Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:From the people who brought you (Score 1) 35

I have considered combining AR with the Emotiv EEG controller for some years now.

The EEG input device allows full hands-free operation of the embedded platform (but has several outstanding bugs related to signal noise, and user training). This means google-glass can now be used without having to, for example, touch the eyepiece to take a picture, or start recording video-- Or regions of the AR image can be enhanced/manipulated based on user attention focus.

A low-cost (300$ is not low cost, unless you live in some hyper inflated local economy. Yes Silicon valley, you are a hyper inflated economy.) synthesis of these could enable all kinds of useful applications, from AR assisted night driving with bright IR LED based headlights and computer processing (does not blind other drivers, gives lots of illumination for the computer to do image capture with, and the resulting presentation requires no physical input method. Not even "pinch to zoom".)

To take off though, the fully integrated product needs to approach the 100$ price point. That includes hardware and software.

We aren't there yet.

(Other, highly lucrative applications: Soldiers with AR targeting. Limited upper body exo-harnesses intended to collect EEG motor-area data and correct body posture accordingly for precision sniping, etc. Hollywood already thought of this shit years ago. Tech is just catching up.)

Comment Re:USB interface? (Score 1) 43

how fast can you drive the gpio pins, and do they support pwm?

it may be possible ti slap another device on the gpio to serve as an ethernet asic, and give a wired interface.

also, I seem to remember USB to ethernet dongles being a thing. If you dont want to hardware hack, that might be a solution.

Besides, this is all discounting the real interesting thing this enables, and that is being the compute core of a DIY robot. It is small form factor, reasonably powerful, now runs linux, and can accept remote commands over wifi. It has some GPIOs for controlling the robot with.

Something simple, like a DIY wifi enabled toy car, is just an arduino and some shell scripts away.

I can think of some pretty clever things one could put this up to. (Simply because it is openwrt, does not mean it needs to be a router. the wifi chip can be run in STA mode instead of AP mode just fine on openwrt. )

Comment stress is the systemic killer in modern workplace (Score 4, Insightful) 60

Stress is known to cause systemic problems, ranging from weight gain, endocrine disruption, hair loss, and now neurodegernative conditions.

However, the actual costs of these ill health effects is not factored into the cost benefit analyses of major employers in nearly all conditions, as something other than just a potential source of losing valuable worker resources.

Seems to me that since the US has an endemic problem with stress and mental illness, at the same time also lacking good mental health infrastructure, that those causing the endemic problem (major employers who saddle on way more hours of work per employee than is sane or reasonable) should be made to pay this real cost, by being found culpable for causation of the very real health effects that thier high stress work environments induce, by means of having to pay for adult care in appropriate facilities for dementia patients, and for the costs of antipsychotics, psychoactive drugs, and mental health therapy for those they have harmed and are actively harming.

By introducing this new liability, the profit motive of forcing people into those situations will evaporate, and better working conditions should come forward naturally.

Of course, the reality is that these employers will seek radical outsourcing first, but if they all try that all at once, congress would have no choice but to intervene and introduce new labor and subcontracting laws.

Other than forcing employers to bear the weight of their own shit, (and thus reducing profits), I dont see the downside.

Comment Re:Quantum Teleportation (Score 1) 412

I realize this is an old topic now, and you are unlikely to respond, but all the same:

The alcubierre warp drive does not exactly violate c. The ship itself remains motionless inside its local spacetime. What happens instead, is that the spacetime just outside that which contains the ship is bent like hell, and causes contraction and expansion at faster than light speeds. This drags the local spacetime around with it.

So, the issue with "Hey, I can go backwards in time with it!" is avoided. The ship has normal causality inside its local spacetime. it does not have time dialation, because the ship does not move inside that curved spacial geometry. What happens instead is that an event shock forms around the ship, preventing information from entering or leaving the pocket of spacetime inside, and the whole bubble rips off like a bat out of hell. The event shock interacts with matter and virtual particles as normal space is compressed in front of the vehicle, and that energy builds up like bug splatter on a windshield.

When the vessel exits FTL mode travel, it will release that accumulated energy.

The equations for the alcubierre warp drive are sound in terms of theoretical physics. The devil is in the details. It requires an exotic material with negative mass, or requires exotic negative energy. The only contender for this exotic negative energy is the casimir effect, but the effects of that phenomenon are much too small to be useful to create a warp drive.

An alternative may however be possible. Spacetime is not "empty", even in an otherwise perfect vacuum. There is always some level of background energy/particle phenomena in the form of short lived virtual particles. If a means of modulating this energy density can be found, reducing the rate of virtual particle pair production will have similar consequences to having negative mass or negative energy present. That would satisfy that requirement for alcubierre's warp drive physics.

Is there a way to modulate/control the rate of virtual particle pair production? Hell if I know.

Comment Re: Now... (Score 2, Interesting) 412

Oh my, I have been insulted by an anonymous coward. Whatever shall I do? /s

go invent conspiracy theories about "space nutters" somewhere else, dumbass. The argument that there are no aliens out there loses steam daily as missions like Kepler give statistical samplings of planetary system compositions. The suggestion of it being from FTL use is less convoluted than the suggestion that it is a Dyson swarm, because FTL is going to be an essential technology to construct a dyson swarm. I threw it out there, not because I believed it was true, but because it was a similarly improbable reasoning for the observed phenomenon, and suggested a means to disprove it.

That's significantly better than jumping whole horse on the ad hominem fun ride, like you just did.

Catch you later AC.

Comment Re:Now... (Score 4, Interesting) 412

There's another possibility that's just as far out, and would explain the missing IR.

It's a traffic hub for small FTL ships.

If they use something like an alcubierre metric based warp drive, then the gravitational fields around the craft will scatter the star's light into vectors that are no longer straight lines away from the star. This will result in the star's effective brightness being reduced.

Get enough of them going in and out of the system routinely, and you will get the observed phenomenon.

To me, the obvious thing to do is look for gravitational waves coming from the system. If you can't catch their broadcasts (because they use something other than open channel radio), then look for the propwash.

Comment Re:Yet another proprietary fail (Score 2) 37

Really now, there are very good algorithms out there. Would it have really been that hard to sub out the encryption module of their source code with a vetted encryption algorithm?

Oh--- right-- Probably not using properly modularized code! Because FIRST TO MARKET or some similarly retarded reason.

Comment Re:Uh, no (Score 1) 406

Damnit. Stupid missing close tags.

Here's the other section--

(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, thatâ"
(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;
(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or
(C) is marketed by that person or another acting in concert with that person with that personâ(TM)s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.
(3) As used in this subsectionâ"
(A) to âoecircumvent a technological measureâ means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and
(B) a technological measure âoeeffectively controls access to a workâ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.

Comment Re:Uh, no (Score 2) 406

No. No it isnt.

Here's a link--

And here's the pertinent section's text.

(a)Violations Regarding Circumvention of Technological Measures.â"
(A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title. The prohibition contained in the preceding sentence shall take effect at the end of the 2-year period beginning on the date of the enactment of this chapter.


By Forbes demanding deactivation of adblockers to view the content, they have instituted a "Technological Measure" as described in the last part of section B--"or a process or a treatment, with the authority of the copyright owner, to gain access to the work."-- which makes the use of an anti-adblocker blocker an illegal circumvention technology.

It being weak as fuck does not matter. It is a technological measure, instituted to gain "authorized" access to the works that they hold copyright to, and being made to see adverts so that they get money can be seen as "a process or treatment with the authority of the copyright owner to gain access to the work."

Encryption is not necessary. Just an attempt to institute a technological measure to cockblock free access.

