Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.


Forgot your password?

Comment: Re:am disappoint (Score 1) 78

by wbr1 (#48744349) Attached to: Intel Unveils 5th Gen Core Series Broadwell-U CPUs and Cherry Trail Atom
It is not 'a simple browser' when loaded with extensions. Without extensions, the performance of chrome and firefox are fine. My argument holds, and the issues is not the browser. The biggest issue I see is webpage bloat. 2-3 tabs can easily take over 1GB RAM, but RAM is cheap and easily upgradable in most cases.

Comment: Re:am disappoint (Score 1) 78

by wbr1 (#48742379) Attached to: Intel Unveils 5th Gen Core Series Broadwell-U CPUs and Cherry Trail Atom
This... aside from hard drive failure (other hardware failure is rare in comparison), and malware/OS bloat. There is nothing a core 2 duo cant do for 90% of computer users.

The only way that will change is a killer app that requires more (which I do not see). For workstations and scientific data the march is great, but it has moved beyond consumer needs.

Comment: Re:But its cold where I live today (Score 1) 560

by wbr1 (#48717733) Attached to: 2014: Hottest Year On Record
Not only that, if you believe in mythical sky beings (I do not), then God gave HUMANS the power and responsibility to make of this world what we will.
To say whatever happens is God's will and we have to accept, not change is either willful ignorance, abject laziness, or masking some ulterior motive (IE greed and power).

And God blessed them, and God said unto them, Be fruitful, and multiply, and replenish the earth, and subdue it: and have dominion over the fish of the sea, and over the fowl of the air, and over every living thing that moveth upon the earth. Genesis 1:28 KJV

Comment: Re:requires root access and will only run on Qualc (Score 1) 71

by wbr1 (#48714181) Attached to: New App Detects Government Stingray Cell Phone Trackers
You seem to know more than I do,however, the COW, being a device inserted into the carriers network by said carrier, I would think would have a different ID for whatever loadbalancing/handoff protocols occur on that network. This may not be true, as it may be easier to just copy an existing base station ID than provision all the backend hoo haw for a temporary device. But if it is true, my scheme should not produce as many false positives as thought.
By their nature (unless willingly installed by the carrier), a stingray would be spoofing its identity and therefore slightly easier to detect. Combined with a crowdsourced map to create a basic whitelist, you could do quite a bit I wager.

ASHes to ASHes, DOS to DOS.