Comment Re: Misleading (Score 1) 266
Oh, I don't doubt that. I was just challenging the "just a hydrocarbon" fallacious generalization of that fact.
A lot more hydrocarbons are getting into water than just methane and natural gas.
Oh, I don't doubt that. I was just challenging the "just a hydrocarbon" fallacious generalization of that fact.
A lot more hydrocarbons are getting into water than just methane and natural gas.
Yeah, gasoline is "just a hydrocarbon." Drink up, buddy!
I bet you earned all of two cents for that post. Hope it was worth it.
"Now"???
"Then maintain a pointer in some so-called 'phase space' and burn data into a sparse array to create a virtual landscape with erosion. In 'run' mode it is almost always hitting (or near) areas that have been populated. If the pointer strays from from the populated region we have an alarm."
Could you please post a link to more information about these technologies and algorithms? I am very interested in graph analysis, including geolocation of information against a real or metaphorical landscape. I tried Googling but all I got was how to simulate erosion in a 3D image of a landscape.
Thanks
Using JavaScript, FB can tell if someone selects your public key that is posted on your profile. (Yes, IF you choose to post it as well as just let FB use it. However most people are very likely to do so.) Have you ever clicked in a field that said "Search," or whatnot, only to have those words disappear as soon as you clicked there? That is JavaScript doing that. It is just as easy to have said JavaScript save the current user and the page's user and store them in a database. FB can then use this database to build a directed graph of who is copying who's public key. Sure, it is an incomplete graph, but all social data is incomplete and useful information is still drawn from it. Sure, the NSA could do a deep packet scan of everyone's e-mail and dig out the same, or better, information. However, that is far, FAR more resource intensive and expensive than adding a field to FB's database and some more JavaScript to the profile page.
So, once FB has built their, admittedly incomplete, graph, the NSA can look for the clusters of interconnectedness in said graph and focus their deep packet scanning efforts and resources there. Thus making the NSAs efforts far more effective.
I guess, if you want to save the taxpayers some money, go ahead and post your public key to FB. If you really want to promote encryption, include your public key and links to free software and incredibly easy to follow instructions in all your emails to your non-techie friends and family. If said relatives are conservative nutjobs then you could also include a comment about how the socialist, terrorist-loving, Nigerian, Muslim, presidential imposter (read: black guy) is reading all their personal e-mails and building a list of where to send the black helicopters. I have many such relatives. Believe me, they still believe that crap.
If what you say is true, and I believe it is, then even having a patent does you no good if you aren't heavily financed.
Legally, you don't have to file a patent to prevent others from patenting things and then suing you. All you have to do is write up a description of your invention, as thorough as a patent, and publish it in any number of ways where the date of publication is verifiable. There are even services that will publish your article expressly for the purpose of establishing prior art. Remember, prior art does not need to be a patent. Dick Tracy's wrist TV was used as prior art at least once. Almost any public use of an invention is also enough to establish prior art. That is the main reason why inventors have to be careful not to let their invention be seen in public before filing. Your own invention can be considered prior art to invalidate the patent on that same invention.
Though, I do have to admit, in the current environment, having a patent goes a long way toward scaring off those trolls.
No, I am not a patent lawyer, but I have read a ton of patent law books over the years.
If only you had read between the lines of said summary, based on FB's past behavior. If you share your public key on your profile, I guarantee you that FB WILL keep track of everyone who downloads it.
The safest way to share your public key is to share it ubiquitously on your web page, in your e-mail signature, etcetera. Then no one can find out who is actually using it and who is ignoring it. (OK, other than deep scans of your traffic.)
Right, that's exactly what you want to be doing if you are interested in encrypted communication... Share the list of other people who want communicate with you via encryption. That way the most intentionally invasive service in the world can build a giant graph of everyone who communicates via encryption. Then the NSA will know who to focus their efforts on just by who has had the most people download their public key or who is at the center of the largest clusters of connectivity.
This could possibly be countered by having everyone download lots of random people's keys. But only if FB doesn't require you to be "friends" before you can exchange keys.
The best way to counter it is to let all the sheeple use it, to give the NSA something to play with, while the astute "encryptionistas" ignore it.
Develop a skill set and the self discipline to work 100% remotely. Then you can work for a company in an expensive city while living anywhere you want.
Sure, not all companies will hire 100% remote employees, but it opens up your job search to the entire world instead of just the companies within driving distance of your house. It also allows you to work on multiple contracts at the same time.
If you say a range, they start at the end of the range they like best and negotiate from there.
Never give a range.
If a work is "transforative" merely because it is displayed in a new context, thus giving it new meaning, then copying a $90k work and selling it for $90 to make a point about how much bullshit this whole "transformative" thing is is therefore also transformative, and thus should be allowed. If some random person was just selling cheap copies to make a quick buck, then this wouldn't apply. But, because it is the original owner of the image selling said transformations-twice-removed (or meta transformations), then fair use should apply.
I got out of networking because it is too high stress. All you do is put out fires all day. None of the network equipment I ever used actually did everything the vendor said. All of the software you will have to support is crap, and you can't rewrite it.
Networking is an entirely different skill set. Almost none of your current skills, other than management, will transfer. So that may be your best path. Go for a job as a CIO. You can manage big projects, help them avoid crappy software purchases, and not have to learn a thing about actual networking.
When was it ever not? This article just moved it up one notch from first post to the zeroth post.
I like your last idea. It comes off as less punitive and more about "freedom."
The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford