Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Overnight battery charge loss (Score 2) 609

The only real issue in this whole debacle is the large loss in battery charge while the car was parked overnight. Looking at the graph that Musk posted here I can see the battery charge taking a steep dip right as the car is supposedly parked. The graph of remaining miles shows it even more clearly - obviously the computer was extrapolating from the sudden battery charge drop.

So, what caused the sudden drop? The speed graph isn't fine enough to determine of the car was driven, and although there is a cabin temperature spike, the reporter says that happened the next morning when he was told to run the heater for a while. The engineers were obviously thinking it was temperature related, and thought that with a bit of "conditioning" it would all be ok. Thus the suggestion to run the heater, and to slow-charge. Finally the assumed the computer had it wrong and told him it was ok to drive - and were probably wrong.

So, the only real conclusion left is that the battery actually lost charge overnight. Did Broder sabotage the result by running the heater longer than claimed, or drove around in circles (again) to run it down, or maybe he just left the headlights on overnight?. We'll probably never know.

The alternative is that the Tesla batteries discharge substantially when not being used in cold weather. That should actually be pretty easy for someone else to test.

Comment Re:Why should the government asses the bid? (Score 3, Insightful) 125

Because without some sort of proof of a sound business model, a company can underbid/overbid (underbid on cost, overbid on the fees they will pay the government) just to get into the market. Then they can run the service into the ground, suck any money they can out into 'consulting fees' and other such expenses that end up in the investor's pockets, and then just go bankrupt. The government gets left holding the run down remains, and suddenly all the trains stop.

Comment Re:Revocability of biometric identifiers (Score 1) 178

I think you are missing a critical point about biometric identifiers however. A password can be change an infinite number of times, a token can be replaced an infinite number of times. A fingerprint? - well once you have changed it ten times you are out of luck.

Biometrics are just "something you have" but with limited ability to replace. Its a weak token at best.

Comment Re:Does anyone remember the 3-factor security? (Score 1) 98

Two of those three factors - the "something you have" and the "something you know" can be changed. You can be issued a new security card, and you can change your password. The third factor - "something you are" can not be changed. This makes it a lot weaker than the other two factors because if at any time in your history it has been stolen, then it is no longer secure and useful - ever again.

What do you do when your security system requires all three factors, but you already know the "something you are" has been compromised? Let's say it's a staff member with high level security clearance who you know has had their biometrics copied. Do you fire them because they can no longer meet the three factor requirements? or do you just allow them to continue on with two factor? and if the latter, then why did you have the third to begin with?.
Android

Submission + - XBMC Ported to Android (xbmc.org) 3

TheUni writes: "We have been keeping a little secret.. the kind that is so much fun to share when the time comes.

Today we announce XBMC for Android. Not a remote, not a thin client; the real deal. No root or jailbreak required. XBMC can be launched as an application on your set-top-box, tablet, phone, or wherever else Android may be found.

The feature-set on Android is the same that you have come to expect from XBMC, no different from its cousin on the desktop. Running your favorite media-center software on small, cheap, embedded hardware is about to become a hassle-free reality. And as Android-based set-top-boxes are becoming more and more ubiquitous, it couldn’t be a better time. In fact, primary development was done on a Pivos XIOS DS set-top-box. And that is no coincidence, you will notice that Pivos is now listed as an official sponsor (more on that later). XBMC is stable and works great there, as well as on various tablets and phones. Though with Android, as many of you probably know, that is only the beginning of the story.

Enjoy the stereotypical dev-shot low-quality demo video. More video, including phone/tablet usage in the next post."

Comment Pictures + Math (Score 2) 394

Pictures are very universal. Cave drawings of people hunting animals were immediately understood by people who discovered them. Put in blueprints of the site layout, use atomic model images to denote where material was stored, in what, etc.

Math is also very easy to convey graphically, especially binary. You just have to include a big 'key' at the start to define your symbols. Start with "0 1 10 11" (0,1,2,3) followed by "01 + 01 = 10" (1+1=2) to give the symbols for addition and equality, then multiplication ("10 x 10 = 100"), etc. Once you have the basics it will be easy to convey everything from atomic numbers to dates.

Comment Re:Inconsistencies in TFA (Score 1) 383

The judge ruled that the US had to supply Dotcom's legal team with all the evidence they had collected so he could use it to defend himself at the extradition hearing. The US want to appeal that ruling, and have said they will take it to the New Zealand Supreme Court if necessary. The delay is to give that appeal time to happen. Kim is saying that they are jerking him around by refusing to hand over the evidence to the defense.

Comment Re:Public Perception of Kim Dotcom (Score 1) 383

I have to agree. What will be most interesting for me is the discussion around MegaUpload paying 'popular' users. If they reasonably knew user X was uploading Dexter episodes, and they paid that user money because their uploads were popular, did they have the responsibility to ensure that user was legally entitles to distribute that content?.

I hope the answer is 'no' - as long as there is some plausible scenario where the user might be entitled to do so, it should not be up to the infrastructure provider to check. Indeed, how could they? - start calling the studios and saying "hey, do you have a staff member with an account called "jose4452" on megaupload and do they have permission to promote Dexter by uploading episodes?". Would they be expected to work out that an obscure b-grade movie was in fact owned by a guy in Detroit and get hold of him to ask?

Once you add in factors such as countries where time/format shifting is legal, and that just because it's called "Dexter.avi" doesn't mean it's actually a popular TV show, and it would be insane to feel that the burden of checking falls upon them. The safe harbor provisions of the DMCA are there for this exact reason.

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...