各位朋友大家好,欢迎您进入solidot新版网站,在使用过程中有任何问题或建议,请与很忙的管理员联系。

信息流

  • SIP-Pi: SIP Answering Machine on Raspberry Pi

    发表评论 查看更多 翻译此文

    收起

  •  

    How I got my attention back

    01-23 Hacker News 7

    How I got my attention back

    发表评论 查看更多 翻译此文

    收起

  • "Any student progress from 9:19 to 10:33 a.m. on Friday was not saved..." explained the embarrassed CTO of the educational non-profit Code.org, "and unfortunately cannot be recovered." Slashdot reader theodp writes: Code.org CTO Jeremy Stone gave the kids an impromptu lesson on the powers of two with his explanation of why The Cloud ate their homework. "The way we store student coding activity is in a table that until today had a 32-bit index... The database table could only store 4 billion rows of coding activity information [and] we didn't realize we were running up to the limit, and the table got full. We have now made a new student activity table that is storing progress by students. With the new table, we are switching to a 64-bit index which will hold up to 18 quintillion rows of information. The issue also took the site offline, temporarily making the work of 16 million K-12 students who have used the nonprofit's Code Studio disappear. "On the plus side, this new table will be

    发表评论 查看更多 翻译此文

    收起

  • How to Become a Data Scientist – On Your Own

    发表评论 查看更多 翻译此文

    收起

  • All United Airlines flights grounded due to a computer outage

    发表评论 查看更多 翻译此文

    收起

  • ASUS Launches Raspberry Pi-Esque 'Tinker Board' with 4K Support

    发表评论 查看更多 翻译此文

    收起

  • Why does San Francisco now have fewer children per capita than any of America's largest 100 cities? An anonymous reader writes: A move to the suburbs began in the 1970s, but "The tech boom now reinforces the notion that San Francisco is a place for the young, single and rich," according to the New York Times. "When we imagine having kids, we think of somewhere else," one software engineer tells the paper. The article describes "neighborhoods where employees of Google, Twitter and so many other technology companies live or work" where the sidewalks make it seem "as if life started at 22 and ended somewhere around 40." Or is San Francisco just part of a larger trend? "California, which has one of the world's 10 largest economies, recently released data showing the lowest birthrate since the Great Depression. And the Los Angeles Times argues California's experience may just be following national trends. The drop "likely stems from the recession, a drop in teenage pregnancies and an inc

    发表评论 查看更多 翻译此文

    收起

  • Being confidently programming language agnostic

    发表评论 查看更多 翻译此文

    收起

  •  

    Kernel prepatch 4.10-rc5

    01-23 LWN 7

    Linus has released the 4.10-rc5 kernel prepatch for testing, noting that "everything looks nominal". He also changed the codename from the short-lived "Roaring Lionus" to "Anniversary Edition".

    发表评论 查看更多 翻译此文

    收起

  • While common magnetic tape uses very thin, plastic-coated iron oxide, "talking rubber" uses rubber impregnated with iron oxide. Iron oxide (a form of rust) is ferromagnetic, which means in the presence of a magnetic field, the electrons in the iron oxide magnetically line up and stay that way even after the magnetic field is turned off. This allows cassette tapes to create a “track” of magnetically aligned iron oxide when the electromagnet in a cassette recorder creates a magnetic field. But with magnetic rubber, the iron oxide is actually mixed into the rubber material; the whole band becomes ferromagnetic, instead of just the coating. According to that Bell System Journal article, this “talking rubber” could be around 1/16 or 1/8 of an inch think, whereas magnetic tape was (even in the '50s) already much thinner at 1/1000 of an inch thick. More obscure audio formats!

    发表评论 查看更多 翻译此文

    收起

  • Slashdot reader Krystalo shared this VentureBeat article: Fresh off its brand redesign, Mozilla has released The Internet Health Report, an open-source initiative to document the state of the internet, combining research and reporting from multiple sources... Mozilla's goal is to start a constructive discussion about the health of the internet by exploring what is currently healthy and unhealthy, as well as what lies ahead... One notable statistic is the number of people who can't get online in the first place. The report shows that 57.8% of the world's population cannot afford broadband internet, and 39.5% cannot afford an internet connection on their mobile device. Other findings include the fact that there were 51 intentional internet shutdowns across 18 countries in the first 10 months of 2016; almost one-third of the world's population has no data protection rights; and 52% of all websites are in English, even though only 25% of the global population understands the language. They

    发表评论 查看更多 翻译此文

    收起

  • Company betting on its "Block 5" version of the Falcon 9 for easy reusability.

