Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:What does it help us? (Score 1) 41

What would an open source fab be like? Even if you had the space, all the stuff that goes into making a chip is highly proprietary (chip simulation/testing, equipment, chemicals, plastics, ventilation etc) - some company spent a fortune building it and they want their cut.

The next best thing - companies like TSMC will take your design and make a chip - it's not even that expensive (as far as making chips goes) - they publish all the manufacturing guidelines and everything so there's no pre-flight issues (can your chip actually be made with the equipment at hand).

Another process is (that involves proprietary hardware again) - you can buy a pretty nice FPGA, design it, test it - and hand that off to be turned into a real chip.

I think it goes without saying that chip making is still one of the most sophisticated manufacturing processes in the world still, but it's not hard to have your own open source design become a real chip. Granted - you may spend 140k on a batch of a thousand chips that don't work (or don't work right), but that is part of the process.

Comment Re: Does it matter? (Score 1) 280

Thats a lie though - it was originally paid for by by the conservative rag "Washington Free Beacon" (remember the RNC were actually against Trump being the nominee) - when Trump became the actual nominee they stopped paying for any research, and the DNC/Clinton picked it back up. The actual answer is BOTH sides paid for it.

The FBI had started investigating Trump's Russian connections long before the dossier was released.

And making the equivalence that Trump was leveraging Ukraine to investigate the Biden's isn't even remotely the same. One is paid private research, the other is leveraging a foreign government by withholding meetings and assistance that Congress (republicans and democrats) had already approved and the DOD had vetted.

Comment Re:I've contracted to government IT many times. (Score 3, Insightful) 78

I mean I work at a university - which is state level - I'd take most any of the people who work here over anyone I think - I've never met a bunch of people who can do so much with so little. We easily finish 20+ major projects every year - many of which require actual programming skills.

I feel like most private firms hire contractors to fix major issues they have (just speaking with friends who work in healthcare for example).

Comment Laptop 18650 (Score 1) 95

You can usually see which laptops use 18650s, by the shape of the case. Pick a laptop, and search Amazon for replacement batteries.

I strip the 18650s out of laptops for other uses. It's just cheaper that way. It usually works out to about $1 for each 18650, including the occasional bad battery.

Thin squares, like the MacBook Pro have, are different. It's pretty obvious that an 18650 wouldn't fit in it.

Built in batteries are more likely to be flat square or rectangle types. You're SOL for replacing those with a pack of 18650s.

I only strip them down for their cells. I suppose if you're *real* careful, you could cut the case open, and be able to reseal it. There are temperature sensors inline, that you'll want to keep. and you'll need to solder the new ones together. They're typically spot welded. And, obviously, you'll need to keep the original control board. ... or just buy a replacement pack on Amazon or eBay. When the batteries die in the laptops I use, I don't try to remanufacture them. While I could do the parts cheap, the labor would exceed the cost of the replacement pack.

https://www.youtube.com/watch?...

Comment Re: Is there any safe, minimal alternative to Ring (Score 1) 40

OK, so if I grab your spare key under your front door mat, did your Schlage deadbolt get "picked"? No, poor OpSec. If I drop my key fob to my car, and you use the remote open door feature to find it and steal my car. Did GM's laser cut key database get "hacked?" No. GM isn't at fault because I made a mistake. A hack is when someone gets a system to act in an unintended way. Ring is performing as expected: put in a valid username and password, then gain entry. They don't report to have biometrics or other means to authenticate it's you. Hell, a sophisticated threat would clone your phone anyway, making the 2-factor call your phone as well as his. This happens often for higher value targets, but rarely makes the news because the threat is much more sophisticated. That said, yes, you're right. Ring could add sophisticated measures but it's not my bank account we are securing. They're cameras. All of mine are outside so I really don't care if you hacked my 4 Ring cameras. You would see my neighbors doing their laundry and me leaving every morning and coming home 6 hours later. This is why my Echo Show has the camera disabled 99.999% of the time. Hack it and you see nothing.

Slashdot Top Deals

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...