Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Disapear (Score 4, Informative) 156

"How much of this water is returned back into the system?"

  Almost none. It's evaporated into the air, taking the thermals with it.

"How much of this water is pulled directly from a river then returned to it a little warmer?"

  None. Google looked at doing that to the Columbia river in Oregon, but the temperature rise it'd cause was deemed as dangerous to the fishing stocks and so it was not allowed to.

The one exception is the DC in Finland, which is adjacent to the sea. They can pull and dump the thermals into the sea directly, as obviously the ocean has more thermal capacity than a single river.

"This is how liquid cooling a nuclear power plant works. Why would it be any different for a data center?"

because power plants are public utilities and Google isn't. What's good for the public isn't necessarily allowed for a private enterprise. Also I don't think that even power plants are allowed to be constructed to do that anymore, as it was realized as being too damaging to ecosystems.

 

Comment Re: Use Amazon in your ads and... (Score 4, Insightful) 29

The obvious big danger here is companies conflating competitive threat with security threat, thereby reducing their credibility wrt legit security concerns in the name of protecting profits. To date, the security business has been an ivory tower of credibility and collaboration, and its necessary to keep it as such. The inexorable push of capitalism heaps another good idea onto the slag pile.

Comment Re:obligatory, by now (Score 1) 109

That is really optimistic about people following directions. I think the author under appreciates vandalism, or simply not following directions out of spite.

If one of those Help buttons was pushed repeatedly, for example. Or if one of the employees didn't do what it was told. Or the employees attempted to outsmart "manna" by probing for it's logic weaknesses, and, then finding them, exploit them.

One of the reasons that employees are reluctant to exploit human mangers is because of the guilt they'd feel. There'd be less guilt in exploiting the oversight weaknesses of an AI, and it'd become a game.

Comment Re:The cupboard of history (Score 2) 105

"For example, Scott Adams was banned from twitter"

--"I would regard it as treason"

lol no. He knows about as much about the Constitution as his favored candidate knows. Treason is a capital offense from the constitution, one of few, and this is not that. It's doesn't even violate the First Amendment, although it might be censorship.

I don't know anything either way about the trueness of his claims of being shadowbanned by Twitter, but it's not treason, and it's not a First Amendment issue, and it's not even remotely illegal. If you don't like their platform, don't use it.

It'd be pretty funny if Scott was able to prevent the sale of Twitter, though.

Comment key based auth (Score 1) 23

Why not use key based auth instead of password based?

Probably for the same reasons that crypto email never worked out, but I wish it were an option on things like banking websites.

I'm now using a password manager, so I can use pretty hard passwords without having to try to remember them. But using signed certs would be much much stronger still.

Comment Re:Fewer candidates to draw from... (Score 1) 580

I'm not so sure that they would reject anyone who downloaded, but that they would reject someone who lied about it. I've seen reports that they will even accept candidates that have some minor drug use in their distant past, but the problem with their application comes when it's lied about.

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...