Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:A fool and his money.... (Score 1) 180

Pretty much every Nexus phone has had a battery that is easy to replace, for levels of easy varying from "you can do it with one hand" to "you need a fingernail and a common Philips screwdriver". Sure, the Nexus 5 and 5X batteries aren't officially "user replaceable", but they're about as hard to replace as 4 AA cells in an old toy with a battery lid with screws. It takes more effort to replace the CMOS battery in a random PC than to replace the battery in a Nexus 5 or 5X.

Comment Re:Remember the NASA Wind Turbines? (Score 1) 184

Current blades are trucked in one piece (per blade) which is impressive to see. Three of them were parked on I-5 outside of Patterson, California a few months ago. There are a lot of net videos and photos which convey the scale.

Even at the current size they can't get through many highway interchanges and local intersections. The larger ones won't be able to ship in one piece at all.

Comment Remember the NASA Wind Turbines? (Score 4, Interesting) 184

NASA Wind Turbines approached this scale in the '80's. Unfortunately, this was a previously-unexplored area of aerodynamics for NASA, and they had mechanical stress and noise problems (including subsonics) and were all demolished. I think there was one near Vallejo, CA being taken down when I got to Pixar in '87, and one in Boone, NC, which famously rattled windows and doors.

The art has since improved. I took a ride to the top of the turbine at Grouse Mountain, that was fun! That's the only one I have heard of where you can actually get to see it from the top.

Comment Starting out with the wrong assumptions (Score 2) 165

This is starting out with the wrong assumptions.

Design a brick system that can be produced with 3-D printers, and will hold together when fabricated within the tolerances of an SLA printer. Forget FDM, it's too low precision and SLA is already achieving an equal or lower cost of manufacture compared with FDM.

LEGO is manufactured to astonishingly high precision, but I am not convinced that this is the only way to make a brick system.

Comment Re:No comparison (Score 1) 132

Blue Origin will eventually have a two-stage rocket that can reach orbit (although they are planning on a much smaller payload than SpaceX for their first iteration). When the booster of that rocket lands without damage, they will duplicate what SpaceX has recently done, although in smaller scale.

Blue Origin to SpaceX at present is a sort of bicycle-to-automobile comparison if you account for the tremendous difference in energy and the application. So, I think there really is an intrinsic difference between the two of them.

If you want to say there's no intrinsic difference, then we need to look at Orbital's Stargazer and Pegasus, which have been carrying small payloads to orbit for years, and there's only been one Stargazer all of that time so there is no question that it's reusable. The only difference is that Stargazer lands horizontally.

We can then look at the B-52 and X-15 combination, in which both stages were reusable, a human was the payload, and we're going back to the late 1950's.

Comment Re:Affects me, the last two companies I worked for (Score 4, Informative) 60

Only if you don't use an SSH agent. If you use an agent to store your keys, they are safe. Even if your keys leak because you're not using an agent, they can only leak in encrypted form (you use passphrases, don't you?). When the vulnerability is about to be triggered, a strange message (connection suspended, press return to resume) appears and must be dismissed (if you ^C at that point, you are safe).

In otherwords, this is a panic situation only for people using non-passphrased keys and no SSH agent. You also have to accept a prompt that is not normal and should raise red flags before the vulnerability can happen. People who fit that description probably have other security problems to worry about.

More realistically, you should patch your servers if you use any kind of SSH-based automation (e.g. where one master server uses SSH to automate tasks on slaves), since this allows an attacker to escalate from a target machine to the automation machine. But that requires first compromising the target, so it is not an emergency situation (unless your machines are already compromised and you don't know it, in which case, again, you have bigger problems).

Slashdot Top Deals

In the future, you're going to get computers as prizes in breakfast cereals. You'll throw them out because your house will be littered with them.