Contract a big player to build-out the Government's infrastructure, find complaints that the Government shouldn't be in the telco business, and that the Government could spy, and is playing favorites with the big player
  • - Contract to a smaller company to build-out, complaints that the smaller entity doesn't have the technical expertise to get the job done
  • - Build it out where the government acts as the prime contractor and subs-out the discrete jobs directly - accusations of Socialism

May as well go with a company that at least has a chance of knowing what they're doing. Century Link is by no means my favorite, but they're not Comcast either.

Comment Re:Yay for price drop (Score 2) 115

Generally in economies of scale, the greater the scale of production the less per-unit the cost to assemble, assuming that the manufacturing facilities are running efficiently and aren't idled due to a lack of orders.

That's why Mr. Musk's "Gigafactory" is such a big deal; if quality batteries can be produced on a massive scale and for less money per-unit, suddenly it makes using batteries for general-purpose applications more affordable. You might see racks upon racks of lead-acid batteries providing infrastructure support for telco rooms be replaced with smaller, longer-lived Lithium-Ion batteries, you might find homes receive whole-house battery backups because they're relatively maintenance-free and are easier to work with than Group-27 batteries that look more at home under the hood of a car.

Comment Re:hmmmm (Score 1) 416

That's my entire point. Until they're actually using the aircraft for combat we won't know how they truly perform. Hell, until they're engaging targets they don't know how they'll use the aircraft, how they'll patrol, what kind of approach they have to take to the target to blow the hell out of it without taking fire, etc. I'm not optimistic about the F-35, but I'm also not even a pilot, let alone a military pilot.

Comment Re:wan port (Score 2) 120

If all of our stuff is going to be networked, having us be the gatekeepers for our own security is paramount.

Because you can't design something intended to be remotely accessible and not expect there is a likelihood of someone else being able to access it.

The problem is there's currently no model of security that works for nontechnical users that doesn't involve an outside party. As long as there's an outside party there's a vector of exploit, even if it's simply the field service consultant jotting-down the passwords and keeping his notes as he leaves.

What we need is a standard that allows for local-control to the exclusion of the original vendor or manufacturer for those of us that are capable of managing our own devices, while allowing nontechnical owner-users to use that vendor-provided support if they're unable or unwilling to do it themselves or to pay someone else to set it up privately. Right now we're not seeing that, and consuming these made-for-marketing brochures won't show us that even if the local-control aspect did exist.

Happiness is a hard disk.