Lots of 3D (fast) Fourier transforms
Again, interesting, we do a lot of this at work. Complex 3D FFT transforms. I write my plan and processing code using CUFFT. I'm curious as to whether they'd be using fully custom code for such a large computer. We're only using 8x Tesla cards at work.
They can tap it. They do tap it. They're building a nationwide infrastructure to capture all the IP header data at each point where it enters a telecommunications network. YES, THEY CAN DO THIS. THEY ALREADY HAVE DONE THIS. THEY DO THIS ALL THE TIME.
If you're paying to develop an ECCM anti-jamming algorithm, you are going to be working with systems that were built with jamproofing in mind in the first place. This is NOT the case with WIFI. With sophisticated modulation schemes, you have spatial and frequency multiplexing. As in, spread spectrum that actually works and may have tens of GHz of bandwidth and with 10 or 20 degrees of beamwidth. It's still jammable despite trying to keep it from being jammed by brute force or intelligence (read--someone gets the PN code), and these guys want to figure out at least how to automatically keep that from happening. This is going to involve a lot of data analysis because there are a lot of ways to jam a "stealthy" signal in the first place.
Link to Original Source
The C64's operating system is stored on ROM chips (which by definition can not be written to.)
How do you explain EEPROM or flash ROM? ROM is a narrow context.
EasyDNS Plugged WikiLeaks
EasyDNS falsely accused of unplugging WikiLeaks
Only time can tell, but I would guess the latter. Kind of like when my local paper misprints something and they apologize in a short posting in an unread section between two huge car ads...
Mr. Obama was elected and was immediately awarded with the Nobel Peace Prize before he had a chance to make any change. I wouldn't call him a warmonger, but we're still at odds with the Middle East, and he/we appear to have no plan in sight to change that.