Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Why wouldn't you? (Score 1) 140

Keep thinking though. What are the chances of

* your battery being alive

Greater than zero.

* knowing your location

The last building I entered before the earthquake, duh.

Any wifi data is worthless and a distraction.

It appears the experts - the actual rescuers - disagree with you.

Still don't believe me? OK, As someone who has never responded to an emergency you seem to be an expert,

I never claimed expertise, just noting that the real experts on the scene are asking for this.

but you're really an armchair quarterback compared to me.

Hilarious. Now you're claiming expertise and in conflict with what those on the scene are saying.

Who should I believe? It's a tough choice but internet armchair rescuer loses by a hair's breadth on this one.


Comment Re:Why wouldn't you? (Score 1) 140

Think it through, the best a buried person could do is send an email saying they're under rubble. We already know that. Wifi is more of a distraction than anything useful in this situation.

We do not already know that. It might be known that there's a pile of rubble, but not that someone was inside, and not that they're alive.

If they can say "I'm alive under the rubble at 123 Main Street", it can be hugely beneficial to their survival. Can then focus on which multi-tonne pile of rubble to start digging through.

Or a group message via WhatsApp or something saying, "We've found 10 people in the basement of 321 Main Street - help us get them out ASAP" sent to rescuers.

It may not be a high likelihood of happening, but a better chance than someone downloading child porn during the recovery effort, or rescuers standing around taking selfies because they're really only there to pump up their social media profiles.

Comment Re:Why wouldn't you? (Score 1) 140

I'm saying the people will get more rescuing done if checking their email and posting selfies is not an option.

Perhaps, for you, having WiFi means taking & posting selfies.

For others it might be a way for a trapped person to ask for help and give their location, or a method for rescuers to be notified to rush to a certain location for an emergency beyond what they're currently working on (maybe a collapsed school or hospital) (maybe even leading to more rescues).

There are many, many possibilities in an earthquake devastated area in which an internet connection can be handy - life-saving even.

Comment Re:massive parallel processing=limited application (Score 2) 112

It's an interesting idea, and one I have given a little thought to. ( it would enable a very fault tolerant computer architecture) however, unless you implement highly redundant interconnects/busses, you still have the N-devices fighting for a shared resource problem.

If you make the assertion that all nodes have a private direct connection with all other nodes, and thus eliminate the bottleneck that way, you now have to gracefully decide how to handle a downed private link.

I suppose a hybrid might work. Fully dedicated links, and one shared bus. When dedicated link fails, communicate over the shared bus.

Scaling such a design would become prohibitively costly though. A 200 node design would have orders of magnitude more dedicated links.

The idea I had for playing with this idea, was to use some cheap wired home routers, set up private vlans on the 5 or so ethernet ports each has, then put private patch cables on each port, then put all the Wan ports on a dumb hub.

The local copies of Linux on each system can handle management of local device resources, and a daemon running on each node then handles listening/responding on each interface.

Just what such a thing would be good at doing escapes me though. To be really useful, you would need some way to have nodes specialize, then cooperate, without a central authority.

That way, should we decide to use this network to process live video, one node decodes the input stream, then dispatches portions of the decoded stream to peer devices, who then take the decoded stream and do whatever processing is requested, before sending the processed streams to yet another peer device which assembles the processed stream, then shuttles that to the endpoint node, which reencodes the stream and writes it to the output device. (Or some similarly cellular process)

I suppose this is kinda similar to how a neural colum works, where locally interconnected nets are restricted in the number of true local peers they have, and then communicate collectively to other neUral columns by dedicated interconnects. (Video input source in the above, could be from a camera, but it could also be from another network's output stream.)

The major logical tasks are:
Role selection in the assigned task for each local node.
How to issue instructions to the mesh nodes in a decentralized manner

Depending on how far you wanted to extrapolate this, each mesh node could be treated as a logical unit, where each logical node then is part of another, higher level node of similar topology: each mesh has a direct connection to each other mesh inside its higher order node, and one communal link all nodes can talk on inside that node.

Eg, if I make 5, 5node networks made out of such routers, I need 7 ports on each router. 5 for direct local traffic. 1 for local shared connect, 1 for direct connect to another 5node group. Clever use of subnetting and routing on the shared net would enable there to be a dumb gateway device to allow the shared higher link to function. Each 5node network is connected to every other 5-node network in the scaled up version.

