At that point you should be considering battery swaps. Wasn't one of Tesla's early demos that their automated battery exchanger could replace batteries faster than a human could pump gas?
Obviously a problem if you drain the battery to get to the middle of nowhere (need those charging stations), but that's probably "the future".
That's pretty standard for all aviation training. Flying is easy, much easier than driving in a lot of ways. Not killing yourself is a lot harder. That's why pilots have reams and reams of checklists covering pretty much every conceivable problem that can happen. Similarly when training in a simulator, the operators can pretty much throw the book at you to see how you react to losing all your instruments and a wing while flying through a thunderstorm.
NASA's generic rulebook is over 2000 pages long and is well worth a flick through if you're a space geek http://www.jsc.nasa.gov/news/c...
It's risk analysis. Password managers are essentially making a bet that the risk of your hard drive being compromised is far less likely than a website being compromised. Most people can't remember more than 5 (strong) passwords at best and they get lazy and reuse them everywhere. Password managers let you eliminate password reuse so even if your Amazon account gets hacked, the attackers won't suddenly have the keys to the castle.
It is one place to attack, true, but how likely is it that someone targets your password database? I would argue it's pretty remote, even if your machine was compromised or stolen. Assuming your master password is strong, the attacker either needs to crack it (difficult) or know you well enough to guess it. What's far more likely is that the drive the database is on fails and you lose access to all your randomised passwords. However in that scenario, you might have printed backup keys for your email account (Gmail will let you do this) and no worries.
For the truly paranoid, good old wetware suffices or a pencil and paper; again, you're weighing the risk of your house (or mind) being broken into vs some script kiddies attacking a website.
Technical mumbo jumbo sauce (you are reading Slashdot, by the way) is exactly the reason that fingerprint scanning used for usernames on a specific system isn't a privacy concern, because the data are useless when taken out of context. Unless you take a full ink/digital copy of the fingerprint, the data collected by the system is worthless because you can't use it anywhere else. The other point is that your fingerprints should not be considered secret. They are trivial to steal simply by following you to a café and swiping your glass once you're finished, unless you insist on wearing latex gloves everywhere?
In terms of tracking, the issue is not so much "why are they tracking students", but whether biometric tracking offers a significant improvement over standard RFID cards without added risk of private data being leaked everywhere. The problem people seem to have here is that the food data is being linked to people (via census data) and then shared with the authorities. In this case they actually seem to be interested in tracking what kids eat in order to improve school meals.
Your argument boils down to: "I'm too lazy to consider how the system actually works, but it must be bad, right? Oh noes, the gubmint has the data too!"
Let's play devil's advocate here. I've given up my fingerprints to Japan upon entry as a tourist. I did the same for the USA. Oh well. Fingerprinting is so routine nowadays that anyone who travels internationally will fall foul of it eventually. Like it or not, sooner or later it'll happen to you. Does it have to be bad?
This sort of scheme has been done in the UK too, for secondary schools. The biometric systems replace ID cards which get lost, stolen and so on. There is another argument that biometrics hides who gets free school meals which prevents bullying. The key point here is that these systems do not record your fingerprint in the same way that law enforcement do. They take a temporary image, create something like a hash (it's not a hash, but it's a similar concept) from some characteristic features and then compare that to whatever is in the database. While that certainly identifies you and you're now explicitly linked to the food you bought, it's not something that could then be used to forge a national ID card. Is the 'hash' from this system interoperable with a competing system? Who knows, probably not. At most you could forge an input to that particular biometric system.
So they feed back this data to the government. What is the data? Is it a scan of the finger that would hold up in court? Or is it just some hash identifier, linked to the student's name and the food they bought. In which case the privacy risks are questionable, but the scheme is opt-in for now and the same issues would be there if a standard RFID card was used instead.
No, the building stays the same colour. Very simply, consider a particular feature on the building. The location of that feature will shift between adjacent pixels in the image if the building moves relative to the camera. When this happens the pixels change colour (e.g. a 'sky' pixel might now be a 'building' pixel).
The technique can be exploited for other things like blood flow, but in general things don't change colour as they move - unless they're travelling really fast
And I've noticed this a lot on recent submissions, tons of second or third hand sources that aren't terribly useful.
http://people.csail.mit.edu/mrub/vidmag/: Original source for Eulerian video magnification
I'm pretty sure any distributed solution is going to need to be connected to a computer. The computer is probably going to be much less than the board itself, those things are pricey.
Seems like this is exactly what the OP needs, although it's not clear if they all work at home which would make it a lot more expensive.
Put not your trust in money, but put your money in trust.