Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Tesla Preps Bigger 100 kWh Battery For Tesla Model S and Model X (theverge.com)

An anonymous reader writes: Tesla will soon offer a 100 kWh battery for the Model S and Model X that will allow for increased range — perhaps as much as 380 miles for the Model S. Currently, the 90 kWh batteries are the company's largest capacity. Kenteken.TV is reporting that the Dutch regulator that certifies Tesla's vehicles for use in the European Union, RDW, has recently published a number of new Tesla variants. RDW's public database now includes entries for a Tesla "100D" and "100X," which are titles that follow Tesla's current naming system based on battery capacity. The listing for the 100D claims the vehicle has a range of 381 miles or 613 kilometers. The motor output is reported as 90 kilowatts (121 horsepower), which is the maximum output the Tesla motors can sustain without overheating.

Submission + - How do you prepare for and deal with a lost/stolen/destroyed Smartphone? 3

Qbertino writes: A lot of our everyday lives today hinges on having our smartphone and our apps/services/data that are on it working and available.

What are you tactics/standard procedures/techniques/best pratices for preparing for a lost/stolen/destroyed Android Phone and/or iPhone? And have you needed to actually use them?

I'm talking concrete solutions for the worst case scenario: Apps, backup routines (like automating Google Takeaway downloads or something) tracking and disabling routines and methods and perhaps services. If you're using some vendor specific solution that came with your phone and have had positive experience with it, feel free to advocate.

Please include the obvious with some description that you use such as perhaps a solution already build into Android/iOS and also describe any experience you had with these solutions in some unpleasant scenario you might have had yourself. Also perhaps the procedures and pitfalls for recovering previous state to a replacement device.

Please note: I'm talking both Android and iOS.
And thanks for your input — I can imagine that I'm not the only one interested in this.

Submission + - Ask Slashdot: What Is Your Most Awesome Hardware Hacked?

An anonymous reader writes: Another Slashdotter once asked what kind of things someone can power with an external USB battery. I have a followup along these lines: what kind of modifications have you made to your gadgets to do things that they were never meant to do? Consider old routers, cell phones, monitors, etc. that have absolutely no use or value anymore in their intended form. What can you do with them? Have you ever done something stupid and damaged your electronics?

Comment Re: Dumb (Score 1) 145

IT is a cost center which yields 0 return on investment compared to planes

The proper response to someone who says that is, "How efficiently to you think you can schedule flights, book passengers for them, process them onto a plane, and keep track of all of the above if the IT infrastructure were to all disappear?"

Comment Re:I don't think anything much is gonna change (Score 1) 213

The paradigm you describe will come to pass, and then pass away.

Sadly, you're probably right. That doesn't mean it won't be painful for those that live through it. Being a peasant in Medieval Europe, a slave in early american south, or a serf in Stalinist Russia was not a "good time".

The scary questions for me are, how long is this phase going to last, and what's going to be left when it comes to an end?

Comment Re:Utopia .NE. a good place to live (Score 1) 213

people will seek the consultation of AI that can process market data at a level far beyond what any human group can

I would expect there to be multiple AIs to be involved here, and they would ultimately be fighting for control of the markets, as people do now. If there is only 1 AI, I don't see how it could reconcile conflicting requests from multiple people/groups. Well, actually I can see how that would happen, the golden rule would be applied: Those who have the gold make the rules.

leading to the eventual complete governance of humans by AI.

So, eventually some version of The Matrix. Either the monied class controls the AI, which then controls the masses (assuming the proles still exist) and fools them into thinking it's in their best interests; or, the AI takes full control, and decides that the whiny meat bags are more trouble then they are worth, and finds a final solution.

I can see how an AI might somehow be developed to lead the mass of humanity, but I don't have any faith that it would happen that way. Even if such a thing was claimed, would we be able to verify the correctness of such a claim?

Submission + - American Bar Association votes to DRM the law, put it behind a EULA (boingboing.net)

schwit1 writes: Rogue archivist Carl Malamud writes, "I just got back from the big debate on is free law like free beer that has been brewing for months at the American Bar Association over the question of who gets to read public safety codes and on what terms."

In my remarks I made the point that this resolution was perhaps well-intentioned, but bought into a really dangerous idea that somehow DRM-based access to the law from an exclusive private provider is "good enough." I was actually joined by the standards establishment in arguing strenuously that "read only access" simply doesn't exist and DRM is futile. A law is either public or it isn't. (And if a law isn't public, it isn't a law!)


Submission + - There's A Way To Use Encrypted Data Without Knowing What It Holds (helpnetsecurity.com)

An anonymous reader writes: Microsoft researchers have devised a way for third parties to make use the vast amount of encrypted data stored in the cloud by companies and individuals, without them actually having access to it or learning anything about it (except for what can be deduced from the result). The solution involves a protocol for a Secure Data Exchange (SDE) that uses Secure Multi-Party Computation (MPC), and which removes the need of the third party decrypting (and, therefore, being able to peek into) the data before it is used in computations.

Submission + - Widespread Linux Flaw Allows TCP Session Hijacking, Data Injection

Trailrunner7 writes: The TCP implementation in all Linux systems built since 2012 has a serious flaw that can allow an attacker to terminate or inject data into a session between any two vulnerable machines on the Internet. The bug could also be used to end encrypted connections or downgrade the privacy of connections run through Tor or other anonymity networks.

The vulnerability was introduced in Linux 3.6 and an attacker does not need to be in a man-in-the-middle position in order to exploit it. The researchers at the University of California Riverside who discovered the flaw say that it results from an attackers ability to infer the TCP sequence numbers for the packets flowing between two hosts.

Slashdot Top Deals

Mathematicians stand on each other's shoulders. -- Gauss

Working...