    发表评论 查看更多 翻译此文

    收起

  • New Wyoming bill forbids utilities from using renewables

    发表评论 查看更多 翻译此文

    收起

  •  

    Predicting Medical AI in 2017

    01-23 Hacker News 9

    Predicting Medical AI in 2017

    发表评论 查看更多 翻译此文

    收起

  •  

    Removing Edge Magazine DRM

    01-23 Hacker News 6

    Removing Edge Magazine DRM

    发表评论 查看更多 翻译此文

    收起

  • Short intro to C++ for Rust developers: Ownership and Borrowing

    发表评论 查看更多 翻译此文

    收起

  • "With all of the drama at CyanogenMod, Android Authority takes a look at the current state of custom ROM development," writes Slashdot reader Thelasko. From the article: The future of CyanogenMod appears uncertain, after the open source ROM was forced to fork under the name Lineage OS. Fortunately there are already other remixed versions of Android available, with some of the most popular being Paranoid Android, Resurrection Remix, and Dirty Unicorns... [But] with each new version of Android, the gap between Android and popular custom ROMs has shrunk, which begs an interesting question: Are custom ROMs even necessary anymore? To answer this, let's take a quick look at the state of custom ROM development as it exists today. The article points out that mobile virtual reality is "on the verge of becoming mainstream and the wearable market has grown tremendously," asking whether custom firmware will also integrate these newer technologies. But the original submission also asks a questi

    发表评论 查看更多 翻译此文

    收起

  • The US’s Stance on Surveillance Needs a Hard Reset

    发表评论 查看更多 翻译此文

    收起

  • Thursday the U.S. Army shared some surprising results from its first bug bounty program -- a three-week trial in which they invite 371 security researchers "trained in figuring out how to break into computer networks they're not supposed to." An anonymous reader quotes Threatpost: The Army said it received more than 400 bug reports, 118 of which were unique and actionable. Participants who found and reported unique bugs that were fixed were paid upwards of $100,000... The Army also shared high-level details on one issue that was uncovered through the bounty by a researcher who discovered that two vulnerabilities on the goarmy.com website could be chained together to access, without authentication, an internal Department of Defense website. "They got there through an open proxy, meaning the routing wasn't shut down the way it should have been, and the researcher, without even knowing it, was able to get to this internal network, because there was a vulnerability with the proxy, and w

    发表评论 查看更多 翻译此文

    收起

  • XNOR.ai frees AI from the prison of the supercomputer

    发表评论 查看更多 翻译此文

    收起

  • Show HN: I made a travel tool to discover destinations based on your budget

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader writes: Two weeks after cybercriminal groups started to hijack and hold for ransom MongoDB servers, similar attacks are now taking place against CouchDB, Hadoop, and ElasticSearch servers. According to the latest tallies, the number of hijacked MongoDB servers is 34,000 (out of 69,000 available on Shodan), 4,681 ElasticSearch clusters (out of 33,000), 126 Hadoop datastores (out of 5,400), and 452 CouchDB databases (out of 4,600). Furthermore, the group that has hijacked the most MongoDB and ElasticSearch servers is also selling the scripts it used for the attacks. Two security researchers are tracking the attacks on Google spreadsheets, and report that when a ransom is paid, many victims still report that their data is never restored. But the researchers also identified 124 Hadoop servers where the attacker simply replaced all the tables with a data entry named NODATA4U_SECUREYOURSHIT. "What's strange about these attacks is that the threat actor isn't asking for a

    发表评论 查看更多 翻译此文

    收起

  • Foxconn Weighs $7B U.S. Factory with Apple, Nikkei Says

    发表评论 查看更多 翻译此文

    收起

  • Free Software Foundation Priority Projects

    发表评论 查看更多 翻译此文

    收起

  • The linux.conf.au 2017 organizers have put up videos of the talks in near-record time. There's a lot of good stuff there, some of which will be written up for LWN in the near future.

    发表评论 查看更多 翻译此文

    收起

  • Chrome 56 will mark HTTP pages with password fields as non-secure

    发表评论 查看更多 翻译此文

    收起

  • Casetext (YC S13) is hiring a growth hacker

    发表评论 查看更多 翻译此文

    收起

  • The Z88 Development Team has released a new version of the system ROM for the Cambridge Z88 portable. It's the result of more than a years work, with many improvements and new features: ISO character set support in filenames and international dates, faster serial I/O, improved RAM applications, better responsiveness. Rock-stable software that enables to run your Z88 for many months with re-booting. The team also outlines its plans for the future: The next step for the coming years is to re-implement the Z88 on low-power FPGA, minimum 10 X faster CPU, 800x600 screen resolution, up to 1Gb of RAM, SD-card filing system, VGA/HDMI output, improved operating system with new Unix-like command line Shell, ELF for Z80 executables + shared libraries, and integrated Zip arching in filing system. Emulators and developer tools will also be freely available.

    发表评论 查看更多 翻译此文

    收起

  • Here's a bright idea from dryriver Why don't software makers look at the average income level in a given country -- per capita GDP for example -- and adjust their software prices in these countries accordingly? Most software makers in the U.S. and EU currently insist on charging the full U.S. or EU price in much poorer countries. "Rampant piracy" and "low sales" is often the result in these countries. Why not change this by charging lower software prices in less wealthy countries? This presupposes the continuing existence of closed-source software businesses -- but is there a way to make that pricing more fair? Leave your best suggestions in the comments. should commercial software prices be pegged to a country's GDP?

    发表评论 查看更多 翻译此文

    收起

  • A tiny new Robotic Retinal Dissection Device -- nicknamed "R2D2" -- can crawl into an incision in the eye and lift a membrane no more than a hundredth of a millimeter. "The cables that enable the robot to navigate are each 110 microns across, a little over the diameter of a human hair," reports the MIT Technology Review. The robot is controlled by a joystick (while providing a live camera feed to the ophthalmologist). In September an Oxford professor used it to perform the first operation inside the human eye, and since then five more patients have undergone robot-assisted operations at an Oxford hospital. In one procedure, a gene-therapy virus that stops retinal degeneration "was planted on the retina itself, a procedure only made possible by R2D2's unprecedented precision." Robotic surgery is already happening. The article points out that Da Vinci, an elephant-sized surgical robot that repairs heart valves, "has operated on more than three million patients around the world." But the

    发表评论 查看更多 翻译此文

    收起

  • GitLab 8.16 Released with auto deploy on GKE and Prometheus monitoring

    发表评论 查看更多 翻译此文

    收起

  • C++ creator Bjarne Stroustrup is arguing that we can improve code by grounding generic programming in concepts -- what's required by a template's arguments. An anonymous reader quotes Paul Krill's report on a new paper by Stroustrup: In concepts, Stroustrup sees the solution to the interface specification problem that has long dogged C++, the language he founded more than 35 years ago. "The way we write generic code today is simply too different from the way we write other code," Stroustrup says... Currently an ISO technical specification, concepts provide well-specified interfaces to templates without runtime overhead. Concepts, Stroustrup writes, are intended to complete C++'s support for generic programming as initially envisioned. "The purpose of concepts is to fundamentally simplify and improve design. This leads to fewer bugs and clearer -- often shorter -- code"... Concepts, Stroustrup believes, will greatly ease engineers' ability to write efficient, reliable C++ code... The

    发表评论 查看更多 翻译此文

    收起

  •  

    Turning CO2 to Stone

    01-23 Hacker News 8

    Turning CO2 to Stone

    发表评论 查看更多 翻译此文

    收起

  • Halfway through the "Brains vs. AI" poker competition, an AI named Libratus is trouncing its human opponents, who are four of the world's top professional players. One of the pros, Jimmy Chou, said he and his colleagues initially underestimated Libratus, but have come to regard it as one tough player. "The bot gets better and better every day," Chou said. "It's like a tougher version of us"... Chou said he and the other pros have shared notes and tips each day, looking for weaknesses they can each exploit. "The first couple of days, we had high hopes," Chou said. "But every time we find a weakness, it learns from us and the weakness disappears the next day." By Saturday, the AI had amassed a lead of $693,531 after 56,732 hands in the 120,000-hand match (which is being livestreamed by the Rivers Casino on Twitch). "I'm feeling good," said Tuomas Sandholm, the computer science professor at Carnegie Mellon who co-created the AI. "The algorithms are performing great. They're better at solv

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes Hot Hardware: Stu Gale, who just so happens to be a computer security expert, had the misfortune of having his laptop stolen from his car overnight. However, Gale did have remote software installed on the device which allowed him to track whenever it came online. So, he was quite delighted to see that a notification popped up on one of his other machines alerting him that his stolen laptop was active. Gale took the opportunity to remote into the laptop, only to find that the not-too-bright thief was using his laptop to login to her Facebook account. The thief eventually left her Facebook account open and left the room, after which Gale had the opportunity to snoop through her profile and obtain all of her private information. "I went through and got her phone numbers, friends list and pictures..." Given that Gale was able to see her phone numbers listed on Facebook, he sent text messages to all of those numbers saying that he was going to report her to the po

    发表评论 查看更多 翻译此文

    收起

  • Telecommunications company Avaya files for bankruptcy

    发表评论 查看更多 翻译此文

    收起

  •  

    You Can Change Your Personality

    01-22 Hacker News 43

    You Can Change Your Personality

    发表评论 查看更多 翻译此文

    收起

  • Why It Takes So Long to Connect to a WiFi Access Point?

