×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

$35 Quad-core Hacker SBC Offers Raspberry Pi-like Size and I/O

BaronAaron Re:Wonder if the OTG port can be used as a periphe (140 comments)

I can think have 5 ways you could have accomplished the goal of network configuration without a keyboard and mouse off the top of my head.

1. The Pi A's USB port can be configured for slave mode. The B doesn't support this but not sure if you needed a B.
2. You can fake a USB device over the GPIO ports on both the A and B through various bitbang techniques.
3. You can use the UART pins and a USB to UART chip which wouldn't be a very expensive add on.
4. Add a DHCP server to the Pi, so when connected directly to a PC with ethernet, the PC gets an IP from the Pi. Your PC program can then connect to the Pi for final network config.
5. Add a cheap two line LCD and some push buttons to your device. Create a simple text driven menu for configuring the network through that.

about two weeks ago
top

18th Century Law Dredged Up To Force Decryption of Devices

BaronAaron Re:First (446 comments)

This is the reason I prefer Android devices. You can install a firmware that is compiled from the open source you trust. There is still the possibility of hardware level backdoors, but there are a 100 different manufactures of Android devices, many of them have little to no presence in the USA. Google doesn't have to be involved with your device at all.

Versus Apple, Microsoft, etc who are easy targets for US courts orders.

about three weeks ago
top

Stars Traveling Close To Light Speed Could Spread Life Through the Universe

BaronAaron Re:I don't understand this ... (184 comments)

My understanding is the relative velocities between macro sized objects in the universe are rather small. Small enough where relativistic effects are minute. The article mentions 3% the speed of light being the high end. You would be hard pressed to find anything larger then a particle moving 99% the speed of light relative to our sun. Even these hyper-velocity stars are only 33-50% the speed of light.

about three weeks ago
top

Russia May Be Planning National Space Station To Replace ISS

BaronAaron Re:What would happen? (236 comments)

Launches from US are more expensive, but launches from Russia are less expensive. Given the Russians have done many more launches to the ISS then the US, this seems like an intelligent decision. Not politically motivated.

about a month ago
top

President Obama Backs Regulation of Broadband As a Utility

BaronAaron Re:Obama (706 comments)

I'd love to see a breakdown of what those co-location costs are vs what the ISPs have to pay to stream Netflix content from outside of their networks.

I bet co-locating the Netflix servers for free would still cost ISPs less.

about a month and a half ago
top

'Star Wars: Episode VII' Gets a Name

BaronAaron Re:Pretty cool (267 comments)

by naming it in the title gives me hope.

The title also gives me a new hope ...

about a month and a half ago
top

Bounties vs. Extreme Internet Harassment

BaronAaron I'm pretty sure that ... (716 comments)

Even if caught, the prepubescent boys trolling her aren't going to end up in jail over this.

Now if she could somehow bait one of them into posting a random, nonspecific remark about potentially shooting up a school on Facebook.. that might work...

about a month and a half ago
top

Raspberry Pi Founder Demos Touchscreen Display For DIY Kits

BaronAaron Re:After whast happened to Odroid-w, why? (81 comments)

We want tools of computing to be as useful and flexible and free (in design) as cement, steel girders, wrenches and sockets, pencils and paper.

While the general concepts of those tools are free and open, there are patents on specific implementations of all of them. People are always inventing better wrenches. If you made a copy of Craftman's new wrench of the week and started selling them, I'm sure you'd be hearing from their lawyers.

We live in a world, wrong or right, were people innovate for profit, not the betterment of society. I don't see why people feel computing devices should be any different.

about 2 months ago
top

Raspberry Pi Sales Approach 4 Million

BaronAaron Re:UI processor for a commercial product (146 comments)

If you don't require a high resolution you can use the SPI pins on the Pi's GPIO headers to directly interface with a TFT panel.

about 2 months ago
top

Fusion Reactor Concept Could Be Cheaper Than Coal

BaronAaron Re:Wait... (315 comments)

I thought the biggest roadblock to adopting fusion energy was that it doesn't work?

See that big yellow thing up in the sky?

He means without having to have a reaction mass the size of a star ...

about 2 months ago
top

Object Oriented Linux Kernel With C++ Driver Support

BaronAaron Re:Why do people still care about C++ for kernel d (365 comments)

In a world with only C and C++, then C++ is undoubtedly the better language on balance.

