Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment The scanning bit isn't the problem (Score 2) 111

The scanning part isn't the problem, it's everything else that is: The triplicate passport checks, the questions, the confused passengers, having to take off your belt, coats (and sometimes shoes), laptops, loading onto the belt... and the reverse after scanning - And that's just the inefficiency in the security line process.

Comment A huge risk, that's paying off well (Score 4, Interesting) 232

Tesla took a huge risk by taking a completely new technology (battery-powered cars) and applying it in a completely new and untested way (performance car). They went into it knowing that they'd be taking a loss for the medium term.

If Tesla are already at taking only a $4k loss / 10% loss, they're doing extremely well:
- The "Supercharger" units that are being aggressively installed across many countries will be accounted for within this unit cost... It won't be long until they reach diminshing returns on their deployment, and the impact of this will tail off.
- They added a number of new product lines, all sinking huge money into R&D. They're close to establishing a range of products so the impact of this will tail off shortly.

Musk could easily choose to add $4k to the sale cost of each cars with minimal impact and result in a 0-dollar P/L, but increasing production count ensures far better long-term return by economies of scale improvements, as well as learning opportunities when scaling aggressively.

Comment The weak point (Score 1) 152

"There is, however, one large problem: What if a person mistypes a password? In that scenario, a fake vault is generated, and a user is locked out of his or her accounts."

This is the weak point - It forces the user, or the system, to generate an additional artifact to inform the user (but hopefully not the attacker) that the password safe is correctly unlocked.

"One possible fix is to create a hash of the master password that is linked to an image that is shown when the password is entered. The authorized user should recognize when the wrong image is displayed, but an attacker would not."

I'd expect this one image to be shown only when the master password is entered. i.e. it is an unique indicator. Fake images will need to be generated for all other passwords, and if there are duplicates then they can be eliminated as false-positives. Strategies like this will always be the weak point. It's commendable that they're attempting to fix the problem, lets just hope the additional complexity doesn't weaken the system overall.

Comment Re:IBM no longer a tech company? (Score 4, Interesting) 283

Amazon isn't 'losing money' - Just take a look at it's top-line growth vs capital expenditure.

Amazon is re-invest revenue instead of distributing back to stakeholders, or keeping cash in the bank. Cash in the bank is seen as waste. Instead, cash re-invested is being leveraged to create accelerated future growth.

Submission + - Ask Slashdot: Can some of us get together and rebuild this community? 21

wbr1 writes: It seems abundantly clear now that Dice and the SlashBeta designers do not care one whit about the community here. They do not care about rolling in crapware into sourceforge installers. In short, the only thing that talks to them is money and stupid ideas.

Granted, it takes cash to run sites like these, but they were fine before. The question is, do some of you here want to band together, get whatever is available of slashcode and rebuild this community somewhere else? We can try to make it as it once was, a haven of geeky knowledge and frosty piss, delivered free of charge in a clean community moderated format.

Submission + - IT Departments - How are you supporting your os code?

An anonymous reader writes: A lot of IS groups are using Open Source tools (Linux, MySQL, PHP, etc...) to build cost effective and reliable IT infrastructures for their companies. Upper and executive management wants to know how these tools will be supported since their isn't one single commercial entity that does by default (ie. Microsoft). So, what does your IS group do? Do you hire staff with the expertise to do support in-house or out source all your support to a third party? Or something else?

Slashdot Top Deals

"Trust me. I know what I'm doing." -- Sledge Hammer