    发表评论 查看更多 翻译此文

    收起

  • We Will Miss Antibiotics When They’re Gone

    发表评论 查看更多 翻译此文

    收起

  • United Arab Emirates goes from 10k Tor users to 250k in days

    发表评论 查看更多 翻译此文

    收起

  • The Awk Programming Language (1988) [pdf]

    发表评论 查看更多 翻译此文

    收起

  •  

    The Secret Agenda of a Facebook Quiz

    01-22 Hacker News 50

    The Secret Agenda of a Facebook Quiz

    发表评论 查看更多 翻译此文

    收起

  •  

    The SHA-1 End Times Have Arrived

    01-22 Slashdot 35

    "Deadlines imposed by browser makers deprecating support for the weakened SHA-1 hashing algorithm have arrived," writes Slashdot reader msm1267. "And while many websites and organizations have progressed in their migrations toward SHA-2 and other safer hashing algorithms, pain points and potential headaches still remain." Threatpost reports: Starting on Jan. 24, Mozilla's Firefox browser will be the first major browser to display a warning to its users who run into a site that doesn't support TLS certificates signed by the SHA-2 hashing algorithm... "SHA-1 deprecation in the context of the browser has been an unmitigated success. But it's just the tip of the SHA-2 migration iceberg. Most people are not seeing the whole problem," said Kevin Bocek, VP of security strategy and threat intelligence for Venafi. "SHA-1 isn't just a problem to solve by February, there are thousands more private certificates that will also need migrating"... Experts warn the move to SHA-2 comes with a wide r

    发表评论 查看更多 翻译此文

    收起

  •  

    OpenSSH Keys: A Walkthrough

    01-22 Hacker News 10

    OpenSSH Keys: A Walkthrough

    发表评论 查看更多 翻译此文

    收起

  •  

    US Announces Withdrawal from TPP

    01-22 Hacker News 43

    US Announces Withdrawal from TPP

    发表评论 查看更多 翻译此文

    收起

  • Anonymous E-mail Server Admin Interrogated at U.S. border and equipment seized

    发表评论 查看更多 翻译此文

    收起

  • HTML parsing in Elixir with leex and yecc

    发表评论 查看更多 翻译此文

    收起

  •  

    Whatever her persuasion

    01-22 Hacker News 15

    Whatever her persuasion

    发表评论 查看更多 翻译此文

    收起

  •  

    The History of Popularity

    01-22 Hacker News 16

    The History of Popularity

    发表评论 查看更多 翻译此文

    收起

  • Service Canary – Detect and alert on changes within your infrastructure

    发表评论 查看更多 翻译此文

    收起

  • Rowhammer-test – Test DRAM for bit flips caused by the rowhammer problem (2015)

    发表评论 查看更多 翻译此文

    收起

  • PunyForth: Forth inspired programming language for the ESP8266

    发表评论 查看更多 翻译此文

    收起

  • "An asteroid going boldly through the universe now carries a new name that honors actor Will Wheaton, who played Wesley Crusher on Star Trek: The Next Generation," reports CNET. An anonymous reader quotes their article. The announcement showed up on Twitter Wednesday from NASA's Ron Baalke, who describes himself as a "space explorer at the Jet Propulsion Laboratory". Wheaton is in good company with other Star Trek alumni. Asteroid 7307 Takei is named for Sulu actor George Takei and 68410 Nichols gets its name from Nichelle Nichols, who played Uhura. There's also asteroid 4659 Roddenberry for Star Trek creator Gene Roddenberry. "Today, I found out that I kind of get to be in space and live right here on Earth..." Wheaton wrote on his blog Wednesday, describing his life-long interest in space exploration. "As soon as it gets dark here, I'm going to walk out into my backyard, look up into the sky, just a little above Sirius, and know that, even though I can't see it with my naked eye,

