Hacker News new | past | comments | ask | show | jobs | submit | nvmc's comments login

I thought all the AAA publishers switched to interactive films after they gave up on making video games.


In other news, trolling will soon be obsolete due to bloggers like this one.


I've been waiting since my Athlon64 died for AMD to make a chip worth getting. Them taking the brute force (P4) approach is not all that encouraging.


Another astronomically expensive Mac Pro. This time hermetically sealed and unupgradable. Lovely.


Actually it appears somewhat upgradeable; the memory is seated in standard slots and is clearly user-serviceable. The SSD appears to be as well; it may require third-party kit ala OWC (One World Computing) but oh well.

The only two remaining components that may or may not be are the GPU boards and the processor. The system seems serviceable enough so far.

But let's wait for final specs and user guides before passing judgment.


What's the price?


It hasn't been announced, but xenon processors and PCI-E flash storage is typically much more expensive than the Core Processor line or SSD storage since they are almost exclusively marketed towards servers.

That said, disregarding the Apple tax I'm sure Apple gets pretty good deals on their hardware so it is possible that it will be at similar price point as the current line (which was typically regarded as over priced and outdated anyways)


As far as I'm concerned, a single unsolicited message from anyone with no personal connection to myself constitutes spam. Obviously opt-in lists are a different story.

Anecdotally, most people aren't going to go through the couple or three clicks to unsubscribe. This is what spammers rely on.


They did not have a modicum of skill. I'm neutral on their endeavours, however LOIC and SQL injection is skiddy stuff.


  | SQL injection is skiddy stuff
Why would a hacker use something overly complex when the site in question was vulnerable to SQL injection? Do true hackers with 'mad skillz' spend months to find truly unique hacks to express their artistry as well as their skills?


Why do you call those people hackers? Hackers build things, don't piss on other people's work.


Sorry. I thought that "black hat" was implicit.


LOIC, yes, but that was anonymous. SQL injection is a vulnerability - it does not make you good or bad for using it.


Reminds me of a friend who took the hole saw to the inner guards on his STi to make getting to the plugs easier.


Oh yeah, I own a Subaru. I know the pain of changing those spark plugs, too.


Except that, you know, gas is everywhere and a tank lasts more than a hundred miles.


> Except that, you know, gas is everywhere and a tank lasts more than a hundred miles.

Not accurate on both counts.

1. If I drive East West or North from my house right now on major national highways, I won't find a gas station for many hundreds of KMs in any direction.

2. The Veyron will drain it's gas tank in ~10 minutes, as will other high-performance cars that achieve 1/4 mile results similar to the Model S. http://www.automobilemag.com/reviews/driven/1206_2013_bugatt...


  > Not accurate on both counts.
Wow, how many nines does he have to hit to be considered accurate?


I'd guess it is. Diseases are still organisms, and we try pretty hard not to let them go extinct.


What's the reason for keeping them though? Is it to make vaccines if they potentially come back or more sinister pre-emptive military reasons?


We are always learning how to learn more. Destroying the specimens would destroy an opportunity to learn about an organism that has had a significant impact on our own species.


Research. Vaccines just in case we didn't get the all.


The people hosing their system like that aren't likely to be able to use a recovery partition. I would guess they'd take the computer to a shop to get it fixed.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: