Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Easy, the programmer of course. (Score 1) 180

Which programmer is liable when many are working on the firmware and programs running the vehicle/robot?
How much of a code change would make me equally liable as the other programmers?
What if the code was perfect (worked as designed) but the hardware it was running on or the sensors attached to it reported incorrect information?
What if the programmers fixed a bug, that could cause an accident, but the manufacturer failed to sell vehicles whose code contained that fix?
What if the programmers fixed a bug, that could cause an accident, but the owner of the vehicle/robot/toaster failed to apply the firmware update?
What if the code on the vehicle/robot was altered by the owner? Is the owner now 100% responsible? Is there shared responsibility between the manufacturer’s programmers and the owner?
What if the programmers made the robot to kill humans, because that was the job they were given by military but then the robot was put in the wrong setting and killed the wrong humans?
What if a programmer believes a bug must be fixed but his or her employer won't allow them to fix that bug?

Comment Re:Better have security in there somewhere... (Score 1) 65

In my opinion, Bluetooth headphones are IoT devices. They are a network device utilizing an IEEE 802.15 protocol to connect to other devices within their network. Those devices in turn may be connected to other network devices using the same or other IEEE 802 protocols. The name we give the network made up of all these smaller networks is the Internet.

I would not consider a monitor an IoT device. It is not utilizing an IEEE 802 protocol to communicate with other devices on its network. If it's not in a network then it's not a part of the Internet. This could change in the future if someone made a network connected monitor. It's certainly possible since HDMI and Display Port have the ability to pass Ethernet between devices. At the point a monitor gets a MAC address or some other layer 1 identifier that allows it to communicate with other devices on a network then I would consider that monitor an IoT device.

Comment Re:Better have security in there somewhere... (Score 1) 65

In my opinion a device utilizing IEEE 802.15 (Bluetooth) to connect to a device utilizing IEEE 802.11 (Wireless LAN) to connect to a device utilizing IEEE 802.3 (Ethernet) to connect to other devices utilizing IEEE 802 standards across the network of networks that we call the Internet makes it an IoT (Internet of Things) device.

Do you feel like in order to be a IoT device it must have an IP address?

Comment NIC with MAC address that changed every boot (Score 1) 56

A friend of mine had a computer with a 3com NIC that incremented its MAC address every time he rebooted his PC. This started happening after he pulled the NIC out of a PCI slot while that motherboard was still turned on. This fried his motherboard and caused this peculiar behavior with his NIC.

Comment Re:Missing technical details (Score 2) 73

Sorry if I was not clear. I understand what a proof of work is. I was just wondering what the specific proof of work was going to be for the blockchain alluded to in the article. If it's a distributed network ledger based on a Byzantine fault tolerant consensus algorithm then it seems like it would be susceptible to attack if > 1/3 of the nodes on the network were traitors to the purpose of the network. What prevents a large numbers of traitorous nodes from joining the network to serve the purpose of a single party? It seems like Bitcoin's system of requiring a computationally expensive proof of work (SHA-256 to find a nounce) makes it harder for a large number of traitorous miners to exceed the 1/2 network threshold required to make a double-spend stick.

Comment Missing technical details (Score 4, Interesting) 73

Most of these blockchain articles fail to mention the important technical details about how a blockchain would be used. The questions I'd like to see answered are:
What is the "proof of work" used by the blockchain to decide which node gets to commit to the permanent blockchain record?
How will the blockchain handle if a pool of nodes consisting of > 50% of the computing power for proof of work decides to "double spend" or alter a blockchain record?
How decentralized will access to the blockchain be?
Will it only be companies or individuals with access?
Who decides who gets access?
What is the minimum amount of time you will need to wait for a blockchain record to be permanent and unable to be altered?
How big will blockchain be on disk?
Will each node need a full copy of the blockchain?

Comment Use firefox master password with mozilla sync (Score 3, Interesting) 415

Yes. I recommend Firefox's password manager which can encrypt passwords stored in your browser with a master password. Then add to that Mozilla's sync feature to store an encrypted copy of your passwords on Mozilla's server. They are stored encrypted and cannot be recovered without the sync password and e-mail access. If you don't trust Mozilla's server, despite the passwords being encrypted, they provide the open source software so you can run your own server to sync your encrypted passwords to.

If someone (you or hacker) does not know the sync password and resets the password with access to your e-mail account, it will not give them access to the passwords that were sync'd previously. This is good because it keeps a hacker from being able to just hack your e-mail account then use that to get access to all your passwords.

Comment Re:Oh please (Score 1) 204

You are wrong. In my example, using ==, it will report equal. Using ===, it will report not equal.

$ php -r "if (\"0E54321\" === \"0E12345\") { echo \"equal\n\"; } else { echo \"not equal\n\"; } "
not equal
$ php -r "if (\"0E54321\" == \"0E12345\") { echo \"equal\n\"; } else { echo \"not equal\n\"; } "

The string "0E54321" and "0E12345" both get converted into the integer 0 for comparison purposes when you only use ==.

The documentation clearly explains this behavior. I'll link it again for you.
Type Juggling
String Conversion

Comment Re:Oh please (Score 5, Informative) 204

PHP has a comparison operator === that evaluates if the two things it is comparing are equal and of the same type.

$ php -r "if (\"0E54321\" === \"0E12345\") { echo 'equal'; } else { echo 'not equal'; } "
not equal

Without ===, variable type conversion can cause a string containing numbers to be converted to an integer. See these links for details:


Slashdot Top Deals

Computers don't actually think. You just think they think. (We think.)