Google Play isn't above offering free stuff in exchange for credit card info either."
To get the best performance out of solar, you still need batteries to save power for when the sun isn't up. Assuming you have sufficient batteries, you should *still* point the collectors southwards, to gain the greatest total amount of power.
The GNOME project is seeking donations to help them in a legal battle against these trademark applications, and to get Groupon to stop using their name. They are seeking at least $80,000 to challenge a first set of ten trademark applications from Groupon, out of 28 applications that have been filed."
For $99 you can't expect much more than a toy, but I'm wondering how well it'd work for real-world use. 1GB is low, but you're swapping to a SSD, not a magnetic disk; if the swapping were intelligent enough, it might be workable. A friend wondered about "handling a bunch of tabs" in a browser; has anyone tried this?
Then there are longevity issues; doing a lot of swapping to a SSD will tend to kill its life span. Still, for $99, would you be okay with having to replace it after 3 years or so?"
You know, there was a recent book by John Ringo that blamed the noise of weapons being discharged while fighting an incursion of Old Ones on methane gas explosions. You don't suppose... ?
"To a man with a hammer, everything looks like a nail."
I'd like a very *simple* smart watch...
* Simple caller-ID and memo display, programmable shortcut buttons, nothing else.
* Very long charge life comparatively (2 weeks would be okay) and/or very easy charging (put it on a charging pad).
Obviously, God siphoned off the excess energy.
"Scientists Accidentally Grow Full Head of Hair On Bald Man"
The result was unintended, though interesting.
Near as I can tell, this is equivalent to a system which stores the hashes in an encrypted form, except the encryption relies on the passwords of other users rather than an administrator's password. This may IMO make this system less secure, depending on how public the interface is; an attacker could sign up with multiple accounts on the system before grabbing a copy of the encrypted hashes. They would then have a set of passwords which could be used to validate additional ones.
They must have been confusing it with the name of the virus that causes AIDS.