Yeah; in this case, the initial mistake at publishing appears to be an honest mistake. As the specs lined up and the tech marketing guys were told that nothing changed on that hardware, they kept the same ROP specs they''d already been using in their marketing materials.
I have to admit that back when I was publishing specs like these, I made that mistake myself a few times.
However, it's what happened next that's a bit odd: I find it difficult to believe that it took 4 months for it to come to the attention of the company -- and it came from an external source. There's usually some engineer that spends a lot of time reading slashdot and looking up the specs of the products he's worked on -- and they'd likely flag it up. I'd expect 2-month turn-around until the company management realized the mistake.
The next bit that often happens is asking engineering "Is the change significant in any way?" to which the answer is "no." So marketing is either not even told of the mistake, or told that it's there, but not worth updating the documentation or issuing any sort of an update.
I find it really odd that they didn't even bother to change it on the website and queue it up for the next round of distribution.
What this really makes me wonder though, is how often this happens with products held to this standard, and nobody notices....
...and we all know, if officer location reporting was removed from Waze, some enterprising soul would just create a plug-in for the Marshal's Extracurricular Event Notation System.
You know: Waze and Meens.
I think you've only captured half of the Canadian mindset here.
If asked politely, Canadians would agree and maybe even fly the stars and stripes...
Invading wouldn't be all that messy; the invaders would be welcomed with open arms, and then firmly sent back home with care packages and requests to say hello to common friends and family members. A guide might also be provided, if the invaders had any navigational issues. Depending on how the politeness lasted, they may end up back in the US, or wandering around the arctic circle.
Just assign yourself a number in Google Hangouts, and you get this for free, barring wifi connection costs. Voicemail is stored in the cloud, with the option to text message you VTT transcripts as soon as you connect any of your Hangouts-enabled devices to the internet.
Where I live, the entire metropolitan area is covered with wifi hotspots put up by the local cable/telco companies. I actually have an iPod with Hangouts on it that acts as my in-town phone; this is the first device that Google Talk tries to reach when there's an incoming call.
Since you're not really supposed to be on a phone while in transit, I find this system works amazingly well (and doesn't require half of what Cablevision is requiring). I have a device that is significantly thinner than all phones, allows me to make calls anywhere with wifi, and will receive calls if I'm on wifi. Google Talk/Hangouts becomes my answering service, and even notifies me of missed calls when I next connect to wifi.
While some people might be in jobs that require real-time inbound communications, my guess is that most people aren't.
So, for the price of my at-home internet connection, I get a service that roams anywhere locally for no added cost, anywhere in the world with Wifi access, can be implemented across any device that can use Hangouts (mobile devices and desktop/laptop computers etc.) and is otherwise free.
And I've been doing this since a while before Google bought the service -- my phone number has stayed the same, even though I've had to use a number of different SIP providers over the years (all free) to route my voice calls in/out of this service.
This is something that is already solved, with nowhere near as many restrictions as this offering carries.
This isn't impossible... it just is something that hasn't been a focus by companies since the Cold War.
Actually, it has: this is precisely the same domain being tackled by the smart card industry (think cell phones, satellite TV, ATMs). Some in those industries have gone for the quick buck, but the security analysis and implementation guidelines have been continuously worked out since the 90's (including the voltage input and line emissions broadcast issues).
So really, the only issue is for the engineers to 1) read the right supporting material and 2) give the right pitch to their business units. Of course, it would also help if someone else wasn't competing against them with a strap-on security mindset.
I think after all the other things the Chinese Hamster has been subject to, it wouldn't actually be all that concerned about this one.
So much for using egg scrambling as analogue to hash functions.
Aside from the fact that scrambling != boiling, I think it's still a good analogy; just look at MD4 or other hash functions whose key folding component has been reversed. You can't guarantee that the result is the same as the original state, but it does become the same as a POSSIBLE original state. Same likely goes for the proteins in the egg.
No, I think it has more to do with Heisenberg.
In other words, you can know that the function to perform some task exists*, or you can know where to find the control that should make it work** -- but knowing either one will cause the other to fail.
Really, Quantum is the reason I hate "modern" UI -- the spatial UI makes sense with human psychology; this contextual stuff means that we change the function of the software just by observing it, and that means we can never memorize it all and just move on.
* while you spend hours looking for it
** only to find that the control actually does something markedly different, even though the tooltip and icon indicate it should do exactly what you want
The problem of trust and reputation that such a system has a weakness for is very similar to reputation/trust systems used for protecting computers these days. The idea is that if you have enough data points, you can ignore the anomalies, or flag them up as anomalous (as in: "car data from car 3 up in your lane doesn't match the curve -- pay extra attention to sensor data from that car" being broadcast out to all the other cars in the area).
Now if this was supposed to be some sort of trusted message passing relay, I'd see cause for concern -- but I imagine communication being more like a Tor network with a signed UDID chain for each vehicle. Sure, you could mess with the data being passed through (or generated by) one car, but all that does is flag up that car as a potential issue (also meaning it is likely to get pulled over by the cops).
and as an aside, where I'm from, Bott's Dots aren't applied to the road's surface, there's a groove etched out into which the dot is sunk -- so plowing etc. don't dislodge the dots, but they're still visible, and you get the benefits of both grooved pavement and reflective dots
I think your comment just exemplified your reasoning, being extremely one-sided. All I said is that the answer to "where does that power come from" could be seen in the article. I said nothing about the abysmal quality of the article itself.
So maybe my personal bias is even less obvious than where the power comes from?
Critical thinking please people, even when the information available is somewhat limited and mangled.
I didn't think the grades from these courses counted for anything (if they even were grades) so where exactly did the power come from?
That's addressed in the article. I'll leave RTFA to the person willing to make an argument/ask a question that takes the entire article into account.
"Just think, with VLSI we can have 100 ENIACS on a chip!" -- Alan Perlis