Decisions on how to process incoming data might be tied to which interface received it, or any number of other methods.

Spying on the system state of the whole system should be possible through the shared link infrastructure, though ideally any node you interact with the system with should be a proper peer in it, and nit something sitting on the shared net only.

The drawback of such a design will be signal propogation latency, and keepin all the subnodes, at all levels, synchronized. The human brain uses a support network of astrocytes and glial cells to guide dedicated link physical routing, and to tune propogation delay between neural columns through selective mylienation of trunk bundles.

You could probably fake it with introduced waitstates.

At some point though, the behavior of the whole will revolve around the basic logic baked inside each physical compute unit. Ideally, that is universal, and consistent all over the system. The magic happens based not only on the message sent, but which interface recieved it, etc. The os kernel would have to be baked in at that level. All other results would be totally emergent.

The parallels with neural networks shouldn't be overlooked imo. There's a huge body of work to draw from on that subject.

Comment massive parallel processing=limited applications (Score 2) 112

while being able to leverage that many compute units all a once is quite impressive, most tasks are still serial by nature. computers are not clairvoyant, so cannor know in advance what a branched logic chain will tell them to do for any arbitrary path depth, nor can they perform a computation on data that doesnt exist yet.

thhe benefits of more cores are from parallel execution, not from doing tasks faster. as such, most software is not going to benefit from having access to 8000 more threads.

Comment Re:It's all true (Score 1) 75

Nonviolent revolution (a la, civil disobedience in India) has at least one reported instance of success.

However, the US electorate lacks a suitable cultural stereotype upon which to sustain nonviolence, in the face of government totalitarianism. Eg, when people start getting arrested and destroyed financially, people will either suddenly forget their morals, or will turn violent.

You asked for an alternative, the problem is that it does not look plausible for US culture.

Comment Re: Criminal (Score 4, Insightful) 302

How delightfully backwards!

The first step in addressing a problem, is acceptance that there is in fact a problem to address.

Rightly pointing out that all current choices are shit, is therefore the correct and proper direction toward addressing that problem, eg, by not voting for more political choices that are shit.

Hilariously, your rebuttle is whimsically absurd! Denial of the problem, will somehow result in correction of the problem-- and drawing attention to the fact that there is in fact a problem purpetuates the problem.

What really needs to happen is for the US to grow a pair and demand no confidence vote powers. That way when presented with the choice of 70 year old rancid tuna and 50+ year old trolls with verbal diarrhea, we can return the offered plate to the kitchen and demand they do it right this time.

Arguing bitterly over the pros and cons of rancid tuna over shitspeaking oompahloompahs does nothing to chastise the kitchen. Next time they wI'll serve you a festering blue waffle with whipped cream and shriveled oil baron salomi with a side of polluted tap water.

Unless you want to keep getting served shit, I suggest you address the problem of being served shit.

Comment Re:Pile it on.. (Score 3, Informative) 302

Saggy pants is still not racist, per se.

It is related to prison culture, and ghetto culture. The association with a specific racial group is a consequence of over expression of incidence in criminality and poverty in that racial group. Jumping straight to the racecard is itself racist; it defacto implies that the saggy pants, and the culture behind it, are intrinsically linked to that racial group. It is equally as onerous as saying "all black people are criminally minded."

Instead, saggy pants is just saggy pants. Complaints about the glorification of prominent displays of saggy pants is not racist, per the above reasoning. Counter-claims that such complaints are racism are themselves what is racist.

You were born with a powerful organ, refined through millions of years of evolution, for the primary functions of advanced abstract and critical thinking. Please use it responsibly.

Comment Re:Mobile Web (Score 1) 79


But then our phones would probably explode under the pressure of fullscreen autostarating flash ads.

That and embedded java applets, fully interactive canvas elements, and millions of cross site activity trace pings.

Throw in some android specific attacks, and some other kinds of fun we don't know about yet, and it could be loads more entertaining to browse on a mobile device.

(I can hardly wait for the aggressive AR adverts of the near future.)

