Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment I wonder if this is the only 3d technology in use? (Score 1) 57

There are several additive 3d printing technologies I'm aware of, as well as multiple subtractive technologies (including conventional CAD/CAM). I could conceive of a future where a factory is stocked with raw materials and then programmed to manufacture [whatever]. Appropriate monitoring and maintenance (either human or robotic) would still be needed, but it would make retooling an assembly line an almost obsolete process.

Comment Re:I'm curious (Score 3, Insightful) 42

"I think we should look at this from the military point of view. I mean, supposing the Russkies stashes away some big bomb, see. When they come out in a hundred years they could take over... In fact, they might even try an immediate sneak attack so they could take over our mineshaft space... I think it would be extremely naive of us, Mr. President, to imagine that these new developments are going to cause any change in Soviet expansionist policy. I mean, we must be... increasingly on the alert to prevent them from taking over other mineshaft space, in order to breed more prodigiously than we do, thus, knocking us out in superior numbers when we emerge! Mr. President, we must not allow... a mine shaft gap!"

- General Buck Turgidson

Comment How is it delivered? (Score 3, Interesting) 43

Sneakernet and USB? You have received an e-card from a total stranger for no apparent reason? You got it from a toilet seat while surfing warez.com?

This may be an evasive piece of malware, but I'm pretty sure that this is a standard expectation from malware these days. As good as this software may be at obfuscating its presence I suspect tripwire will detect it readily enough (if the local SysAdmin has any security awareness whatsoever). Hooking into something like lib.c should ring alarm bells all over the place.

If deployment software such as Puppet or Chef are in use, file hashes won't match and shared libraries will be overwritten with (presumably known-good, clean, static) versions - probably very quickly, and once more, there will be a flashing neon sign blinking out "Problem here".

It'd be nice to know the propagation mechanism. If it were floating around in public code repositories, it would be a lot more widespread than it is, so I don't think I need to worry about apt-upgrade or yum update just yet. Most of the end-users I've ever dealt with think UNIX are for guarding harems. Inside job? Best way to hide exploits, have someone on the inside making sure they stay hidden.

Comment Re:How long can we sequester? (Score 1) 35

If sequestering is good for carbon, why is it bad for say for spent nuclear fuel?

'Cuz carbon isn't toxic. When sequestration fails, carbon isn't likely to kill whoever finds it - it'll probably just smell really bad. Granted, there's no half-life, so it'll always smell funny; but it still isn't toxic for timespans measured in millennia.

Comment Re:Business isn't going to use this (Score 1) 45

Yes, but those aren't generally implemented in "always on" configurations. The most convenient conference room audio/video connectivity hardware on the market has to be "always on" so that it can be remotely controlled (by Managers with appropriate login passwords set to 1...2...3...4...5).

Even I don't run Skype/Zoom/[insert conferencing software solution here] in an "always on" configuration. A lot of these hardware solutions (including, presumably, Meat's offering) are designed for "always on" operation (i.e., connectivity as a service).

Damned spell-check. DIdn't catch me misspelling Facebook's new name. Oh well, I guess my error will be ensconced in post history from now on . . .

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...