Forgot your password?

Comment: Re:Not to detract from our roots... (Score 1) 107

by bluefoxlucid (#47449737) Attached to: How To Fix The Shortage of K-5 Scholastic Chess Facilitators

There are two main types of chess games. In one, someone manages to checkmate while there are still a lot of pieces on the board. You seem to only be familiar with this type of game. It's possible to prioritize for that over holding onto pieces, with strategies like "gambits" taking that idea back to the opening move.

Yes, this is how minor skirmishes in Go work. The difference is in the way your play comes out.

In Chess, the capture of a piece or the loss of a piece means something. Being in a specific square at a specific time means something. You are trying to establish a tactical advantage for the moment, so that you can move further toward your tactical goal of capturing the king.

In Go, fights work the same way. The sacrifice of a piece, or the capture of a piece, or of a group, or the solidification of a group, the push into a certain area, a cut to separate two groups, these mean something. They may make the difference between life and death of your stones.

When all that is done, in Go, you have a position which may make an outward-facing wall, or may have blocked off some territory. You might let yourself get closed in, giving your opponent enclosure of an area worth a point or two, but immediately facing his already-strong group, and thus unable to influence the game. Or, if that area is open, you might run out some, sacrificing points and potential strength for the chance to destroy your opponent's influence or prospects for more points. You may let a small group die simply because this will give you an extra move, allowing you to take control of the game and begin wearing down your opponent before he can shore up some obvious weaknesses. You may play outward to create a wall, giving your opponent points but gaining influence so that you can later capitalize on this strength.

Imagine if you could lose one chess game by winning another, or by capturing the king with rook coming up the middle rather than the knight coming up the left side. Imagine, still, if the individual games didn't matter; you win or lose by the whole of your effort, combined, and in full arrangement. And imagine you do all these things in parallel, and have to consider how they affect each other.

Welcome to Go.

Comment: Re:Slow CPU, crippled network, too little RAM (Score 1) 130

by AmiMoJo (#47449619) Attached to: New Raspberry Pi Model B+

A 5v regulator, the 7805, costs about 50 cents a piece even when you buy them in very small quantities.

The problem is not going down to 5V, it's the problem of getting up. Three AA alkaline or NiMH cells will get you around a 3.6 - 4V working range. Lithium is 3.6-3.9V depending on exact chemistry. Therefore you need a boost circuit, and boost circuits waste power. It's not an insurmountable problem, but the wasted energy is not insignificant compare to what the RPi itself, using a tickless low power kernel, consumes.

Take a look at people running an RPi on solar power to see what I mean.

Comment: Re:So this means... (Score 1) 142

by jellomizer (#47449539) Attached to: Economist: File Sharing's Impact On Movies Is Modest At Most

That argument probably isn't so true.
If you really wanted to see it, and there wasn't a black market channel to get it, you will probably go to other methods, Renting the DVD form the library, or buying it in the store. However a lot of the stuff you watch you probably won't take the extra step, because the movies are convenient that means you are watching more of them.

Comment: Re:Any cell phone is a security risk. (Score 2) 79

by AmiMoJo (#47449537) Attached to: Apple Refutes Report On iPhone Threat To China's National Security

The Chinese security services are not as bad as the NSA. They freely admit that they monitor everything happening on their networks as they have no reason to hide it. In fact they are proud as it shows they are protecting their people.

There is a genuine security concern with any American products now, thanks to the NSA. Don't try to divert people by saying everyone else is as bad or making excuses. The NSA is harming US companies and US citizens through its actions, and other countries are right to treat it as a major security threat.

Comment: Re:Any cell phone is a security risk. (Score 3, Interesting) 79

Protectionism isn't something the G8 generally likes and has come under fire lately. Based on some things i've seen lately, I believe China (and perhaps india) have been spanked for their usual nonsense.

So maybe those people are now trying a different approach, rather than the normal protectionism that chinese companies engage in (using only their own suppliers, designing out foreign chips, bringing all mfg and design work to them so that they can control the supply chain), they're trying to hide behind FUD.

Comment: Re:noone trusts their cya legalese (Score 1) 79

by AmiMoJo (#47449499) Attached to: Apple Refutes Report On iPhone Threat To China's National Security

it taps the connections between their datacenters and it gets the data in transit


There really is nothing that Apple can say to convince foreign users that their data is safe.

How can it be safe when the NSA is intercepting it? Some companies have said they are now encrypting data as it flows between datacentres, but we don't know how competent they are at doing it or if the NSA has some work-around. The bottom line is that any data stored in the USA has to be assumed to be compromised.

It's not just Apple, all US companies have this problem. It's hard to see how they can ever recover now.

Comment: The point is that not all states have such a law (Score 1) 434

by tepples (#47449477) Attached to: The First Person Ever To Die In a Tesla Is a Guy Who Stole One

there isn't one


then probably the only "legal" way to cross is to dismount (become a pedestrian) and walk across

Yet the city somehow can't spend money for a "CYCLISTS DISMOUNT" sign.

the 35 states that haven't passed dead red laws

Also, I think there is a law for dealing with lights that are not functioning properly which probably says treat it like a stop sign.

The source implies that only about 15 U.S. states have such a law about malfunctioning traffic signals.

Comment: Re:Bitcoin requires cellular data (Score 1) 573

by tepples (#47449431) Attached to: Predicting a Future Free of Dollar Bills

phones with a data plan are too expensive per month for a child to afford on his allowance.

And will remain so for all eternity?

It will remain so as long as FCC policy allows U.S. cellular carriers to keep it so. I can't say that will be eternity, but with the polarization of the electorate that has led to a do-nothing Congress for the past three and a half years, I don't see it changing in the near future. Or what other country's "dollar" is being discussed?

I thought we were discussing predictions of the future.

That depends on whether "future" refers to a decade or a century.

Comment: Re:Someone is lying. (Score 2) 79

Curious in that Apple iPhone was the only piece of gear that could be relied upon to be cracked. Any model.

If it was so easy, why does it take physical access to break into one, and why does Law Enforcement have a huge waiting list at Apple to break into them? (And only partial success, at that)?

If they can be reliably cracked, then there is no need to send the phone back to Apple for extraction of data - they could just extract it right then and there, no Apple involvement at all. Because Apple makes it highly inconvenient to get at it, after all.

Of course, if you're talking about jailbreaking, well, that's not utterly reliable, either (few existed for iOS6, and iOS7 has some by questionable Chinese places seeking to make money selling pirated apps). Of course, it also helps there is massive interest in cracking it - I mean, with so many devices out there, there is an army of people who will want to break into it.

But all the jailbreaks tended to require actual access to the device - if it was locked in any way you couldn't do it - no longer can you just create a hacked IPSW and flash it in.

A large number of installed systems work by fiat. That is, they work by being declared to work. -- Anatol Holt