Comment Re:Test fail (Score 1) 140
I get
The webpage at https://www.imperialviolet.org... might be temporarily down or it may have moved permanently to a new web address.
Error code: ERR_FAILED
I get
The webpage at https://www.imperialviolet.org... might be temporarily down or it may have moved permanently to a new web address.
Error code: ERR_FAILED
Slashdotted.
Make seats face each other.
Then leave it up to human nature.
Could be simple seating.or more of a communal lounge.
That plus the rolling shutter illumination by strobe.
Probably it would be seen as a challenge I suppose.
Guarding someone like this would be a good use
Of DHS if not the Secret Service. I hope somebody is on the ball.
If he was immoral.
Which I doubt.
However I would not invite my mother to
a location targetted by x, y and z.
... that x,y info in the grid is used to encode additional information, which allows you more info not *despite* but *because* only one photon hits the detector at a time. In other words this detector only works when only one photon can reach the detector at the same time, and the beam output will have to be weakened if the spacecraft is too close perhaps. So if the photon rate is 1 photon per millisecond the bit rate can be multiples of 1000 bps due to also having an extra couple of bits per photon saying which grid cell (pixel) the photon hit.
Key points
- They use superconducting nanowires to make a grid. I doubt anybody not in space is doing that
- Though I didn't catch it from the pdf, the article has a quote from NIST saying that x,y information inside this grid
- This allows an n x n pixel grid sensor to be built out of only 2n nanowires. A photon heats up a nanowire intersection to register a hit, then wait for it to cool down. p.s. cooling something down isn't that easy in space.
- Presumably you would have to beam a repeating pattern (or hologram?) covering a broad area, and the pattern resolution would be adjusted as distance to target spacecraft changes over time.
It might happen though not as likely. I saw a tv news show a couple weeks ago showing phone chargers being sold on the street in China that were filled with packets of sand. The more expensive ones had a little less sand. The Chinese shopkeeper (if you call squatting on a bridge a shop) had no qualms. "Your phone charged some amount so you should be happy." Dell apparently shares some heredity with these shop owners on the bridge.
A buffer overflow should not provide the keys to the city.
We need security orthogonal to the executing application surface.
Here's an idea, don't know if it will catch on but how about
encrypting the data in it, whitelisting the users / apps that can use it, thereby
reducing the
surface vulnerable to attack. It would require a sophisticated public key
infrastructure integrated
with all processes. Data objects could organize their fields into multiple segments that can be origressively unlocked.
All I ask is a chance to prove that money can't make me happy.