Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The real problem is inertia and stubbornness. You want to know why one of the reasons Tesla did a sports car? Because they wanted to show that electric cars can perform just as well as gas ones when you want to floor it and "have fun" (because well, back in the 60s and 70s, the electric cars were decidedly non-sporty, slow vehicles that couldn't keep up).....
That's only what they want you to believe the real reason was the extension cord was too fragile and if they went 0-60 in 10 seconds the cord would break....
I have tried to report the problem by dialing 9-1-1
Where is the Emergency? 9-1-1 is SUPPOSED to be used for Emergency call
9-1-1 You Keep Using That Word, I Do Not Think It Means What You Think
it won't matter anyway who he sides with, since he's obvious nuts.
Nuts with a Voter ID card.
To help govern the use of cyber weapons and lay out the circumstances under which they can be used, U.S. officials are in the process of developing a doctrine for cyberwar. Similar in concept to the doctrines that dictate when conventional weapons can be used and what targets are legitimate one, the cyberwar doctrine supposedly would lay out ground rules for offensive operations and specify who is responsible for taking those actions. Such rules are vital for conventional military operations, but in the online environment they're unlikely to be of much use.
A major problem with the idea of a cyberwar doctrine is that in order for it to really matter, to really work, the other parties involved in cyberwar operations need to have similar policies. A declaration of U.S. policies regarding cyberwar does no good without similar ones from China, Iran and every other nation involved. If U.S. officials say that they'll only attack foreign networks in scenarios X, Y and Z, all it does is give foreign attackers a blueprint. It certainly has no effect on whether they're going to use their own tools. The Marquess of Queensberry rules do not apply."
Link to Original Source
The "Screen" that contains your speed,engine indicators and a bunch of other stuff?
Duh where do they find these people?
Careful, there. Being pedantic is known to the State of California to cause cancer.
Are you sure? I heard from a reliable source that the California labels cause cancer.
You can ALREADY put a pump into your garage that will fill your CNG vehicle (depending on where you live, this cost would be as little as $0.75/gallon equiv)
$0.75 a gallon ? Bullocks..... the road/fuel/usage tax is probably gonna be higher than that. People forget that alternative fuels sound cheaper than gasoline.... but that is because they are not figuring the tax. Get caught not paying that can be expensive.... Why do you think they dye off road diesel?
First, you can't do it, because standard procedure in cases like this is to duplicate the drive contents and do all analysis on the duplicate. If your system destroyed the data when a "duress" password is entered, it would only be destroying a copy.
Yes but then they are in violation of Copyright...
Anyone who works or worked for Monsanto, needs to be killed across the board.
Hmm be careful you or your 401K may own shares of Monsanto then you will be forced to kill yourself.
Let me guess, it's your fucking constitutional right to evade the law now?
Why yes.... the constitution doesn't prohibit the people from anything