Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Why not build them on the beds of rivers (Score 1) 223

What you propose is possible for things like ocean currents, but a river isn't deep enough or have enough of a continual flow to be useful for power generation unless you use a dam to build a reservoir. Then the water can be released at a steady rate, and you can hide the power generation portions in places where there is no boat traffic, like inside the dam.

Comment Re:Not necessarily true ... (Score 1) 44

But my point being, as long as your product is THE ONLY ONE IN THE MARKET, and as long as the market still exists, you have nothing to worry about.

If you think you are the only one in the market, there is a good chance that you have completely misdefined your market. History is littered with companies that thought they had their market down pat and that they were the only major dominate player in it. But there are always products that are just tangential to your market that make a good enough replacement that some consumers will start using (and then the company will improve making it good enough for other customers). See Blackberry, Blockbuster, large steel mills. Most companies will miss this until it's too late since the first customers to leave are usually the most price sensitive (and therefore usually the least profitable ones).

The only company that really catches onto this well is Apple who's fully willing to cannibalize their sales of one product to introduce a new one in a slightly different market. See the iPhone basically killing off the iPod and the iPad starting to eat deep into the Mac sales.

Comment Re:The blogspam is a crock of shit. (Score 1) 488

The new company he works for actually released it already. It's been on github for the last 7 months. If there was a question of ownership on the code, why it couldn't be figured out from comparing the released version of Visdom to the internal version of Sophia to see if any code was stolen is left up to the reader.

Comment They know how cookies work right? (Score 4, Insightful) 125

It looks like they're exporting, deleting and then reimporting cookies before the cookies are set to expire. They can then get back into the site they just had access to. I fail to see how this "exploit" isn't actually the expected behavior of a properly functioning login tracked with a cookie.

Slashdot Top Deals

Arithmetic is being able to count up to twenty without taking off your shoes. -- Mickey Mouse

Working...