When we are eating more chocolate than there is produced, is it because someone invested in futures, is it because its not really chocolate, or is it just really old chocolate?
Indeed, AI is a positively abused term. I wonder if they will manage to construct an AI that
can determine if some research is really AI or just statistics on some specific subject.
With a move towards renewable energy without sufficient energy storage will simply mean that the
backup energy suppliers will be mostly idle. Such idleness is costly, and it should reflect in the
energy price they can charge. So the political headache is telling the consumers, that on that
on that still, cloudy winters day, their energy price is 100 times the ordinary.
It may still be a good idea, but it require change.
My guess is that they're all researching exactly that already..
Why would they not?
Things that adds to viralness;
* Play on hate, fear or pride.
* Supports the underdog.
* Neglect truth for clarity.
* Funny or awsome
* Contains baby,cat or fluffy animal.
Then how do they know its precise?
I'm not sure slamming each others companies with ddos attacks would be good.
But it would be appropriate if someone could infect their forced "firewall"
software to ddos their own internal surveillance structure to smoldering bits.
I find it an odd chain of logic, that because the Russian netizens are a diverse bunch, then it excludes that
a crime syndicate with ties to persons in the Russian government are involved in some specific incident of hacking.
Both can easily be true at once.
Or perhaps the sensationalist non-peer reviewed paper making wild claim about the nature of the universe will wilt under scrutiny?
Indeed, let his peers have a few months to comment too.
Make a key that is so large that it would be expected to break only if
you use every atom in the observable universe for computation for as
along as the expected age of the sun to crack it.
Sure that would be breakable, but it would not matter in the real wold.
Someone leaks sensitive information to the media. Government tracks phone. Government dispatches goon. Government bricks phone to prevent victim from alerting the medial, recording the incident, calling for help, etc. Victim is disappeared.
Or, like it is now;
Someone leaks sensitive information to the media. Government tracks phone. Government dispatches goon. Government orders phone company to prevent phone from working to prevent victim from alerting the media, recording the incident, calling for help, etc. Victim is disappeared.
I don't see any difference.
Im sure such a simple game could be done in html5
I wish they would call it Potential Unwanted and Harmful Application (PUHA) which is the danish word for 'poo'.
Can I have a glass of formaldehyde and eyeballs next to my computer i can use if i want to change my password?
Well, then instead of Russian (hackers?) breaking in and stealing passwords, they will steal the
biometric data that is matched against in the database, and then they can spoof that....
It may be less useful as a 'cracklib' though.