Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:The US tech industry (Score 1) 283

With turbo boost, it runs until it hits a thermal limit, then scales the clock speed back a bit at a time until the load stops or it hits a speed at which it can run continuously without overheating. So it almost certainly will eventually throttle back to a lower clock speed, but that may or may not be 1.4 GHz. For example, if you are running only one core at full throttle, it will probably not scale back that far.

But no, it almost certainly cannot run at 2.7 GHz 24x7.

Comment Re:This seems the obvious solution (Score 2) 202

http://www.liquipel.com/

They coat the chips in some sort of coating that insulates them.

My first inclination would be to get the biggest heat sink I could find, fasten it to the motherboard, and build a 12V to 5V and 3.3V DC-DC converter (and 1.8V, if needed). By not starting from 110VAC, you can cut the PSU heat to a level that might be manageable without fans. Then get extension cables for any connectors that you want to keep usable, along with a couple of heavy gauge wires for your 12V leads, stick the whole thing in a plastic box or bag with the cables hanging out the top, and fill it with epoxy....

Mind you, such an approach is almost certainly not advisable, but that would be my first inclination. :-D

Comment Re:The US tech industry (Score 4, Informative) 283

As many folks have already pointed out in other threads on the subject, Intel screwed up the Haswell line by using an entirely different pinout on the i7 than on the i5. The result is that any motherboard with soldered-on chips has to be specifically designed for one or the other.

Apple chose the i5, presumably because that's the hardware grade where most of the Mini's sales came from, rather than doubling their R&D cost by building two very different motherboards.

Here's hoping Intel doesn't screw up Broadwell in the same way.

Comment Re: Passwords should not exist (Score 2) 223

They only fix 2 problems - weak passwords and keyloggers.

That's not true. They also provide protection against:

  • Shoulder surfing attacks, which require no compromise to the internals of the endpoint
  • Storage of data encrypted with a protocol that later proves vulnerable in some interesting way, such as a key compromise

For example, consider heartbleed. If someone stores your encrypted communication, and later compromises a host's private key, that attacker could ostensibly decrypt those communications. If you use a password, that password is compromised, and it's "Game over, man." If you use a physical token, only the PIN is compromised (assuming the actual verification happens in a separate process).

Ideally, you would still want to issue new PIN codes, but the account hijacking risk would be largely mitigated by the physical token requirement, at least after the n-hour cookie expiration window passes, and you could even eliminate that window by expiring any cookies in your authentication database before bringing it back online after you fix the heartbleed vulnerability.

Comment Re:USB VID is meant for a specific organization (Score 1) 572

Regardless of the fact that it may be legal for others to do so, it's unethical and clearly misrepresentation.

Not true. Lots of small homebrew hardware uses off-the-shelf chips like the ones FTDI builds without applying for their own VID/PID combo. This causes minor headaches because software can't tell them apart from one another, but as long as the final product doesn't have a USB logo on it, it is perfectly acceptable to sell it, even if your homebrew flash programmer looks like a USB to serial adapter to any software that asks.

If you want to use the USB logo, you have to apply for your own VID/PID combo and reprogram the chip to identify itself as being your product, and ship a custom driver that talks to it (which could be a modified version of the official FTDI driver, or the open source driver, or whatever).

Comment Re:A bit???? (Score 0) 168

But this involves TECHNOLOGY so it must be evil because without TECHNOLOGY there would be other possible way for the folks at the airport to calculate how long you might be waiting in line.

No siree, no way at all. You standing there, in full view of every person, in a public space. No way to check. None at all.

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...