    发表评论 查看更多 翻译此文

    收起

  • "New evidence involving the ancient poop of some of the huge and astonishing creatures that once roamed Australia indicates the primary cause of their extinction around 45,000 years ago was likely a result of humans, not climate change," reports Phys.org. schwit1 quotes their report on new analysis of a prehistoric sediment core from the Indian Ocean off the coast of Australia. The core contains chronological layers of material blown and washed into the ocean, including dust, pollen, ash and spores from a fungus called Sporormiella that thrived on the dung of plant-eating mammals, said CU Boulder Professor Gifford Miller, who participated in the study... Fungal spores from plant-eating mammal dung were abundant in the sediment core layers from 150,000 years ago to about 45,000 years ago, when they went into a nosedive, said Miller... "The abundance of these spores is good evidence for a lot of large mammals on the southwestern Australian landscape up until about 45,000 years ago," he

    发表评论 查看更多 翻译此文

    收起

  • Ask HN: What inspires you to persevere through adversity?

    发表评论 查看更多 翻译此文

    收起

  •  

    Ask HN: Is there a way to sell my MVP?

    01-22 Hacker News 16

    Ask HN: Is there a way to sell my MVP?

    发表评论 查看更多 翻译此文

    收起

  • The Amiga was a machine ahead of its time, but Commodore was in trouble.

    发表评论 查看更多 翻译此文

    收起

  • A New Era of Mass Surveillance is Emerging Across Europe

    发表评论 查看更多 翻译此文

    收起

  •  

    Capturing the Northern Lights

    01-22 Hacker News 10

    Capturing the Northern Lights

    发表评论 查看更多 翻译此文

    收起

  •  

    Technical Details of the Enigma Machine

    01-22 Hacker News 40

    Technical Details of the Enigma Machine

    发表评论 查看更多 翻译此文

    收起

  •  

    Investing Is More Luck Than Talent

    01-22 Hacker News 45

    Investing Is More Luck Than Talent

    发表评论 查看更多 翻译此文

    收起

  • Applying deep adversarial autoencoders for drug discovery in Cancer

    发表评论 查看更多 翻译此文

    收起

  • Nearley – parser toolkit for JavaScript

    发表评论 查看更多 翻译此文

    收起

  • "The real threat to global critical infrastructure is not enemy states or organizations but squirrels, according to one security expert." Long-time Slashdot reader randomErr quotes the BBC. Cris Thomas has been tracking power cuts caused by animals since 2013... His Cyber Squirrel 1 project was set up to counteract what he called the "ludicrousness of cyber-war claims by people at high levels in government and industry", he told the audience at the Shmoocon security conference in Washington. Squirrels topped the list with 879 "attacks", followed by birds with 434 attacks and then snakes at 83 attacks. Those three animals -- along with rats -- have caused 1,700 different power cuts affecting nearly 5,000,000 people .

    发表评论 查看更多 翻译此文

    收起

  • In 1962, 24-year-old Donald Knuth began writing The Art of Computer Programming -- and 55 years later, he's still working on it. An anonymous reader quotes Knuth's web site at Stanford: Volume 4B will begin with a special section called 'Mathematical Preliminaries Redux', which extends the 'Mathematical Preliminaries' of Section 1.2 in Volume 1 to things that I didn't know about in the 1960s. Most of this new material deals with probabilities and expectations of random events; there's also an introduction to the theory of martingales. You can have a sneak preview by looking at the current draft of pre-fascicle 5a (52 pages), last updated 18 January 2017. As usual, rewards will be given to whoever is first to find and report errors or to make valuable suggestions. I'm particularly interested in receiving feedback about the exercises (of which there are 125) and their answers (of which there are 125). Over the years Knuth gave out over $20,000 in rewards, though most people didn't cash

    发表评论 查看更多 翻译此文

    收起

  • Kim Dotcom’s Megaupload 2.0 Will Utilize Blockchain Technology – ETHNews.com

    发表评论 查看更多 翻译此文

    收起

  • Our three year saga to release 13M pages of CIA secrets

    发表评论 查看更多 翻译此文

    收起

  •  

    Improving TrueOS: OpenRC

    01-22 Hacker News 41

    Improving TrueOS: OpenRC

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes PCWorld: Over the past two years, Google has pressured developers to patch security issues in more than 275,000 Android apps hosted on its official app store. In many cases this was done under the threat of blocking future updates to the insecure apps... In the early days of the App Security Improvement program, developers only received notifications, but were under no pressure to do anything. That changed in 2015 when Google expanded the types of issues it scanned for and also started enforcing deadlines for fixing many of them... Google added checks for six new vulnerabilities in 2015, all of them with a patching deadline, and 17 in 2016, 12 of which had a time limit for fixes. These issues ranged from security flaws in third-party libraries, development frameworks and advertising SDKs to insecure implementations of Android Java classes and interfaces. 100,000 applications had been patched by April of 2016, but that number tripled over the next nine mon

