Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Submission + - Tesla Preps Bigger 100 kWh Battery For Tesla Model S and Model X (theverge.com)

An anonymous reader writes: Tesla will soon offer a 100 kWh battery for the Model S and Model X that will allow for increased range — perhaps as much as 380 miles for the Model S. Currently, the 90 kWh batteries are the company's largest capacity. Kenteken.TV is reporting that the Dutch regulator that certifies Tesla's vehicles for use in the European Union, RDW, has recently published a number of new Tesla variants. RDW's public database now includes entries for a Tesla "100D" and "100X," which are titles that follow Tesla's current naming system based on battery capacity. The listing for the 100D claims the vehicle has a range of 381 miles or 613 kilometers. The motor output is reported as 90 kilowatts (121 horsepower), which is the maximum output the Tesla motors can sustain without overheating.

Submission + - How do you prepare for and deal with a lost/stolen/destroyed Smartphone? 3

Qbertino writes: A lot of our everyday lives today hinges on having our smartphone and our apps/services/data that are on it working and available.

What are you tactics/standard procedures/techniques/best pratices for preparing for a lost/stolen/destroyed Android Phone and/or iPhone? And have you needed to actually use them?

I'm talking concrete solutions for the worst case scenario: Apps, backup routines (like automating Google Takeaway downloads or something) tracking and disabling routines and methods and perhaps services. If you're using some vendor specific solution that came with your phone and have had positive experience with it, feel free to advocate.

Please include the obvious with some description that you use such as perhaps a solution already build into Android/iOS and also describe any experience you had with these solutions in some unpleasant scenario you might have had yourself. Also perhaps the procedures and pitfalls for recovering previous state to a replacement device.

Please note: I'm talking both Android and iOS.
And thanks for your input — I can imagine that I'm not the only one interested in this.

Submission + - Ask Slashdot: What Is Your Most Awesome Hardware Hacked?

An anonymous reader writes: Another Slashdotter once asked what kind of things someone can power with an external USB battery. I have a followup along these lines: what kind of modifications have you made to your gadgets to do things that they were never meant to do? Consider old routers, cell phones, monitors, etc. that have absolutely no use or value anymore in their intended form. What can you do with them? Have you ever done something stupid and damaged your electronics?

Comment Re: Dumb (Score 1) 145

IT is a cost center which yields 0 return on investment compared to planes

The proper response to someone who says that is, "How efficiently to you think you can schedule flights, book passengers for them, process them onto a plane, and keep track of all of the above if the IT infrastructure were to all disappear?"

Comment Re:I don't think anything much is gonna change (Score 1) 213

The paradigm you describe will come to pass, and then pass away.

Sadly, you're probably right. That doesn't mean it won't be painful for those that live through it. Being a peasant in Medieval Europe, a slave in early american south, or a serf in Stalinist Russia was not a "good time".

The scary questions for me are, how long is this phase going to last, and what's going to be left when it comes to an end?

Comment Re:Utopia .NE. a good place to live (Score 1) 213

people will seek the consultation of AI that can process market data at a level far beyond what any human group can

I would expect there to be multiple AIs to be involved here, and they would ultimately be fighting for control of the markets, as people do now. If there is only 1 AI, I don't see how it could reconcile conflicting requests from multiple people/groups. Well, actually I can see how that would happen, the golden rule would be applied: Those who have the gold make the rules.

leading to the eventual complete governance of humans by AI.

So, eventually some version of The Matrix. Either the monied class controls the AI, which then controls the masses (assuming the proles still exist) and fools them into thinking it's in their best interests; or, the AI takes full control, and decides that the whiny meat bags are more trouble then they are worth, and finds a final solution.

I can see how an AI might somehow be developed to lead the mass of humanity, but I don't have any faith that it would happen that way. Even if such a thing was claimed, would we be able to verify the correctness of such a claim?

Submission + - American Bar Association votes to DRM the law, put it behind a EULA (boingboing.net)

schwit1 writes: Rogue archivist Carl Malamud writes, "I just got back from the big debate on is free law like free beer that has been brewing for months at the American Bar Association over the question of who gets to read public safety codes and on what terms."

