You don't need to simulate it in real time, and you can replace a lot of components with simplified representations. You'll still need a silly amount of RAM.
1169 posts • joined 20 Jun 2007
You don't need to simulate it in real time, and you can replace a lot of components with simplified representations. You'll still need a silly amount of RAM.
Car engine breaks, so the owner takes it to the nearest convenient garage. They charge him a fortune (of course) and find the problem is a break in one of the ignition wires and replace it. Two months later he takes it to the dealer for a routine service - the dealer identifies the cable as an unauthorised modification, drops the car into their car-crushing machine, and explains to the owner that they were only acting to protect him from a possible accident should the third-party cable have failed while travelling at speed. They will not cover the cost of a replacement car, and he should be thankful that they are so concerned for his safety. He may, however, keep the mangled cube.
I think it's incredibly reckless to attempt this until the surgeon can perform the procedure on chimps with a reasonable level of reliability. But on the other hand, the patient has Werdnig-Hoffman disease - it's degenerative, he is already wheelchair-bound, and as the disease continues he is going to lose what little mobility he has along with his capacity to work. So if he wants to gamble his life on a kill-or-cure experimental and dangerous procedure, that's his choice. It might work, and if not then knowledge will be gained to improve the technique for the next guina pig.
That depends who the attackers are. If you're dealing with regular internet hackers, that may be true. If you're high enough profile to get noticed by nation-state hackers though, then they'll already have their ways of getting into any major cloud service - by means of warrant, threats or hacking - and you can't trust any hardware you don't have physical control over.
Hackers crack your server's authentication. The NSA just strolls over to Microsoft and waves a 'give us your data, tell no-one or you go to jail' letter. Or the FSB might do likewise, and point out that there are billions of dollars to be made in Russia and a company that doesn't cooperate with investigations may not be able to operate in the country. You get the idea.
Identify your threats, choose appropriate countermeasures. Chances are your organisation isn't going to merit the directed attentions of any state intelligence agency, so for the most part you don't have to worry about them - just the standard barrage of opportunistic script kiddies, ransomware, DDoS extortion, hactivists, spammers and all our favourite internet ne’er-do-wells. In which case, Azure or Amazon or some lesser-known cloud may well be more secure than your own team of non-specialists.
We do have the high-tensile-strength material - we just don't have a way to manufacture it in bulk and in consistent quality.
Big companies, pressure groups, politicians. America is the ultimate refinement of buzzword politics - to the point that an organisation can, by simply including the word 'family' in their name, immediately state their positions on abortion, healthcare reform, gay marriage, the role of religion in government and vice versa, non-discrimination law, regulation of obscenity and gun control.
Brainstorm also predicted something else about that tech: The first recording ever made is a test/demo tape. The second is porn.
But earlier ones were specifically defeated by stairs. The general fan theory is that there are many revisions of the dalek chassis, and some are a lot better than others. Thus why early models could be defeated by stairs or a punk with a baseball bat. When the Doctor encouters daleks further along in their history they have more advanced technology and superior shells.
It's really good for any system where untrusted actors need to coordinate transfers of ownership, so there might be a few niches. But not many. The real power of blockchains is decentralisation - something that the government doesn't need, at least in the technical sense. They have the budget to track all land ownership on a conventional database with a backup on dusty paper at the local council office, so why would they benefit from using a blockchain?
"Why should it?"
Security. An application could malloc() a big chunk of memory and there's a good chance of extracting cryptographic secrets or other things it should not have from memory recently free()ed from another process, or from a process that terminated.
It's a compile-time option for the linux kernel. The default is to zero, but you can disable that to slightly improve performance in very resource-tight embedded environments.
Us furries hate Jar-Jar too.
It looks more like some sort of Apple device to me - you can't take the battery out without destroying the whole thing.
C3P0 isn't a standard model, too - it was cobbled together from scrap parts of other protocol droids, and assembled by someone with little experience and no formal training. A wonder it works at all.
The novels retconned the parsec comment. The Kessel run is explained as a smuggling route that skims the 'no hyperspace' region around a black hole - somewhere that Empire police won't go lightly, as only the most experienced pilots can do so safely. The closer a smuggler can get to that region, the better his chances of evading detection. Solo's ability to run the Kessel route at such a close distance shows his ability as a pilot, and his willingness to take risks.
In the film though, it's just a sloppy line.
Tried Infiniband? The switches cost a fortune, but you can pick up 8Gb/s interfaces dirt cheap. Connect a cable between them and you've a point-to-point link. It does a decent bitrate, and it can do RDMA too, so if you get it configured right (which is a bit tricky) you can get some impressive performance out of it. The prices do get high if you want more than two computers on your network though.
Any criminal smart enough to do that would be smart enough not to leave their illegal images on a hidden hard drive. If I wanted to hide something like that, I'd put it in a truecrypt hidden volume. The non-hidden one would contain all my financial information and the family photos - plausible denyability as to why I would have anything encrypted at all, because I'm aware that refusing to hand over a decryption key to police would not impress a jury.
