Denmark Faces a Tricky Transition To 100 Percent Renewable Energy
A good AC can easily move 3-5 watts of heat for each watt of energy it requires to operate. No such luck with heating systems, they at best get you 1 watt of heat for each watt they take.
You really need to qualify that statement. You get 1 watt of heat for each watt you use... for resistive heating. Many places that need both cooling and heating don't run an A/C and an electric heater, they run a heat pump, which pumps heat either into or out of the house. Because of the heat differential, one direction may be more efficient than the other, but it is still much better than a resistive heating element
In one minute of research, comparing a 2.5 ton 13 SEER A/C to an equivalent heat pump, the ability to both heat and cool adds a little less than %20 to the price at Home Depot. Installation costs are likely identical, as they both consist of the same components. With that cost differential, an A/C + resistive heat solution is only smart for a place that only needs heat a few nights per year.
Power and Free Broadband To the People
That's what I was thinking. Comcast would no doubt complain about what a burden it is, but would ultimately agree because their lawyers found a loophole. They would then roll out a free public service that technically complies with their requirements, but is useless in actual application.
Been there before; got the t-shirt.
Researchers Make Fruit Flies Perform Aerobatics Like Spitfire Pilots
I'm with you. Show me video, or it didn't happen!
Alienware Swaps SteamOS For Windows
... when configured to boot straight into Steam Big Picture mode, the influence of the underlying OS is visible only in the larger game library.
... and the considerable additional maintenance requirements that go along with a full fledged operating system. Considering that Windows has required more frequent patches for security issues than Linux for the past few years, that's not a trivial distinction.
With Windows on it, this little machine can fulfill most of my needs for the living room / home and offers me a platform that i am already familiar with to play my games, (Steam supported or not), get some work done (Office etc) and watch movies.
While this is a valid point, it is a realization of this change in paradigm. With Windows 8.1, it is a regular desktop computer, not a gaming console. While that gives you the ability to do office work and more, it takes it out of the single-purpose, dedicated function, "appliance" category that consoles usually fall in.
With Linux running as essentially an embedded OS, it's likely that updates would be less frequent, smaller, and less crucial to it's overall suitability if skipped. As an example, how long has it been since you've updated your smart TV or DVR as opposed to your desktop or laptop?
Ask Slashdot: User-Friendly Firewall For a Brand-New Linux User?
Ok, seems like you're trying to do things the windows way, i.e. blocking outbound connections based which application is running. Things are not done that way on Linux. Outbound connections are open and most of us are fine with it.
The Window Firewall, the original BlackIce for Windows, and AVG as well, I believe, all fall in the category of Application Firewalls, as they base their actions with knowledge of the application holding the IP connection endpoint. IPtables is a Stateful Firewall, so named because it relies solely on the connection's state, without regard to the application at the sending or receiving end of the connection.
The Application Firewall link above actually does have some suggestions about how such things can be handled on Linux using utilities others have described. Mandatory Access Control tools such as SELinux and grsecurity can allow or deny access to resources (such as the network interface) to applications, but I don't believe they have fine-grained controls for conditional access based on IPs or ports.
None of these are as easy to use as AVG for Windows is.. (This could be the new definition of "understatement!") In fact, I would like to think I know Linux quite well, have used it as a desktop and server platform for years, have written patches for kernel modules, and can configure a solid IPtables firewall ruleset from scratch, but AppArmor and SELinux still scare me...
There's a link here describing how to mark packets based on an application's uid (user). This might be a basis for controlling permissions per app, but you're talking about a very complex IPtables ruleset. Definitely not for someone only two days into their Linux journey.
Cameras On Cops: Coming To a Town Near You
Any missing footage should result in someone being fired.
There is one plus side to ubiquitous cameras operated by the police: It will be harder for the police to justify denying us the ability to record our interactions with them. Some police departments haven't gotten the memo yet...
Ask Slashdot: What Software Can You Not Live Without?
Feedback: VLC is my first install regardless of OS. Damn thing just runs anything I throw at it. Used it for years now.
I hope you're not running on Dell hardware...
Interview: Ask Richard Stallman What You Will
Why not perhaps a more majestic creature?
Similar facial hair...
Adobe's New Ebook DRM Will Leave Existing Users Out In the Cold Come July
This was my thought on reading the article as well. "Adobe is doing more to kill DRM with this move than anything they've done in the past." There's nothing like punishing the innocent to get people's attention.