In my remarks I made the point that this resolution was perhaps well-intentioned, but bought into a really dangerous idea that somehow DRM-based access to the law from an exclusive private provider is "good enough." I was actually joined by the standards establishment in arguing strenuously that "read only access" simply doesn't exist and DRM is futile. A law is either public or it isn't. (And if a law isn't public, it isn't a law!)


Submission + - There's A Way To Use Encrypted Data Without Knowing What It Holds (helpnetsecurity.com)

An anonymous reader writes: Microsoft researchers have devised a way for third parties to make use the vast amount of encrypted data stored in the cloud by companies and individuals, without them actually having access to it or learning anything about it (except for what can be deduced from the result). The solution involves a protocol for a Secure Data Exchange (SDE) that uses Secure Multi-Party Computation (MPC), and which removes the need of the third party decrypting (and, therefore, being able to peek into) the data before it is used in computations.

Submission + - Widespread Linux Flaw Allows TCP Session Hijacking, Data Injection

Trailrunner7 writes: The TCP implementation in all Linux systems built since 2012 has a serious flaw that can allow an attacker to terminate or inject data into a session between any two vulnerable machines on the Internet. The bug could also be used to end encrypted connections or downgrade the privacy of connections run through Tor or other anonymity networks.

The vulnerability was introduced in Linux 3.6 and an attacker does not need to be in a man-in-the-middle position in order to exploit it. The researchers at the University of California Riverside who discovered the flaw say that it results from an attackers ability to infer the TCP sequence numbers for the packets flowing between two hosts.

Submission + - DOTA 2 Forums Hacked: Salted MD5 (zdnet.com)

cloud.pt writes: In another case of serious programmer impairment, the DOTA 2 official forums have been hacked, making available to the perpetrators around 2 million emails, usernames, and MD5 hashed passwords. You read that right — MD5. In a forum bound to a game released in 2013. For those unaware of how negligent this is,: one-way MD5 hashing has been deemed insecure (i.e. not-so-one-way) for almost a decade, with collision attack strategies reported as early as 2007 using off-the-shelf hardware at the time. That's as far back as the advent of the financial crisis, or a lifetime from an computer cryptography point of view (even for pre-Snowden standards).

Now to be fair, the hashing did use salting algorithms, but this should be seen as a moot point, since it should be common knowledge for any company that if you get something as important as a database or public-facing APIs hacked, your server-side source code is very likely under flawed protection by association. Some organizations just beg to be hacked with practices like these.

If you think you might have a compromised account, you are urged to change your identical or similar credentials in that and other services. Just make sure you don't use similar ones this time!

Originally reported by LeakedSource.com (paywalled) and made available by ZDNet.

Submission + - Clinton emails show relationship between State Dept and Clinton Foundation

drunken_boxer777 writes: CNN has a piece on newly released emails obtained via a FOIA request by Judicial Watch. These emails purport to show how cozy the State Department and the Clinton Foundation became during her tenure:

"No wonder Hillary Clinton and Huma Abedin hid emails from the American people, the courts and Congress," he said in a press release. "They show the Clinton Foundation, Clinton donors, and operatives worked with Hillary Clinton in potential violation of the law." Clinton's campaign said the emails didn't relate to her work at the State Department.

Definitely falls into the "Stuff that Matters" category, as the US Presidential race clearly interests a majority of Slashdot readers.

Submission + - Facebook Will Force Advertising on Ad-Blocking Users (wsj.com) 1

geek writes: Facebook is going to start forcing ads to appear for all users of its desktop website, even if they use ad-blocking software.

The social network said on Tuesday that it will change the way advertising is loaded into its desktop website to make its ad units considerably more difficult for ad blockers to detect.

“Facebook is ad-supported. Ads are a part of the Facebook experience; they’re not a tack on,” said Andrew “Boz” Bosworth, Facebook’s vice president of engineering for advertising and pages.

Slashdot Top Deals

A penny saved is a penny to squander. -- Ambrose Bierce

Working...