Most of the current sea ice is less than 10 years old is suspiciously in need of references.
Slashdot videos: Now with more Slashdot!
That's not funny, that's $ick...
Accountants LOVE the idea that every coin you spend is traceable.
A BitCoin like crypto currency is likely in the offing as a supplement to cash and bank transactions
Backed by the full faith and credit of the US it is likely to be one of MANY co-existing currencies. (Just like we have now! [on paper.])
And definitely less than I spend in beer when I go out. Don't be so cheap that you're left behind... Buy it!
That it stupid, short sighed and unworkable. You can't un-see goat.se.
Instead, make them SHARE and just learn what you can.
We will have different uses for the data, but its just data, that WE unknowingly paid for.
The last time that happened we got Google Maps. The time before we got the internet.
As things stand, I doubt that the NK is that advanced. It doesn't need to be. There were NO COMPUTERS when the first A-Bomb was dropped or when V2s flew.
The purpose of an atomic bomb atop a rocket is to get near enough to a target and detonate.
It does not need any sophistication to do so,
it just needs enough propellant, a crude guidance system (like a cheap GPS [use existing infrastructure,] some actuators for targeting and detonation,) air bursting at height seems to generate a big blast.
Fuggedaboudid. If it wasn't made by Apple, it is NOT running OS X. Apple doesn't care what YOU think or need. Apple cares about what THEY need, which is your cash. (I don't blame them. Its like being able to drop a Ford engine block into a chevy chassis. Its not happening unless you're really willing to do it, by hand, by yourself, without any support from either company.)
Macs are mostly there for people to build applications for the Apple ecosystem, which is primarily iOS anyway.
Charles H. Moore wrote it and extended it to be able to compile directly into silicon.
Forth is actually a TIL [Threaded Interpretive Language] but it is so easily extensible that it is possible to implement all the way to the gates.
Moore was working with Forth to do exactly that last I heard.
Actually, when they become advanced enough, we won't need to work anymore.
I'll buy TWO. One to do my job and one
Insects depend on high-frequency sound to attract mates.
I'd hate to find my windshield suddenly covered with horny (or angry) bugs while driving, in the rain, on a dark road, on my way to the ditch, picking up a few unwanted, unexpected pedestrians, who were waiting for a bus...
Its about time. What really pisses me off about the NSA isn't that its just a warmed over version of Pointdexter's TIA (Total Information Awareness) but the secrecy.
Forget about privacy. That toothpaste been squeezed out of the tube for years.
WE'RE paying for all of this in all the ways possible and we're not seeing any benefits.
Because its all supposed to be a big secret.
SCREW the NSA's sense of entitlement to OUR data.
I fail to see the difficulty, or the divide, since hardware is a question of petrifying some software to enhance the operation of certain algorithms.
I remember reading articles several years ago by Chuck Moore about what he was doing to control a silicon foundry to produce chips which would hard wire some algorithms in silicon while leaving the rest as software implementations in Forth.
TILs (Threaded Interpreted Languages) lend themselves very well to this.
The level of interpretation, and the repetition of interpiling, depends on what you define and cache as interpreted code. That is only one step away from petrifying it in silicon.
"when asked politely by my national security adviser and cabinet secretary to destroy the files they had, they went ahead and destroyed those files"
They knew they didn't have the only copy so they figured "WTF It's the only way we're going to get out of this basement so, screw it, we can always pick up a spare copy at our destination."
The security adviser should have told the cabinet secretary about the reach of the internet, but he didn't bother. LOL
"some entity other than their owners" but what if YOU own and enforce it.
"Publish" all of your data to a backup drive, apply DRM to "secure it*" and issue take downs to any intruder (like the NSA) to force them to remove it or face litigation and hassles from the sheriff.
All you need to do is have a warning page/file at the lowest lever on the backup drive and then encrypt your backup.
*) "Secure it" can be as flimsy as the original DVD DRM. The point is to insure the protection of the law, however unwilling the law might be to provide it.
I've got one. Its pretty good too. Specially for the $70 or $80 that it cost me.
There's no story here. There's no research project either.