Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:acceptance is the only fair outcome (Score 1) 301

It's true that we need more men's liberation. Like women threw off the old ideas of what the ideal woman was in the 60s, men need to do the same today. Forget all that macho crap about not backing down, not showing emotion or weakness, having to take care of women to feel valued. Don't blame women or get upset because they seem to have freed themselves and you haven't. They are showing you the way to liberation, embrace it.

Comment Re:Isn't "Chinese Security Vendor" an oxymoron? (Score 1) 63

You are just projecting US thinking onto the Chinese government. They have little interest in turning AV software into a trojan, because they don't want or need to spy on their citizens that way. They have more direct means, and prefer censorship over mass spying because it's cheaper and easier.

Unlike the US, China does have an interest in keeping its citizens safe so doesn't break their security software.

Comment Re:Broken test? (Score 2) 63

Sure, sometimes keygens are trojans as well, but those are covered under the heading "virus". Most anti-virus software also detects perfectly harmless keygens these days, supposedly to "protect" the user from "accidentally" generating a key and pirating software.

I use some keygens for old software that can't be bought any more. It would be lost to the world without those keygens. I even had keys for some of it, e.g. a Windows 98 serial that was stuck (with a non-removable sticker) to the side of an ancient PC case long ago sent to the dump, and which I now want to install in a VM to play some old games that don't work on Windows 7.

I don't want my AV software deleting those perfectly safe files, thanks. I'm already paranoid enough to run them in a disposable VM anyway.

Comment Re:Gamechanger (Score 1) 514

It sounds like you would be better off reducing your power consumption if it that high. Do you have electric vehicles perhaps? There are lots of things you can do that improve quality of life and reduce power consumption, and in the medium term save money.

Comment Re:Can't wait to get this installed in my house (Score 1) 514

So if everyone avails themselves of the cheap electricity in the middle of the night to store for use during the day, the excess capacity vanishes and instead we get an actual load needing to be catered for in additional capacity. So the cheap rate would be discontinued due to changes in consumption habits.

Even so, the day time peaks would be significantly flattened if enough people did it to make ending the TOU tariff worth while, so overall costs should be lower. Covering those peaks is extremely expensive.

Comment Re:Can't wait to get this installed in my house (Score 5, Informative) 514

Tesla give you a 10 year warranty and maintenance contract with the pack, so clearly these things are rated for more than 5.5 years of operation.

Since the warranty is 10 years the MTBF must be significantly longer, to keep the failure rate low. It's interesting that the 10kWh pack is for "backup" while the 7kWh pack is for "daily cycling". I'd guess that the 7kWh pack is physically the same as the 10kWh one, only cycled 30% less to extend battery life.

Realistically they would have to be looking at an average 20+ year lifespan to give you a 10 year warranty and maintain a profitable failure rate.

Submission + - Mozilla Begins To Move Towards HTTPS-Only Web

jones_supa writes: Mozilla is officially beginning to phase out non-secure HTTP to prefer HTTPS instead. After a robust discussion on the mailing list, the company will boldly start removing capabilities of non-secure web. There are two broad elements of this plan: setting a date after which all new features will be available only to secure websites, and gradually phasing out access to browser features for non-secure websites, especially regarding features that pose risks to users' security and privacy. It should be noted that this plan still allows for usage of the "http" URI scheme for legacy content. With HSTS and the upgrade-insecure-requests CSP attribute, the "http" scheme can be automatically translated to "https" by the browser, and thus run securely. The goal of this effort is also to send a message to the web developer community that they need to be secure. Mozilla expects to make some proposals to the W3C WebAppSec Working Group soon.

Comment Re:Someone going to link one here? (Score 1) 96

However, an injunction against a VPN provider where there is clear non-infringing use would seem disproportionate â" which probably means that a mainstream VPN service, used by corporates, is more likely to survive than a service named "usethisvpntoinfringecopyright" or the like.

This is the part I'm most interested in. I use this service mostly to protect my privacy from ISP/GCHQ spying, and to ensure I have a clean, unfettered internet connection. That's the primary purpose of this service, since it doesn't give me access to any private networks or anything like that.

So, the question becomes, does a service that is used to enhance privacy and block spying have enough non-copyright-infringing uses to make a block disproportionate.

Comment Re:I could go all day on this... (Score 1) 160

I'm surprised they were using dynamic memory allocation at all. When you want to create a robust, reliable system like this you normally statically allocate all RAM and don't allow the system to process things outside those limits. That way you don't run the risk of bugs like this happening, or memory leaks, or any number of other issues. It's standard practice for high reliability systems.

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...