It's as good as established now that drugs dogs are used in this way - not to find drugs, but to provide 'reasonable suspicion' in order to justify a more invasive warrantless search, usually on a vehicle. The handler knows how to make the dog sit, drugs or no drugs.
I hear the caprine variety is very good at finding drives in inaccessible places, but you have to chase it quickly or it may eat the evidence.
The true 'tank rush' is an all or nothing: You commit all your starting resources to tanks rather than a refinery. If you're too slow, you have no hope of victory because you can never collect resources to build anything else. But if you're fast, and don't have a run of bad luck trying to locate your opponent, you can hit him with your tanks while he doesn't even have a factory running. The only way to counter this strategy is to respond in kind - which usually means whoever is fastest at entering commands and most skilled at front-line tactics has the advantage.
There was an old series, Bugs, which had a rather cool prison escape. The tech-genius villain made a deal with the prison operator: They give him external communication, he applies his great financial skill to run a share trading and business operation from within his cell. No-one need know the mysterious CEO is a prisoner. The scheme is a huge success, the warden gets rich, the villain gets richer... until he has enough wealth to simply buy the prison and order his own release. By the time the prisons authority figures out what happened he is long gone.
"But what the browser do?"
Automatically attempt to fetch the file from google cache, archive.org, via Tor, and using an alternate DNS server. Or, if the query is an IMS, mark the version in the cache as 'does not expire, ever, do not IMS.'
The board don't need to know anything about 'cybersecurity.' I don't want an MBA writing firewall rules. All they need to know is how to recognize someone who is qualified and hire them. That's why we have specialists.
Li-ion batteries are something easy to get wrong. Competition between manufacturers is intense, margins thin. Shoddy construction is a common occurrence, and any breach within the cell that links anode and cathode - however tiny - will rapidly lead to thermal runaway ending in fire and/or explosion. One of the several issues with the Hoverboards recently was traced to very low-quality batteries prone to spontaneous fire in this manner, and given fake Samsung labels. Counterfeits.
No, there's just TCP and UDP. Other transport protocols are an option only if you control the network end-to-end, because most devices on the internet these days are behind PAT, and PAT routers are only programmed for TCP and UDP. That's why TCP lasts: When the network is no longer dumb, introducing new technology is a nightmare.
He's never claimed to be a real scientist. Only a science educator and entertainer. He was an engineer before that.
Not all scientists are capable of presenting their field in a way laypeople can understand. Few are, fewer want to. People like Nye work in the media as go-betweens, presenting science in a manner that people can not only understand, but enjoy too.
Just declare it was an advanced form of clay pigeon.
The whale is a translation error. The ancient Jewish people did not use our classification system: Whales looked like fish, so they were just thought of as very big fish. The word in the story means 'really big fish.' It could be a whale, or it could be a giant fish. There's a section elsewhere that lists bats as a sort of bird for the same reason.
It's still ridiculous. You could imagine a very bored God sitting beside the whale's stomach, continually pulling apart carbon dioxide from Jonah's blood and shoving the oxygen back in.
I'm not sure who, but if anyone of importance at the DHS wants to put an end to Tor, the means by which they could do so is obvious:
1. Wait until they pick up some sufficiently juicy material from a Tor exit. Ideally child abuse imagery.
2. SWAT down the operators door, haul him off publicly, confiscate everything with a battery that he owns.
3. Make sure there is some media coverage. But don't let the Tor thing slip yet - you just want the whole world to know he is a dirty filthy pedo. You don't want an actual trial though, not yet.
4. Once the interest is fading, then release the Tor connection. That'll be ignored by most of the media, but noticed anyone who might consider running an exit node themselves.
5. Have enough charges ready to jail him for a century. Still no trial, but use those to get a plea bargain. I don't know quite what for, there must be some suitable charge.
6. Threw the destroyed man back out - hated by his community, unemployable, with crippling legal costs that he'll never be able to pay off.
7. Allow the story to circulate a bit. Job done: Everyone else in the country will be too terrified to consider running an exit node in future.
If I were a DHS overlord bent on destroying Tor, that's how I'd go about it.
You can't just override - most of these consumer drones have wifi-based control, encryption is trivial. Some models can be hacked.
You could hit them with a jamming signal though - any decent drone will be designed to either stop dead or safely land if communication is lost. You'd need to give police an exemption to radio regulations so they could wield directional high-power jamming guns that'll likely screw up every wireless network in two hundred meters for a few minutes, but after that it's just a matter of getting a police officer to point the jammer at the drone and keep it pointed until the drone is down.
What happens when almost all sales are online? How do the states collect any sales tax at all?
Perhaps this is the idea - many politicians have an ideological opposition to the existence of more than the minimal level of government, and consider it a good tactic to starve the government of funding in order to force the closure of all those social services programs and regulations they decry as communism.
