Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:Wildly premature question (Score 1) 73

by Bruce Perens (#48620117) Attached to: SpaceX To Attempt Falcon 9 Landing On Autonomous Spaceport Drone Ship

If we look at jet aircraft, wear depends on the airframe and the engines, and the airframe seems to be the number of pressurize/depressurize cycles as well as the running hours. Engines get swapped out routinely but when the airframe has enough stress it's time to retire the aircraft lest it suffer catastrophic failure. Rockets are different in scale (much greater stresses) but we can expect the failure points due to age to be those two, with the addition of one main rocket-specific failure point: cryogenic tanks.

How long each will be reliable can be established using ground-based environmental testing. Nobody has the numbers for Falcon 9R yet.

Weight vs. reusable life will become a design decision in rocket design.

Comment: Re:Umm, why? (Score 1) 86

by sjames (#48619327) Attached to: Brain Stimulation For Entertainment?

But we have to ignore all of that because of what it implies our society and the living conditions of the junkies. We must resolutely hold the line. No 'facts' may deter us from the message that addiction is a moral failing and so the addict deserves his fate. Now, all rise and put your fingers in your ears and sing the new national anthem: "LA LA LA LA LA".

Comment: Re:Depends... (Score 1) 153

by sjames (#48618161) Attached to: Verizon "End-to-End" Encrypted Calling Includes Law Enforcement Backdoor

Agreed, to actually be sure, the software needs to be at least verified by someone you trust. It would not be wise for that someone to be a telco. However, end-to-end has a specific meaning and Verizon's service isn't it.

As for the keys, you can identify the party through conversation. If you've never met, you would need a trusted introducer in a 3 way call to verify each of you to the other. Then transmit public keys around and read back the key fingerprints. In other words, use the PGP/GPG web of trust rather than a central authority.

From then on, you have the keys stored and so you can skip that part.

I do know very well that the company is not at all immune to government pressure. I never anywhere suggested otherwise. I suggested that claiming a thing that is untrue and legally cannot be true is immoral. A moral company simply wouldn't claim to offer end to end encryption.

Comment: Re:I never understood the warmth argument (Score 1) 431

by sjames (#48614647) Attached to: Vinyl Record Pressing Plants Struggle To Keep Up With Demand

I fully agree that a talented professional can get amazingly good results out of the hardware out there today. It is also within reach of an avid amateur.

The modern digital gear is not quite as forgiving as the old tube gear but in exchange the result when you do it right is orders of magnitude better.

Ideally, all music should be released at full dynamic range and if it needs to be compressed for FM or crappy earbuds, the radio station or player can easily handle it.

I'm going to laugh when new standards for measurement come out that punish the current 'loud' recordings.

Comment: Re:It's required (Score 1) 153

by sjames (#48614547) Attached to: Verizon "End-to-End" Encrypted Calling Includes Law Enforcement Backdoor

But that can easily be prevented in a public key system. Just a simple example that I am formulating as I type. The peers elect a master based on any arbitrary criterion (pick a number, who has the lowest mac address, who called in first, whatever). Everybody else hands it a public key. The master generates a session key and encrypts it with each authorized public key to distribute it. If LEO taps in, he gets nothing unless he can convince the master to accept his public key. If there are supposed to be 3 parties on the call, the master's owner will notice that there is an extra request for the session key.

An added benefit is that it is actual end-to-end encryption. The provider has no ability to tap the line as long as the keys are reasonable and the software doesn't have a back door in it..

If the public keys have been exchanged in advance, all the better for knowing the identity of everyone involved in the call.

Comment: Re:I never understood the warmth argument (Score 1) 431

by sjames (#48611805) Attached to: Vinyl Record Pressing Plants Struggle To Keep Up With Demand

First, you're just talking about compression, which is fine and is used in recording regularly.

Limited compression is fine. If that compression includes DSP simulation the behavior of a tube beginning to clip, the listener will hear it as louder than it actually is.

For the third point, there is necessarily an analog stage in front of the ADC. On the listener side, the brick wall filter needed after the DAC to get rid of the aliasing before it screws with the amplifier can have all sorts of nasty effects. That's the REAL reason higher sample rates (and so nyquist limit) makes it sound better.

All of this absolutely can be dealt with in a digital system, it's just a matter of actually doing it (avoiding the under-design so common in consumer gear these days).

But all of this suggests that if people still swear the analog sounds better, it's worth considering that we might have overlooked something before we write it off as audioweenie gibberish.

3500 Calories = 1 Food Pound

Working...