Comment Re:Yet Slashdot continuously links to Forbes (Score 2) 406

Forbes is a famous news source catering to rich conservatives. It features mostly business news, and political news with an economic or business bent.

Similar to Wall Street Journal, or Fortune magazine.

The stories on Forbes are often biased. Readers should take that with a grain of salt.

Comment Re:Uh, no (Score 5, Interesting) 406

It could be argued, that the "No, really, let us show you the ads, because it pays for the content" mechanism is a payment mechanism to view protected content. By circumventing that to get unpaid access to the content, you are engaging in circumvention of a rights management system, and thus fall victim.

That's the thing with DRM-- it can be extremely feeble-- it still counts when considering the DMCA.

It could be argued that reading the article without "paying" for it (with your advert exposure) is piracy, and that to prevent you from doing this, the anti-blocker script was introduced.

Still a load of bullshit-- The need to circumvent protections that are onerous and not in the public good (or that prevent authorized special exception use, such as via a library) is very important but given short shrift as far as the DMCA is concerned.

Comment Just waiting for the malware... (Score 1, Insightful) 145

I'm just waiting for the malware to hit these smart cars.

Just a few possibly lucrative scams that could manifest in due time:

Ransomware. "Pay us OMGWTFBBQ! dollars, or never drive your expensive status symbol ever again! We've encrypted the entire drive control computer's filesystem, so pay up."

Spyware: "Know where your spouse is REALLY going during the day! Our special software runs silently on smart cars to let you know exactly where and how long it has been running! Easy integration with our smartphone app!"

Law enforcement bullshit: "You say you were driving under the speed limit, but your car alerted us to the contrary. Enjoy your automated speeding ticket."

Adware: "Hello commuter! It looks like you are getting low on gas! Why not try Speedy's Gas and Go?" (Played loudly over the in-car speaker system, via coopted media control system., with no option to turn down the volume or stop the advert(s).)

And of course, the various kinds of dangerous hacker things--


"Drive your expensive smart car on remote control from a smart phone! (we wont be liable for damages or loss of life/injury from doing this.)"


Government black ops: "We caused his car to lock the user controls, and autodrove him off the side of an unfinished highway ramp. We made it look like he was driving while drunk."

I dont want to sound like a Luddite here, but really-- Not everything needs to be "Smart."

Comment Re:I've made my peace with systemd (Score 1) 242

I have only modest experience working with *nix flavor boxes, and I fully understand the need for text based logs.

I see no real value in a binary based log, unless you want to attach some kind of diagnostic symbol metatdata to the log. (and if you did that, you had better have a dedicated storage array to store the logs...cause they will get big FAST.)

Basically, you need to be able to read the logs with the most minimal of tools, because you are going to be diagnosing it in a downed state most likely-- You cannot bank on having a full suite of binary manipulation tools on hand. You will be lucky if you have more than vi.

Also, text based logs compress REAALLY well for long term storage for audit purposes! Binary logs? Probably not so much.

Not to mention-- if the binary logs are in some stupid "easily damaged" format, then having a process suddenly die horribly from abnormal termination will result in corrupt logs, so good luck figuring out when or how the process died. Not so with good text logs. It can cut off right in the middle of the debug print, and the text file is still valid. Hell, the file chain can be damaged from FS corruption, and parts of the log will still be readable.

Text logs are just plain better in those regards.

Comment Re:Systemd on slashdot (Score 1) 242

Keeping track of the PID is important if you want to kill the process reliably when it hangs up. (because invoking the executable to tell it to down wont work reliably with a hung process.)

That is, unless invoking ./etc/init.d/foo shutdown is harder for you than doing
ps -A
to find the process ID then doing
sudo kill FooID

I suppose you might feel it safe to use
killall foo

but what if you have multiple instances of the daemon running? (say, different ssh server daemons on different ports)

Taking the time and enduring a little pain so that you can do ./etc/init.d/foo#x shutdown

to shutdown instance x of the daemon saves lots of time and effort later.

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.