Comment Re:Why (Score 1) 348
I don't see anything wrong with old school redirects though.
Well, they only work for http, for one thing.
I don't see anything wrong with old school redirects though.
Well, they only work for http, for one thing.
why not just buy ready-made radio chips from people with the fabs to make them and do all the R&D on them?
Gee, I wonder why not. Maybe because they're already doing it.
I guess you don't mind if someone kills you now then.
The vast majority of CO2 emissions from cars come from driving them, not manufacturing them.
See for instance page 4 of this report:
http://www.pacinst.org/topics/integrity_of_science/case_studies/hummer_vs_prius.pdf
Thats a great example
It also seems like a complete fabrication.
"Uzvekia" returns 4 google hits, "Uzvekia Waterloo" only returning this post.
You have simply moved the combustion for energy from your engine to the power plant down the street.
That's already a big deal. The plant down the street is way more efficient than a car.
The only true answer to our car emissions problem is hydrogen fuel.
Ah, yes, because generating/storing hydrogen is soooo efficient.
> nothing in the law forbids any of both cases, even if there is an exploit to the system in the second one.
Actually, there is a law:
http://en.wikipedia.org/wiki/Rule_against_perpetuities
Are you saying that a FC SAN will give you fewer IOps than this DIMM SSD?
He's talking about latency, not throughput.
So... Everyone should be unhappy so that individuals should be happy?
That's a lot higher than your piece of pie
In fact, that's a lot lower.
1mL is about 1g (true for water, nearly true for alcohol)
So, to have about 4mL of alcohol, you'd need about 10L of orange juice.
BTW, here's your corrected link:
http://www.sweetpoison.com/articles/dr-woodrow-monte10.html
I suggest you read up on cryptography.
Encryption, in general, is attempting exactly what you're attempting: make plaintext look random.
What you're trying to defend against is known as a "known-plaintext attack".
You can use any standard cryptographic approach such as AES-CBC as suggested above.
For a password-based approach, there are also standard key generation algorithms such as PKCS #5.
Note that your claim that your approach gives "as random as it gets" data is not true; once you've fixed for all time a set of random numbers, they're no longer "random".
As for generating random-like numbers deterministically, that's what stream ciphers (e.g. RC4) do.
This is about as believable as the post about DuPont.
Hemp is still being cultivated commercially. It hasn't revolutionized anything.
non-UTF8 in filenames
UTF8 can represent all of Unicode.
I'm not aware of any non-unicode characters.
Turing B into He seems like fission, not fusion. Is that what a fusor does?
Also, you seem to write that the reaction generates energy. If that's the case, you don't "need" gigawatts, you produce them (from that particular reaction anyway)
Well, POSIX requires CHAR_BIT to be 8, so if you change that it's normal if it breaks.
But otherwise to test portability this seems interesting, although it would be most interesting if it could detect when something isn't done right.
Most importantly though, you'd need a compiler to target this architecture.
For instance, NULL being 0 is usually not part of the computer architecture itself; 0 is addressable on x86, causing this bug:
http://lwn.net/Articles/341773/
HELP!!!! I'm being held prisoner in /usr/games/lib!