Perhaps we won't see a 3000 km long hyperloop, but there's plenty of places where a shorter one would fit. I put it in the same league as Maglev, which also requires a specialised track.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
You'd want to match the force used on the original stamp, else your 'decoy' numbers and letters will leave crystal deformation pattern that differs in intensity from the real digits. Probably easy if you're the manufacturer, but a touch harder if you're some guy with a hammer.
Google won't torture you by mistake. Well, as far as we know, anyhow.
The only weakness is that it needs to be repeated on newer ssds as they hit the market. The results of this test are relevant for drives released back when the experiment started in 2013, less so for drives released now and even less so for future drives. As the manufacturers realise that the drives are lasting much longer than they are specified to, they'll decide they are overengineered and rework them to wear out quicker. Aside from the obvious cost cutting benefit, it also keeps the market segmented in various grades between "low end consumer ssds" and "high end enterprise ssds".
> For bug tracking and reporting issues my experience has been either I get no response or I don't have the capabilities to supply the developer with the information they need to track the bug down.
You don't need to find the bug.... you just need to make it reproducible. A reproducible bug report is essentially as good as finding the bug itself; once the dev can follow your steps to reproduce it, he'll find it in short order. If you're getting no response, it's either a dead project, or your report is not specific enough. There's no upper limit on the time investment needed to solve a "it crashed when I was using it", but "it crashed when I open this file" is readily fixed.
So basically, youtube?
> "By orders of magnitude, when we find new vulnerabilities, we share them"
I wonder how many ways they've thought of to misclassify freshly discovered vulnerabilities as old.
So I assume all the deliberately introduced vulnerabilities are excluded from the tally because they technically "did not find them" ?
.. same as the old boss
> So, how to accomodate non-smartphone users? Different floors with bluetooth vs card key? Just don't go to that hotel?
They could have a box of 'loaner phones' that they hand out...
Hotel door app requires access to contacts, shared files, camera, microphone, GPS, SMS, internet, dropbox, google drive, online banking,
It's VPNs all the way down!
It seems like they are viewing tor as a "free vpn" so people can use facebook without their employer/school/etc knowing what they are doing.
Proprietary? You're ill informed. The code that writes those files is part of systemd. Anyone with a computer can grab a copy and rewrite them.
it's people in general. Anyone remotely famous gets plenty of "internet abuse". It's a side effect of being known. Politicians? check. CEOs? check. Bankers? check. Celebrities? check. Religious leaders? check. Reporters? check. Whistleblowers? check.