It's fairly common in politics for unrelated issues to get roped together. Especially in America, as the rules government amendments to bills in the Senate are very lax - it's a very frequent practice to stick an unpopular provision into a law that is overwhelmingly popular. This was not one of these cases though: It's just that whoever wrote it figured that both are internet-related taxes, and that means they should go under one law.
One of the most famous examples of recent years was a law to block the FCC from enforcing net neutrality regulations - as part of a bill relating to medical benefits for veterans.
Law and sausages, as the expression goes.
All the multiplicative prefixes are supposed to be capitalised though, so it should be 220 KVA.
Knowing this rule is the difference between mega and milli.
Depends on field.
In mathematics, risk is risk. Ask a statistician and he'll calculate the probability for you.
In business, risk is probability times impact - even though impact can't always be quantified.
Those aren't straps. Cortana just uses surface textures to slightly-disguise that she prefers her human representation in the nude.
The pointless fanservice is pretty blatant, but at least the writers made her a proper character. Sex appeal to the players is just her secondary function.
Not yet - but once the technology matures, someone is eventually going to put together enough information to create an open-source version. It'll probably occupy a few terabytes for the knowledge base though - there's a reason these programs are just front ends to a remote server farm.
Stranger still when you look at the character: Cortana-the-character is an AI, though based partially upon patterns derived from a scanned human brain. Why does she have breasts? Because she deliberately designed her avatar model to look like that.
It's the free market at work. If consumers have to choose between a £400 domestically-manufactured product and a £100 Chinese product, which will they buy? Even if the Chinese one only lasts half as long, it's still better value. Especially in tech, where things tend to become obsolete before they break down.
Teleporter + power station = instant army. There are so many ways to abuse that.
"Anyway what is there to not like about a character who can travel anywhere in time and space."
Except New York, apparently. He broke it.
Russia does command the greatest weapon a country could hope to use without starting a nuclear war: Valves. Winter is coming, and if Russia were to cut the fuel flow then it would not only cripple the European economy, it'd actually kill people. It'd also utterly destroy the Russian economy, as they are heavily dependent upon fuel exports.
Part of Putin's power comes from being seen as just unstable enough that he might pull a stunt like that. Superweapons are no use if potential enemies believe you will never use them.
"He does not, however, have a right to have his record expunged."
He doesn't, being in the US. If he were in the UK he would, under Rehabilitation of Offenders Act 1974. But he still wouldn't get the right until four years after completion of his sentence. We passed that act because we recognised that it's almost impossible for an ex-criminal to go straight if they are still regarded as criminal scum by most of society - no company will hire them, and if they can't find legitimate employment then they are left with no choice but to return to crime. The 'witch hunt' problem was recognised even in the seventies, and the internet has only made it worse.
It's called 'revenge porn' because it's submitted in revenge. No hacking is required - the photos are sent by the bitter exes, who were in turn sent or allowed to take the photos willingly by the woman prior to their break-up.
The internet already has an effectively limitless supply of topless women.
Native Hawaiian politics is a bit of a minefield. Quite a few of them still believe the island is under unlawful US occupation, on the grounds that the prior government never actually signed it over officially - American ships just turned up and took over by virtue of superior weaponry, as they didn't believe the native tribes qualified as a government and thus the land was unclaimed. Even on the mainland US most of the takeover was recognised by agreed upon treaties, though they tended to be signed under threat of genocide or by scamming some native who had no concept of a contractual agreement.
The majority just want to get on with their jobs and don't care what happened to their great-great-great-great-great grandfather any more, but it only takes a few of them to kick up a fuss.
It might be adhered to, but how long will that take? I imagine quite a few years.
New processor, new mainboard, probably new memory... I feel like 2005 just came back.
The fun comes when the engine gets a little more advanced. Not turing-test-capable advanced, but enough that it becomes capable of answering queries. Barbie is going to need a knowledge base and turn Siri-for-children. There may also be issues where Barbie answers questions that the parents may not want answered, unless it evades all questions on matters remotely interesting.
These toys already featured in a 'CSI: Cyber' episode, just ramped up a little. In that episode story a hacker-and-burglar team worked together: A hacker would hack the doll and communicate with the child to learn the contents of the property and when the family would be away, and manipulate the child into unlocking a window. The burglar would then use the information and assistance to do his thing.
Be fair to them: They didn't take a full stock of lifeboats because they believed that lifeboats would never be needed, instead designing a ship that was supposed to be unsinkable. A double-walled hull design was almost impervious to breaches, and even if a section did breach there was a system for sealing off entire sections - the ship could float even with multiple compartments flooded. Unsinkable wasn't just an idle boast - it was a design specification. It did take a lot of damage to sink, and that only because of a side-on collision with an iceburg, something that designers didn't anticipate because giant floating lumps of ice are usually easy to see ahead and avoid.
I can see Russia complying with this at about the same time as the UK grants voting rights to prisoners - like the same court ordered us to do in 2004. They can address the ruling in exactly the same way we did: Utterly ignore it.