Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment This is all about warranty.. (Score 1) 143

The way I figure it, VW did their longevity and warranty cost calculations, set the horsepower and price, and then someone came back from R&D to say "We've got a couple extra settings you can tweak! You get extra horsepower and it's only a little more expensive in warranty costs!"

So they sell it as an add-on. Sure, the change is only software, but it's not too much different than they were already doing with things like APR tunes. Get your stage 2 kit installed by an independent or DIY? No warranty. Have the dealer do it? Full warranty, minus the performance parts themselves. Some dealers, if you bought the kit from them, would even self-warranty the bits excluded.

Granted, the whole "Sell the car and it goes away" thing is naff and needs to be changed, but.

Comment This isn't new! (Score 3, Interesting) 23

This isn't new, or even weird.

Almost thirty years ago I worked for a leasing company. We leased computers and equipment, not buildings, but the two things went hand in hand. Our customers would say they had a new office going in, we'd line them up for all the gear they needed.

And guess what? We'd have the vendors in there months before the place was even complete so they could install the phone system, or pre-stage cubicles, or get the switches installed.

Comment Re:Nice to see them finally breaking (Score 1) 75

Part of the reason things have been crap lately is that the studios have been running smaller and smaller writer's rooms. Why hire eight writers when you can hire four, work the hell out of them, and then lay them off before production so they can't do any rewrites?

They're pushing quantity over quality.

Security

Is Your Chip Card Secure? Much Depends on Where You Bank (krebsonsecurity.com) 38

A recent series of malware attacks on U.S.-based merchants suggest thieves are exploiting weaknesses in how certain financial institutions have implemented the technology in chip-based credit and debit cards to sidestep key security features and effectively create usable, counterfeit cards. Brian Krebs reports via Krebs on Security: Traditional payment cards encode cardholder account data in plain text on a magnetic stripe, which can be read and recorded by skimming devices or malicious software surreptitiously installed in payment terminals. That data can then be encoded onto anything else with a magnetic stripe and used to place fraudulent transactions. Newer, chip-based cards employ a technology known as EMV that encrypts the account data stored in the chip. The technology causes a unique encryption key -- referred to as a token or "cryptogram" -- to be generated each time the chip card interacts with a chip-capable payment terminal.

Virtually all chip-based cards still have much of the same data that's stored in the chip encoded on a magnetic stripe on the back of the card. This is largely for reasons of backward compatibility since many merchants -- particularly those in the United States -- still have not fully implemented chip card readers. This dual functionality also allows cardholders to swipe the stripe if for some reason the card's chip or a merchant's EMV-enabled terminal has malfunctioned. But there are important differences between the cardholder data stored on EMV chips versus magnetic stripes. One of those is a component in the chip known as an integrated circuit card verification value or "iCVV" for short -- also known as a "dynamic CVV." The iCVV differs from the card verification value (CVV) stored on the physical magnetic stripe, and protects against the copying of magnetic-stripe data from the chip and the use of that data to create counterfeit magnetic stripe cards. Both the iCVV and CVV values are unrelated to the three-digit security code that is visibly printed on the back of a card, which is used mainly for e-commerce transactions or for card verification over the phone. The appeal of the EMV approach is that even if a skimmer or malware manages to intercept the transaction information when a chip card is dipped, the data is only valid for that one transaction and should not allow thieves to conduct fraudulent payments with it going forward.

However, for EMV's security protections to work, the back-end systems deployed by card-issuing financial institutions are supposed to check that when a chip card is dipped into a chip reader, only the iCVV is presented; and conversely, that only the CVV is presented when the card is swiped. If somehow these do not align for a given transaction type, the financial institution is supposed to decline the transaction. More recently, researchers at Cyber R&D Labs published a paper detailing how they tested 11 chip card implementations from 10 different banks in Europe and the U.S. The researchers found they could harvest data from four of them and create cloned magnetic stripe cards that were successfully used to place transactions. There are now strong indications the same method detailed by Cyber R&D Labs is being used by point-of-sale (POS) malware to capture EMV transaction data that can then be resold and used to fabricate magnetic stripe copies of chip-based cards.

Comment Timothy Dexter. (Score 4, Funny) 38

> the interplanetary equivalent of sending coals to Newcastle

Famously, one man did this, Timothy Dexter. He was the world's worst businessman, but luck was with him every time.

Buy a buttload of worthless currency issued by a country destined to lose a war to the British? He was the one laughing when the British lost and the newly formed US government paid out. Ship bed-warmers to the West Indies? Well, turns out they make great ladles for molasses manufacture.

Same with the woolen mittens he sent there; His ship got there at the same time traders were leaving for what's now Siberia.

On to the coal. Someone suggested, as a joke or as an insult, that Dexter could make money shipping coal to Newcastle.

So he did.

His ship hit the harbor at Newcastle the same week the coal-miners went on strike and he was the only game in town.

Comment Re:Accuracy? (Score 1) 22

Correct me if I'm wrong here, but hasn't testing shown that most of these facial recognition systems have abysmal error rates?

You're wrong here. Testing has shown that people who don't understand what the technology does can abuse it to prove any failure rate and reason that they want. For example, give it a database of criminal mugshots, set the match criterion very loose, and then be aghast that comparing images of a legislative body results in a large number of hits. Or start with a database of ethnically homogeneous images, set the match criteria tight, and then be aghast that comparing a set of images of different ethnicity doesn't result in any matches.

Comment Re:Screw Comcast/Xfinity (Score 1) 79

When I say 'web traffic' I really mean 'the Internet as a whole',

If you're not going to speak English, and don't understand what you are saying in whatever language you are speaking, please refrain from suggesting technical ideas.

and DNS lookups are part of all web traffic

No, they actually aren't, unless you have something doing DNS via HTTPS, and then you've got HTTPS encrypting it all already. 'DNS' is not "the web". "The internet" and "the web" are not synonyms.

Don't be so literal.

Don't be so ignorant.

Comment Re:The reason for the high bills (Score 1) 64

Nope. Vendor "Lock-in" would mean you CANNOT move to another provider,

There is never a never. Vendor lock-in means it is very expensive to change, not that it is impossible. If you buy a Motorola radio system, for example, you are locked in to Motorola -- until you spend the money to replace it.

If you put all your data into the AWS bucket, you are locked into AWS -- until you spend the money to get it all back out of AWS.

I was asked to investigate the costs of moving our data into AWS. The storage was really cheap. The open-ended costs were accessing the data outside of AWS, and that killed the project.

Comment Re:It's not the reverse (Score 1) 42

is not the negative version of "Greg said his car was blue". It actually has a lot of different meanings:

It's actually stupider than that. The alleged positive version was "greg says his car is blue." Note that this changes the verb (said/says) from past tense to future (currently says and continues to say), AND the car from "was blue" to "is blue".

Slashdot Top Deals

"It's what you learn after you know it all that counts." -- John Wooden

Working...