As one person commented when the last version of this went around, the sound card hardware or driver would have to have something like a TCP/IP stack built in to the microphone input. In other words, the only way a computer would be vulnerable is if it already has an ultrasonic communication feature installed. The only way I can see this happening is possibly at the behest of a certain agency which has a history of covertly installing security vulnerabilities, but they would probably just put it in the WiFi.
I only read through the summary at https://medium.com/the-physics... but it seems like he is implicitly assuming that the universe is (or is equivalent to) a simulation running on a classical computer.
Have the servers record all trading requests for the last 1000ms in encrypted form, then do all the trades at once. There are almost no real-world economic factors (ie sales, storms, new patents, employees hired/fired, etc.) that happen even this fast, so the only people who would complain are those who make money specifically from high speed trading games.
Maybe I just don't know enough about how law works in this area, but it seems like everyone now knows that "@N" is stolen. What can the hacker do except post "hey, I'm the anonymous person who stole this account"? Is it legal to buy a stolen Twitter account? Can't he just contact the company and get it back? If regular identity theft worked this way then you'd get police saying "sorry sir, but he has your name, SS, and DOB, so he can now use your identity in any way he wants"
I agree that mathematicians may become imprinted on standard deviation and forget that it is only used because it is easier to work with than average absolute deviation (ex: the derivative of x^2 is continuous, unlike abs(x)), and that less technically inclined readers might not realize there is a difference. However, they ARE usually pretty close (I don't have a reference, but I once ran a simulation comparing the 2 using random data with a Gaussian distribution and the curves matched exactly), and its harder to find exact solutions with average absolute deviation. On the other hand, it wouldn't hurt to use "MAD" occasionally on a data set to make sure that the standard deviation gives results that are meaningful as a measure of "deviation".
Haven't done this myself, but you can evidently run Labview programs ("virtual instruments") on some FPGA chips. You'd have a good estimate (plus an actual digital circuit) if you translated your code to labview (I believe the actual language is called "G") and found a copy of the add-on which turns this into verilog. -- Dustin
There was an article posted on either slashdot or boingboing which linked to the following: http://events.ccc.de/congress/2011/Fahrplan/attachments/2022_11-ccc-qcombbdbg.pdf Summary: the (usually) proprietary firmware on the chip that controls real-time functions such as wireless communication (which requires so many different standards to be adhered to that it ends up being a real mess and rarely rewritten) is surprisingly easy to hack. I believe there was a quote that you could get remote code execution after sending it a string of less than 100 bytes. It also mentioned that the chip with the main OS is often a slave to the one with the RTOS. Just curious if anyone knows if CyanogenMod accounts for this particular type of security vulnerability.
Exponential population growth is still happening regardless of lifespans, and genetic evolution will continue as soon as someone figures out how to use something like a retrovirus to make changes to an adult's DNA. I suspect that one of the main psychological reasons for resistance to life extension technology is the fear that you will be expected to stay alive after you are bored with life. Dustin p.s. and there is always the attachment to traditional personality traits/programs which are generally optimized to give short-term competitive advantage at the expense of safety and long term physical and mental health.
sorry about the anonymous comment of same name...didn't realize I wasn't logged in.
If you think about it, the reasons are pretty much the same. They probably would even have used cryogenic technology (possibly with a long-half-life nuclear battery) if it was available