Comment Re:Easy. (Score 3, Interesting) 110

From ths perspective of people who like to watch, as the nsa does, telling the landlord about where all the best places to peep so they can be fixed, is counter intuitive.

That the same building techniques are used in thier own house, and that other people who like to watch can peep on them through them, is not seriously considered.

Instead, only the loss of really good ways to peep is what is considered. If the method of peeping is likely to be discovered, or the architecture behind the means of peeping changes such that the approach becomes less valuable, the peeping Tom may delude himself into thinking that he is doing a service to society and the landlord by pointing out how that peeping may happen. (See for instance, methods used to remotely observe what is displayed on a crt monitor by monitoring the em spectrum for telltale radio artifacts-- who uses crts these days?)

The nsa is sick, and likes to watch. The very idea that they would feel they should stopper up the holes they look through, or alert people that they are looking at them through them, is counter to their fetish. The very idea is absurd to them. Only somebody that sees by accident, and is disgusted by having seen, has motive to see to it that no such seeing ever happens again, apart of course, from somebody catching somebody peeping on them, and discovering the hole that way.

From the perspective of the nsa, if they have eno ugh places to peep through, you can putty up holes all day, and they can wack off to watching you do it. Telling you where all the holes are stops that from happening. They want to watch you. Not keep you safe from being peeped on.

Comment Re:Easy. (Score 4, Interesting) 110

I have.

Note in citizen 4, the first phase of the nsa's activity against Snowden was in sussing out his aberrent behavior, and surveiling his girlfriend, family, and Hawaii place of residence. This is what happens in phase 1) of my short list. A list of persons of interest is produced using psych details, and active monitoring starts. Connections maps are created. Points of surveillance are established, and monitoring priority increases. Phase one ideally (for the nsa) ends with apprehension of their leak, but the process does not end there.

After sussing out the entry point of the leaker, the companion network is either dismantled, or subtly repurposed for cointel.
False intel is fed to the group. If the false intel causes the foriegn agency to suspect compromise, it sends the message to that foriegn agency that their action was detected, and that thier methods are not valid any longer. If the foriegn agency fails to change the operational behavior of the cell, then it may become beneficial to plant a double agent. This double agent can then cause the foriegn power to change its policies or public activities, through contaminated or misleading intelligence, created specifically for this purpose.

That they can conduct such a profoundly invasive phase one investigation using literally any internet connected, or broadcast capable device, along with your financial data, and the information about you provided by your so called friends on social media, is the primary thrust behind snowden's leaks. What the NSA will do, and why they will do it is not going to change. The leaks from snowden concerned the how and the what.

Comment Easy. (Score 5, Insightful) 110

1) there will be a witch hunt.
The nsa will investigate its own employees against its already existing psych profile sheets to see who is the most likely to have been motivated to steal the data. Then they will set up an internal emtrapment scenario to catch the leaker red handed. They will then be charged with federal espionage, and put into prison.

2) the same investigation will sift out accomplices and contacts. The trap will not be sprung until positive id has been made on all members of the cell.

3) the nsa will not directly move against the other members of the cell. Instead it will monitor, and selectively leak false intel to this cell, making it ineffectual, or worse, countereffectual to the foriegn government operating it.

4) if deemed useful to do so, the cell will be infiltrated with a new "insider", who will actually be collecting and analyzing the cells instructions to better predict and respond to the foriegn power's activities.

Really, this is not hard.

Comment Can the WiFi do monitor mode? (Score 1) 124

I ask, because these tiny, fully integrated and inexpensive devices look like very inexpensive, and easily concealed WPA password crackers, or network listening devices to me.

The one with the sdcard slot could be made to do quite a few things, if you don't mind wearing out the card using it for swap space. A combination of zram and sdcard spillover swap, some sensors, and an ext data partition on the card would let this thing do quite a lot, such as sticking it on the back of a USB printer to make the printer network enabled, to running an electronic door control, camera monitoring (using vfl capable cameras), making WiFi driven toy cars or drones, and quite a few others.

For many things, you don't need a whole lot of power. I have used an old router as a pvpgn server for some time, in fact. Works fine.

For a lot of possible projects, physical size of the package and power draw are the obstacles, not the memory size or the processor.

Slashdot Top Deals

"One day I woke up and discovered that I was in love with tripe." -- Tom Anderson