I would still pick C, and use it to write a higher level language compiler / interpreter.

about 3 months ago
top

NASA Eyes Crew Deep Sleep Option For Mars Mission

BaronAaron Re:What will happen to their physical condition (236 comments)

This is also in TFA:

One design includes a spinning habitat to provide a low-gravity environment to help offset bone and muscle loss.

about 3 months ago
top

Silk Road Lawyers Poke Holes In FBI's Story

BaronAaron FBI Had VPN Access (191 comments)

My guess is the FBI is covering up that they somehow got VPN access into the Silk Road's internal server network. The same VPN access Ulbricht used to administer the servers from his local coffee shop.

They had already been tipped off about Ulbricht when he tried to order fake IDs from Canada. Then they figured out he was spending a good amount of time using the local coffee shop's wifi. They then sniffed his wifi traffic directly or just ordered the coffee shop / ISP to allow them to do the same. They couldn't decrypt his VPN session but they could see the destination IP which either lead to his server host provider or a 3rd party VPN service. Either way they just pressured the company that runs the service to give them the keys. Now that they have access to the server network they could collect what ever information they needed to build a case.

The key to my theory is the PDF of the PHPMyAdmin access. Notice it's an internal IP address. No way they were accessing that from anywhere but the server network.

about 3 months ago
top

Internet Explorer Implements HTTP/2 Support

BaronAaron Re:Header Compression + Binary Headers (122 comments)

Plain text is great when you're just transferring text. The problem is HTTP has been used for transferring a lot more then just text for a long time. Images, file downloads, video, etc. With HTTP/1.1 browsers have different parsing code paths depending on if it's a binary file or plaintext html. There are also special cases for handling white space and stuff like that. It makes developing and testing a browser more complex then is should be.

about 3 months ago
top

Internet Explorer Implements HTTP/2 Support

BaronAaron Re:Header Compression + Binary Headers (122 comments)

This won't effect AJAX. HTTP is abstracted away from the javascript engine by the browser. I imagine there might be some additional HTTP header parameters to play with while making AJAX calls, but that's about it. All the benefits from HTTP/2 will happen behind scene as far as AJAX is concerned.

about 3 months ago
top

HP Introduces Sub-$100 Windows Tablet

BaronAaron Re:No touchscreen by default (182 comments)

The Stream laptops won't have a touchscreen by default, not the tablets.

about 3 months ago
top

Sci-fi Predictions, True and False (Video 1)

BaronAaron Star Trek Communicators (139 comments)

Anyone who thinks we surpassed TOS flip communicators didn't really pay attention. Those things had a range past orbit without the use of a cell phone tower or any other kind of relay infrastructure. The TNG communicators, on top of that, were hands free speakerphones with perfect audio quality and small enough to pin on your jacket.

I also never noticed them needing a charge.

about 3 months ago
top

Developing the First Law of Robotics

BaronAaron Re:So, a design failure then. (165 comments)

With Asimov stories, start by assuming there was a fundamental shift in computing. The positronic brain is an artificial version of our brains, not a Turning machine. Even if you could manually rewire every neuron and synapses in a human brain you could not program a person in the traditional sense. Everything is based on fuzzy logic. Our brains don't work in absolutes and pure logic like a traditional computer.

The robots in Asimov books are like a brainwashed slave race. If you are brainwashing your human level intelligent slave race, The Three Laws is a good starting place.

about 3 months ago
top

Developing the First Law of Robotics

BaronAaron Re:So, a design failure then. (165 comments)

Unlike the robots in this experiment, most Asimov robots are not programmed in the traditional sense. Their positronic brains are advanced pattern recognition and difference engines much like our own brains. The Three Laws are encoded at a deep level, almost like an instinct.

In the story Runaround, Speedy is much like a deer in headlights, stuck between the instinct to run away and remain concealed. Doing neither very well. The design mistake was putting more emphasis on the third law versus the second. The PHBs knew better though and felt the robot was too expensive to leave to the command whims of the human mining workers.

I like that story because it illustrates what happens when managers make engineering decisions. ;-)

about 3 months ago
top

Could Tech Have Stopped ISIS From Using Our Own Heavy Weapons Against Us?

BaronAaron Re:Like DRM? (448 comments)

I think you're on to something. You don't need to blow the tank up to make it inoperable though. A command that simply instructs the engine and/or transmission to enter a mechanically unsound state and cause a major failure would work well enough.

about 4 months ago

Submissions

BaronAaron hasn't submitted any stories.

Journals

BaronAaron has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?