Comment Re:lol mimes (Score 2) 203
how does a mime have a "verbal altercation"?
Sign language.
how does a mime have a "verbal altercation"?
Sign language.
From the article, "City officials said the first units in Boston will be funded by Cisco Systems, a leader in development of smart city solutions, at no cost to the city."
As for why Boston got them first, rather than other cities around the country, my guess would be because they're a local product. "The high-tech benches were invented by MIT Media Lab spinoff Changing Environments, a Verizon Innovation Program."
I've been running LG's F3 for a while, and there are things I love about it, and other things that I hate.
The good: Incredible battery life (can get two days with moderate use and still have battery to spare), slim design that can easily be operated with one hand, reasonably fast CPU, bright IPS display, good RF performance, and LTE. Also, it has a replaceable battery and a MicroSD slot.
The bad: That MicroSD slot is needed, because there's less than 1.3 GB of internal storage, and there's only 1 GB of RAM. Fortunately, Firefox allows you to move it to the SD card, otherwise I wouldn't be able to run it.
Suggestion: take the F3, and add more RAM and internal flash. A quad-core CPU would be nice, but isn't really necessary.
That being said, in spite of the overkill display, the G3 at least has brought back the replaceable battery and the MicroSD slot, which went missing on the G2.
How do you distinguish between intentional and unintentional changes? How much storage overhead do you need to keep all changes so that you can roll back any unintentional change?
I'm only a rocket scientist, not a CS person, but it seems intuitive to me. If it's an intentional change, then the new version will have a later last-modified date than the back-up. If the hash of the back-up copy made at the time it was written matches a hash calculated at the time of the second back-up, then the integrity of the back-up is confirmed. If the active copy has not been intentionally changed in the interval, and its hash no longer matches the other two, then the active should be discarded in favor of the back-up. I'm sure you can do the mental figuring for the equivalent to detect if the back-up rather than the active has bitrotted.
The challenge arrives if you have *both* intentional and unintentional changes to the same file between successive back-ups. To exclude unintentional changes, you would have to do hashes every time you save/compile/whatever,as well as keep a keystroke log of the edits. Then, you would have to execute the exact same change process on the back-up copy, repeating the process described above. It would be incredibly resource-intensive (essentially having a 'bot duplicate the work you have performed between back-ups), but it would sure be thorough.
Lord, I HOPE this is not an original idea. If I just invented it, and somebody tries to patent it later, you're in for a world of hurt.
The IRS guidelines on how long businesses should keep tax records for at least 2 or 3 years, in some circumstances (not involving filing a fraudulent return) they recommend up to 6 or 7 years.
The Internal Revenue Service -- Do As We Say Not As We Do.
Yeah, it sucks for the actual Nigerian finance minister.
If I were Domino's, I would consider offering a reward (less than 30000 Euros but still significant) for information leading to the arrest and conviction of these hackers.
Has anybody smoked in space? You know it's going to come up at some point.
I remembered hearing something about smoking on Mir. This article was the fisrt I stumbled on when I just googled it.
Actually, things have changed. As part of this announcement they also announced that they will be digging through your browser history in order to provide more targeted ads, rather than just mining what you do through their website and websites that track for them
At last, a reason to keep Opera on my computer.
Before diplomats from one country meet with diplomats from another country on Earth, they study everything they can about the situation and their counterparts. What if aliens are monitoring our communications to learn more about us -- what we do, why we do it, what we believe, how we're likely to respond to different scenarios, etc.? No one says that even if aliens came to Earth the first thing they'd do is find some schlub and say "Take me to your leader." Nor is it unlikely that a race capable of crossing the void between stars could hide from us, say by looking like a comet or asteroid.
I've noticed several design suggestions in your code.