Comment Re:depends on what you're going into (Score 1) 656
It is very unlikely you will need 'accurate' stats. though.
It is very unlikely you will need 'accurate' stats. though.
They are probably hoping the extra data will help incriminate other people. Hence why the 5th no longer applies.
Really don't want to contribute to the negativity around an admirable idea. However you need to be aware of the horribly complex visa and tax laws.
The UK has a a growing number of good hackspaces, you would be welcome at Reading http://rlab.org.uk/
The first person to encourage independent confirmation of a published cold-fusion device becomes the person who has made the greatest contribution to the betterment of the human condition in all of history.
People who think they can make more money by preventing a section of humanity from using a cold-fusion device are too small minded and petty to stand any chance of having inventing one.
Yes that wraps it up nicely. The sad thing is I find the less doctored photo looks much better.
If the people who had designed IP6 had just fixed the actual issue and not bolted on stuff nobody needed; we would have been done in the last millennium, and saved a LOT of money.
ARM SoCs are developing incredibly fast. They are 12 months from obliterating current gen consoles (Tegra 5s will have Kepler GPUs). 2-3 years is much less certain, but current road-maps show them easily beating next-gen consoles.
I certainly agree that tablets generally aren't heavily used, and that this dose indicate they are probably in a bubble. I was just claiming that if they where being used, then the replacement cycle would sustain the market without needed an upgrade cycle.
The batteries are sufficient designed obsolescences to prevent that from happening. A heavily used tablet has 1 year possibly 18 months before it is just a digital picture frame.
This years round of consoles is also going to raise the graphics bar substantially, tablets are 2 to 3 years from matching this.
Apart from the stacked CPU/RAM, the Raspberry PI could be sold as an assemble it yourself kit. All the key components are still produced in Asia, and will be for decades unless Wales wants to invest high-billions in new fabs.
We are all frustrated by Apple at one time or another, but that don't justify spreading ridiculous FUD.
Apple has more cash then ANYONE IN HISTORY; security their supply lines is hardly going to be difficult.
That is precisely the problem. You could require that the doctor can only see your medical records in special bunker under the Pentagon, after he has submitted to a full cavity search and provided 20 forms of ID. It doesn't have any bearing on whether the next day he phones up his friendly drugs rep. to say he has an interesting new case. If you share information with someone it have to TRUST them to use it wisely, the is no technology that will help with that.
Sending records securely over the public Internet is a solved problem and most people manage to do this every day. Storing records securely is also solved, though this is less uniformly applied. Trying to give people information (digital or otherwise) and then controlling precisely what they do with that information is quite simply impossible.
I am afraid you are confused.
SSL and safely storing bank documents are jobs for encryption and this works very well. Basically you send a lockable chest to your bank but retain the key, they put your documents into it, close the lock, and send it back. Ensuring that only your key can open it. This is absolutely vital to modern society, but isn't a type of DRM.
DRM usually requires encryption, but also something else. The content producers send their content in a locked box and then try and send the key to your computer in a way where the computer can use it open the box and play back the content but you can't use it to open the box and take the content out. This is obviously logically impossible, which is why you are always hearing of DRM schemes being broken just to watch a film (conversely if you could break a modern encryption system you could literally steal all the money in every bank in the world).
So logically you can't actually implement DRM in closed source software, but with sufficient obfuscation you can get close (Intel literally burns some of the key into a special chip on your motherboard which makes finding it extremely hard). If you are open about what you code is and dose, that includes telling people where you hare trying to hide the key, making the game of hide and seek a bit shorter.
Look at it as a valuable opportunity. First you get paid to train him on-top of the ongoing development whilst he gets up to speed.
Then if he is no good (or you aren't a very good trainer) then you haven't lost anything and they will revert to using you for ongoing development.
Alternatively if he picks it up well, then you will have a good working relationship with a competent and trained professional who fully understands your preferred coding practices, and who you happen to know is still on a rock-bottom contract that he agreed when he had no experience or training. Simply higher him away and grow your consulting business.
The guy who invented the Oculus started out by giving simple instructions to build your own:
http://projects.ict.usc.edu/mxr/open-source/fov2go/
A smart phone and some 35mm slide 3D glasses gives you a very compelling experience.
This really is superb. Has a really nice Android client as well as the web interface.
"May your future be limited only by your dreams." -- Christa McAuliffe