Ask Slashdot: Configuring Development Environment On a Shared Workstation?
Or what about renting a server? For the RAM requirements you're going to need, you'll likely need more than the entry level offering, but the capital expenses are lower than having to buy a new computer...
Google, Apple, Facebook, Twitter, Microsoft, Yahoo Form Alliance Against NSA
Now contrast this statement from the recent "STFU" response to AT&T's shareholders. And the complete silence from Verizon, whose name was on the first round of the salvo.
At least these eight are making noise, rather than just hoping the issue fades from the public's consciousness. Here's wishing there was a telecom provider that wasn't so obviously in bed with the spooks...
WRT trans fats, the FDA should ...
It's not clear from the context whether you're calling the parent an idiot, or if that's how you normally sign your comments.
Many researchers have concluded that overuse of antibiotics is linked to the increase of MRSA. (citation)
Feds Confiscate Investigative Reporter's Confidential Files During Raid
So are you saying that if the files had been encrypted, they wouldn't have been confiscated, all of this would not have happened?
What else precautions one should make not to become the victim of one's own government? Is leaving home allowed? Is there a list of approved websites to visit?
You are making the case that the government is a bullying criminal. And while you can and perhaps should avoid getting the attention of a hooligan/bully/criminal, the government is at least in principle there for you. And in my mind this makes the situation completely different. One shouldn't bow to bullies, but having a bullying government is worse.
And yes, of course the files should have been encrypted. I wonder if they would have detained her in that case.
If the files had been encrypted (after transcription, if needed), then this would be a case about overreaching warrants and illegal government actions, not a case about overreaching warrants, illegal government actions, and wrongful terminations, as that last item will undoubtedly be the end result of the intelligence DHS has collected on the whistle-blowers.
You are right in that she shouldn't have to protect herself and her informants from the government, but such is the imperfect world we find ourselves in while we try to dig our way out of it. She failed her informants. She should have known better than to depend on legal principle to protect her informants from the current administration.
VirtualBox 4.3 Comes With New Multi-Touch Support, Virtual Cam and More
Do they still require a paid license to forward a USB device to the guest?
That killed it for me when they added that "feature" a few years ago now... I think it was the first major release after Oracle took over.
Ask Slashdot: Prioritizing Saleable Used Computer Books?
Hah! That's Rich(ie)...
A bit AWK-ward, though.
The Windows Flaw That Cracks Amazon Web Services
I did say his research skills could use some polish. And I figure one more developer that is at least semi-aware of security is a good thing. Many don't even consider the security implications of what they write.
Yes, I did enjoy it. So you didn't. To each his own.
p.s. Vitriol is no way to go through life, son.
The Windows Flaw That Cracks Amazon Web Services
Good job, Jeff! Welcome to the exciting world of security research!
I applaud you for (re)discovering these techniques on your own. Your out-of-box thinking and problem solving are to be commended, but your research skills could use some polish. Please don't let the negative comments above discourage you from exploring this rewarding field of knowledge, however I would recommend you run your findings by some existing security folks before announcing your next big discovery, lest you find you're just rehashing something else that has long been known.
Seriously; good job! I enjoyed reading how you worked your way up to your conclusions, even though I knew from the start how it would end...
Linus Responds To RdRand Petition With Scorn
I should add that your sentiment of "we know better than you so you should trust us" is exactly what the government is spewing, and you see how well that's working.
While the kernel source is the epitome of transparency, and the NSA is the exact opposite, there will always be people who cannot or will not read the source. That does not mean they don't want to know some of the details so they can make informed decisions. That curiosity should be welcomed, not derided.
Linus Responds To RdRand Petition With Scorn
While I respect your technical prowess and make great use of your work, every time you go off like this, you move a little further down the "crackpot" scale. You know, the one anchored firmly by RMS...
Instead of blowing a gasket, why not nicely suggest that a read of the source code will show that rdrand is just one of the entropy sources used, and it is used in such a way that it cannot compromise the end result. Vitriol is no way to go through life, son.
Ask Slashdot: Speeding Up Personal Anti-Spam Filters?
...Most of your time is likely spent parsing the patterns.
I second that. And as your rules have built up, there are likely some that have never been used beyond when they were first put in. I'd instrument your next solution to identify outliers and cull them over time so your parser doesn't have to work so hard.
PetiePooo hasn't submitted any stories.
PetiePooo has no journal entries.