    发表评论 查看更多 翻译此文

    收起

  • Gitea – A painless self-hosted Git service

    发表评论 查看更多 翻译此文

    收起

  • alphadogg quotes Network World: The Free Software Foundation Tuesday announced a major rethinking of the software projects that it supports, putting top priority on a free mobile operating system, accessibility, and driver development, among other areas. The foundation has maintained the High Priority Projects list since 2005, when it contained just four free software projects. [That rose to 12 projects by 2008, though the changelog shows at least seven projects have since been removed.] Today's version mostly identifies priority areas, along with a few specific projects in key areas. The new list shows the FSF will continue financially supporting Replicant, their free version of Android, and they're also still supporting projects to create a free software replacement for Skype with real-time voice and video capabilities. But they're now also prioritizing various projects to replace Siri, Google Now, Alexa, and Cortana with a free-software personal assistant, which they view as "cruci

    发表评论 查看更多 翻译此文

    收起

  • Chuck E. Cheese's, Silicon Valley Startup: The Origins of the Chain (2013)

    发表评论 查看更多 翻译此文

    收起

  •  

    Why we should all have a basic income

    01-22 Hacker News 8

    Why we should all have a basic income

    发表评论 查看更多 翻译此文

    收起

  • Billions of robocalls came from two groups selling extended auto warranties, SEO services, and home security systems over the last seven years -- many to numbers on the "Do Not Call" list -- but this week the Federal Trade Commission took action. Trailrunner7 shares this report from OnTheWire: Continuing its campaign against phone fraud operations, the FTC has dismantled two major robocall organizations... They and many of their co-defendants have agreed to court-ordered bans on robocall activities and financial settlements... The FTC and the FCC both have been cracking down on illegal robocall operations recently. The FCC has formed a robocall strike force with the help of carriers and also has signed an agreement to cooperate with Canadian authorities to address the problem. "The law is clear about robocalls," says one FTC executive. "If a telemarketer doesn't have consumers' written permission, it's illegal to make these calls."

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a Christian Science Monitor report on "a bill that would essentially ban large-scale renewable energy" in Wyoming. The new Wyoming bill would forbid utilities from using solar or wind sources for their electricity by 2019, according to Inside Climate News... The bill would require utilities to use "eligible resources" to meet 95 percent of Wyoming's electricity needs in 2018, and all of its electricity needs in 2019. Those "eligible resources" are defined solely as coal, hydroelectric, natural gas, nuclear, oil, and individual net metering... Utility-scale wind and solar farms are not included in the bill's list of "eligible resources," making it illegal for Wyoming utilities to use them in any way if the legislation passes. The bill calls for a fine of $10 per megawatt-hour of electricity from a renewable source to be slapped on Wyoming utilities that provide power from unapproved sources to in-state customers. The bill also prohibits utilities from raising

    发表评论 查看更多 翻译此文

    收起

  • There's a surprise in the data from an investigation into Tesla safety by the U.S. National Highway Traffic Safety Administration. An anonymous reader quotes Bloomberg: [W]hile all Tesla vehicles come with the hardware necessary for Autopilot, you need a software upgrade that costs thousands of dollars to make it work. Since buyers can add Autopilot features after purchase, this provides a perfect before-and-after comparison. It turns out that, according to the data Tesla gave investigators, installing Autopilot prevents crashes -- by an astonishing 40 percent... Now -- thanks to an investigation that initially hurt the company -- there is finally some real data, and it's good news for Tesla... As the software matures to match the new hardware, Musk said on Thursday via a Tweet, Tesla is targeting a 90 percent reduction in car crashes.

    发表评论 查看更多 翻译此文

    收起

  • Oracle laying off hundreds in Santa Clara

    发表评论 查看更多 翻译此文

    收起

  •  

    Update and Build Prep

    01-22 Hacker News 46

    Update and Build Prep

    发表评论 查看更多 翻译此文

    收起

  • San Francisco Asks: Where Have All the Children Gone?

    发表评论 查看更多 翻译此文

    收起

  •  

    Fake Physics

    01-22 Hacker News 45

    Fake Physics

    发表评论 查看更多 翻译此文

    收起