Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:No (Score 1) 503

Can it be refueled from empty to full in 2 minutes like a gasoline engine? What is the battery lifespan? How much will they cost to be replaced?

Planning ahead is something thats needed no matter what you drive. No one embarks on a 300 mile roadtrip with the gas gauge blinking red. This one will have the "large LCD display" reminding you to recharge. The battery lifespan is usually in the excess of 100,000 miles, with typical NiMH batteries giving between 130,000-150,000 mile range. At this point, the batteries are expensive, but if you consider the amount of saving in fuel costs, oil changes, all sorts of filters and pumps, etc. over the course of 130k miles - you'd have saved up enough for a battery pack. Another interesting thing is that the cost of fossil based fuels is on the rise, whereas batteries are becoming less expensive over years.

The moral of the story is, if you can afford to spare $50K for starters, you can save quite a bit eventually.

Comment Re:Fragmentation (Score 1) 75

Dual monitor support isn't really fragmentation. You can switch between single and dual screen, so devices with single screen will not be able to use all the dual-screen features available in Android. Same way having a slide-out qwerty keyboards in Android doesn't mean its fragmented, you just switch from on screen keyboard to a hardware keyboard.

Submission + - Plastic Memory Device Based On Electron Spins (

von_rick writes: From the article: "Our main achievement is that we applied this [vanadium tetracyanoethanide] polymer-based magnet semiconductor as a spin polarizer — meaning we could save data (spin up and down) on it using a tiny magnetic field — and a spin detector — meaning we could read the data back," Jung-Woo Yoo said.

A memory unit that is lighter and draws lower power levels would be a good replacement for conventional semiconductors. However, since the spins are controlled by application of magnetic fields, this technology would be susceptible to strong magnetic fields just like the magnetic tape memories. The article also mentions that the heat generated is significantly low, so it could be made to operate at higher frequencies, if technology permits, without the risk of overheating.

Comment Re:Just what I need (Score 1) 115

Its a good practice to install the applications on the device's internal memory instead of installing it on a removable memory. The advantage of having portable memory cards is that you can plug the card into different devices if you want to share what's on them. However if you have some device specific applications on them, you won't be able to use those apps if your card is being used in a different device.
Open Source

Submission + - CIA Software Developer Goes Open Source (

von_rick writes: Some of the people who manage and use the softwares used in CIA and defense related systems find it hard to work on cases when they have to pay, repay and keep paying for a program because it never becomes the property of the government even after paying hefty sums of money. Some of them seem to be in favor of open sourcing their work in order to share ideas and lower the costs involved in solving crime and managing the gathered intelligence.

Comment Re:Truecrypt (Score 5, Informative) 252

If you were to check the flash drives partitioning, you'll see that it has two separate partitions. The section with encryption program is on the primary partition of the flash drive. When the program executes, you get access to the other partition.

Now I've mounted those drives under Linux by bypassing the login process. Instead of mounting sdc1 (assuming sdc is your encrypted flash drive), you mount sdc2. What I've learnt is that the drive isn't encrypted at all - nor password protected. If you can find a way to format the first partition, you pretty much kill the password protection that comes with the flash drive. The "protected" partition just becomes the default partition when the primary one is unavailable.

TrueCrypt or any other data encryption method is the right way to actually secure your data

Slashdot Top Deals

The trouble with opportunity is that it always comes disguised as hard work. -- Herbert V. Prochnow