Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:New approach needed (Score 1) 335

Just to keep expanding on this model: - batteries would be certified by some authority and batteries could meter their use. This would prevent arguments about getting a bad battery for the service station. Certification would be via controlled pass/fail test equipment on site. service stations would handle the recycling of expired batteries. since you are exchanging batteries, the cost of new batteries can be amortized over the life of the battery. The hardest parts would be 1) to get car companies to standardize on a small set of battery types. and 2) design a battery compartment that could be both easily accessed for swapping, and securely locked at other times.

Comment New approach needed (Score 1) 335

Why are we not looking at making a standard for a swappable battery? You could then pull into the equivalent of the gas station and swap your near dead battery for a freshly charged one. This fixes 2 problems. 1. range anxiety, I don't want to get stuck waiting 2-4 hours for a charge while I am doing some errands on my way home from work. with a battery swap this would only take 5 minutes 2. sticker shock in a few years when the batteries need replaced and their cost are not being subsidized by the government. Since I would be swapping batteries, battery replacement would be part of the "gas station's" business model.
Botnet

Submission + - ATTACKS BY "ANONYMOUS" WIKILEAKS PROPONENTS NOT AN (utwente.nl) 2

Giovane Moura writes: "For a number of days the websites of MasterCard, Visa, PayPal and others are attacked by a group of WikiLeaks supporters (hacktivist). Although the group calls itself "Anonymous", researchers at the DACS group of the University of Twente (UT), the Netherlands, discovered that these hacktivists are easy traceable, and therefore anything but anonymous. The LOIC (Low Orbit Ion Cannon) software, which is used by the hacktivists, was analyzed by UT researchers, who concluded that the attacks generated by this tool are relatively simple and unveil the identity of the attacker. If hacktivists use this tool directly from their own machines, instead of via anonymization networks such as Tor, the Internet address of the attacker is included in every Internet message being transmitted. In the tools no sophisticated techniques are used, such as IP-spoofing, in which the source address of others is used, or reflected attacks, in which attacks go via third party systems. The current attack technique can therefore be compared to overwhelming someone with letters, but putting your address at the back of the envelop. In addition, hacktivists may not be aware that international data retention laws require that commercial Internet providers store data regarding Internet usage for at least 6 months. This means that hacktivists can still be traced easily after the attacks are over.

A full report can be found at: http://www.simpleweb.org/reports/loic-report.pdf"

Slashdot Top Deals

Happiness is a hard disk.

Working...