Forgot your password?
typodupeerror

Comment Looks like a robotic arm on a rail (Score 2) 41

This doesn't seem like particularly new tech, just a tweak on what the automotive industry has been using for several dacades. I'd also be curious if that "twice as fast" calculation takes into account the time necessary for setting up the necessary rails etc. required for the Maximo robots to operate.

Comment How is the lack of govt information relevant? (Score 3, Insightful) 80

Assuming it's remotely true (and there's good reason for thinking it isn't), it still means the FBI director was negligent in their choice of personal email provider, that the email provider had incompetent security, and that the government's failure to either have an Internet Czar (the post exists) or to enforce high standards on Internet services are a threat to the security of the nation (since we already know malware can cross airgaps through negligence, the DoD has been hit that way a few times). The FBI director could have copied unknown quantities of malware onto government machines through lax standards, any of which could have delivered classified information over the Internet (we know this because it has also happened to the DoD).

In short, the existence of the hack is a minor concern relative to every single implication that hack has.

Comment Re:X86 CPUs (Score 1) 329

I think one of the problems Asahi runs into is that macOS can already be used for almost everything a Linux box can be used for - so it's harder to get excited about working on it.

My work-provided laptop is an M3 MacBook Air. I use it to admin ~ 100 Linux servers and workstations, and I can't say I've yet run into a situation where I said "darn it, that apparently doesn't work on a Mac". There are some command-line switches that are different between the two, but I think that mostly comes down to the difference between BSD vs. Mac. And I can (and do) install the Gnu tools.

Comment Re:Coming soon off the back of this (Score 1) 112

Doesn't have to be a credit card. A class III user digital certificate requires a verification firm be certain of a person's identity through multiple proofs. If an age verification service issued such a certificate, but anonymised the name the certificate was issued to to the user's selected screen name, you now have a digital ID that proves your age and optionally can be used for encryption purposes to ensure your account is only reachable from devices you authorise.

Comment Re:Dumb precedent. Addiction is on the user. (Score 3, Insightful) 112

And those come with warnings, legal penalties on vendors who sell to known addicts or children, legal penalties for abusers, financial penalties to abusers, etc. There are cars which have their own breathalisers.

So, no, society has said that the responsibility is distributed. Which is correct.

Slashdot Top Deals

Never ask two questions in a business letter. The reply will discuss the one you are least interested, and say nothing about the other.

Working...