Comment Looking forward to a good experience (Score 1) 39
I browse
Will test some more with various settings. Thanks for this
I browse
Will test some more with various settings. Thanks for this
Also that implementing and using encryption for personal use is more techy than the average being can handle. I'm hoping that https://silentcircle.com/ can approach this issue. Extra points for taking note of the founders...
Yup, those sugary and fatty foods provided sustenance for those periods when food was scarcer, when your body relies on fatty deposits.
Super markets eliminated the need to hunt for food interspersed with periods of shortages, but the latent craving for those sugary, fatty treats still remained.
Indeed, they might not care at all, but they act like they may give an iota of a crap.
The debacle with Google collecting Publicly Open Unencrypted WiFi Communications was controversial, and even intentional *gasp*, yet:
But, the commission said, Google did not engage in illegal wiretapping because the data was flowing, unencrypted, over open radio waves.
I concede this means little regarding moral privacy, I mean they did it anyway, right?!
It was a wake-up call to people who are too ignorant or lazy to secure their networks. People need to learn, good for Them!
It falls in line with a campaign to raise awareness about what information you put out there.
This is bound to happen. The question is:
Would you prefer Google to patent this, or someone like Apple?
Personally I would trust Google to consider user rights a little bit more, but the exploitation of such a system is damn scary.
TFA tells us the technology will not be targeted towards PC's, but for RAID controllers.
I guess it could help against data loss in critical systems, combined with disk caching it can offer nice responsive write times.
Assuming the drinker in question limits their intake by units, this is true.
But most people limit their intake by a time based function: let's have another while we are here!
[units] = [time] * [consumption]
You must have misread the context, Sir.
The good 'ol Doc Mark II wants to *download* a patch *into* his database, i.e. acquiring data locally from an external source. From this perspective, the Doc Mark I would be the one doing the *uploading*.
Similarly, this is how _you_ *downloaded* that bestial porn *into* your computer *from* the webs: external -> local.
The Doctor: I've even had sexual relations.
EMH Mark II: Sex?! But how is that possible?! We're not equipped-
The Doctor: Let's just say I made an addition to my program.
EMH Mark II: Before you leave... perhaps you could download those sub-routines into my database?
For kids, sure. For the real world (TM), the only way to secure against an unknown attack vector, is to invent one. Hey, anything is possible with a contrived example.
While Microsoft locks into contracts with educational institutions it's a nice change to see this sort of thing happening.
Now hand in your sarcasm badge, Sir!
An old idea in action is refreshingly inspirational. It humbly reminds us that newer is not always better, it's what you make of it that counts.
Cloning yourself mostly implies a copy of oneself as you are now, at first impression.
31% of
The moon is made of green cheese. -- John Heywood