So, do they have a large insurance policy? If the re-orbit goes wrong and it smashes into other satellites or space debris, who is liable?
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
I'd have a glowing plant night-light as that's all I could see glowing plants useful for. Things like road-side markers, very low intensity lighting etc... I doubt you could use it for reading or finding your way around in the dark.
Mostly, though, they sowed chaos and confusion, accelerating the spread of inaccurate information and fingering innocent spectators as possible bombers. None of the “suspects” singled out by crowdsourced analysis as “suspicious” are believed to have played a role in the attack.
So how did authorities pick out the two bombers to begin with? That was accomplished, in no small part, with technology by the startup firm CrowdOptic (http://crowdoptic.com), a purveyor of what it describes as “focus-based services.”
CrowdOptic's software correlates geospatial and compass data from smart devices and combine that with photos and other metadata (i.e.photo EXIF information) associated with images. Built in analytics then use triangulation and other algorithms to identify “points of focus” in a crowd.
“Send me 100k images of the Super Bowl and in 1 second (of) server time I can send you the picture/s containing (for example) the halftime show wardrobe malfunction representing the most views,” CEO Jon Fisher told The Security Ledger back in October.
With the Boston bombings, CrowdOptic’s technology played a key role in helping authorities to sift through the photo evidence and metadata collected from the bombing scene. (http://technorati.com/technology/article/crowdsourcing-approach-leads-to-arrest-of/) In that situation, the bombs’ locations acted as a magnet for all other photos containing bomb location in the photographs of the area before and after the explosions. CrowdOptic’s technology was used to piece together that visual information and give investigators a time lapse not just of the scene, but of people who could have captured an image of the points of interest – even from some distance. That’s information that wouldn’t show up just by collecting geospatial data of those around the bombing site at the time of the blast. That, in turn, quickly revealed the figures of the alleged bombers: Dzhokhor A. Tsarnaev, 19 and his older brother, Tamerlan Tsarnaev, 26."
Link to Original Source
It's always been my standpoint that in order to be a competent EE, you need to have intermediate coding skills. Unfortunately it seems that most graduates pick one side or the other. An EE graduate with no SW skills is no better than a technologist and will have a pretty tough time finding work.
Low power and massive amounts of parallel cores is alright, but does it compute? How do these low power servers benchmark against EC2 or equivalent? This article didn't talk benchmarks. Maybe you get all these gains in consumed power, cost, space etc... because it is 90% less powerful than competitors.
"Japan's transport safety board said in a report that the battery for the aircraft's auxiliary power unit was incorrectly connected to the main battery that overheated.
According to Reuters Boeing sources claim to have a fix to their battery problems that involves increasing the space between the lithium-ion battery cells."
Which suggests that they don't know what the cause is. How does separating the cells fix an incorrect wiring problem?
I've made sure the phone number for the local data recovery services is taped to the side of the server.
What's the catch? Nothing really is free...
While not a OS GUI, RoboBOARD (I remember it being robo-bbs) was a revolutionary BBS GUI back in the day. Also dos shell was pretty sweet, but that's already been mentioned.
rm -rf /
from 2005... but whatever. it's old news
I'd say that in the case of Stuxnet, malice was the main objective...
did you forget your tinfoil hat this morning?
This is true... but you can minimize the damage and reduce avenues of attack with security updates
Can you provide a virus writing scenario without malicious intent?