Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment "Let's hope" (Score 1, Interesting) 389

I'm curious at the usage of the phrase "let's hope". A correctly placed nuclear device in the that seals off the oil as well as causing a collapsing void that traps any fission products generated sounds a lot better than pouring yet more megagallons of oil into the ocean.

(your milage may vary in practice a fair bit from theory of course)

Comment Re:then don't reward them? (Score 1) 874

Considering that one of the things it seems the article's computer *can't* do is handle a slashdotting without crashing and going up in flames, I would hardly consider linking to them being a reward.

I love that someone used that "going up in flames after being Slashdotted" cliche on an article about things computers don't actually do.

You might not have had happen but I have. A proxy server whose RAID controller quite literally caught fire, fortunately it didn't burn for long or hot, just enough to char the inside a little - the server room suppression system didn't get set off...

Comment Re:My personal favorite (Score 2, Insightful) 874

All I remember from the first film was that one of the octets in an IP address was in the 300s. Boy did that ruin an otherwise spot-on movie.

Yep - a blog elsewhere says "75.748.86.91" and "23.75.345.200" were used.

IPV4.5?

Thats would have been purposely done to prevent people deciding to attack a real IP belonging to someone out there after seeing it in the film, something along the lines of the 555-xxxx phone numbers they usually use. Of course they could have just used a 10.../192.168.../172.16.. address instead.

Comment Re:When I was your age... (Score 1) 81

Now that "the network is the computer", it is not enough to emulate just the local machine... much of what a computer does relies on interaction with a network that will be radically different in just a few years. E.g. how will all those DRM encumbered videos and tunes authenticate?

Simple: take a snapshot of environment that the authentication requires, and then emulate that in perpetuity.

Sounds simple... so why aren't pirates currently doing just that?

Image

4G iPhone Misplacer Invited To Germany For Beer 164

eldavojohn writes "You may recall the hapless engineer who left a fairly sensitive iPhone at a bar recently. Well, in a PR stunt, Lufthansa has invited him to visit Germany on their dime after citing his latest Facebook status, 'I underestimated how good German beer is' as well as his obvious passion for German beer and culture. It's not clear if Gray Powell has decided to 'pick up where he last left off' (as the letter puts it). I know what my decision would be."

Comment Re:Am I missing something.... (Score 1) 351

It may depend in the jurisdiction but it generally works like this:
They send out a form letter to the owner of the car to sign and pay which is basically an admission of guilt which they expect the vast majority of people to just pay and be done with it.
It also allows the nomination of a different person as the driver, who would then get that form letter themselves.

Slashdot Top Deals

In any formula, constants (especially those obtained from handbooks) are to be treated as variables.

Working...