Robots are more about software than hardware. Though having smart hardware looks and feels good. Intel's success would be dependent on doing a good job on the software and making is user friendly.
Just wait till someone sends a bomb threat using your Wifi and you find police at your doorstep wanting to arrest you! The legal framework and the enlightened enforcement do not exist as yet for sharing your internet connection safely with strangers.
The is flight 370 - not 714...
My best guesses are
a) The pilot flew the plane at a very low altitude to a deserted island, where there is no mobile signal. Why? We will find out...
b) The pilot dropped the plane intact into the sea (and hence no debris). Why? No one knows...
I think we will find out in the next few days...
"The union says Amazon workers receive lower wages than others in retail and mail-order jobs"
"Amazon has defended its wage policies, saying that employees earn toward the upper end of the pay scale of logistics companies in Germany."
So who is right? Is Amazon avoiding paying overtime because they schedule worker shifts in an intelligent manner that does not require overtime (resulting in lower earnings per employee), or because they dont pay overtime even if people work overtime?
"The union says that by classifying its centers as "logistics" centers, Amazon can pay lower wages" - so what is the right definition - Can they be called "retail", or as "mail-order" jobs... can someone enlighten... based on facts...
There are so many nuances that just cannot be understood from a simple media article... Oh well... this is slashdot....
But what I'd rather have is that Amazon, and its workers and its worker councils and its unions sort the matter out in an amicable manner, than to inconvenience their paying customers, which can only result in something negative for all the parties involved.
The article does not state of all images would be cached automatically even if you have not read your mail. It only says that images would be served through a Google proxy server, which caches the images.
So if Google proxies and caches the images when you open the mail, there is no protection added from marketers, except for the fact that Google can scan the images for exploits.
And if Google proxies and caches the images as soon as the service receives the mail, marketers can verify if the address is a valid gmail address or not by just sending mails and waiting for Google to cache the image. Expect more spam if this is the case.
There will be true protection from email tracking only if Google caches the images in all emails it receives, even if the email address is invalid - and that would increase the load on Google servers quite a bit.
Such emulators have been around for long where one can use apps of one platform on another (Wine anyone). Whats the news here...? I can understand why someone would want to play an Android game or use some such app that is not available for the PC using this. But why would one want to run a browser inside Android when a perfectly good browser could be used directly from Windows. The novelty of it would wear away soon I guess.
BTW, Bluestacks runs Android apps on both Windows and Mac machines. WindowsAndroid can claim to be better than Bluestacks when they get their platform running on Mac *and* Linux too! Or perhaps when it can run Android on a Windows phone at native speeds (well, that would be an awesome one if it could be done).
Mod this up!
When something is burnt, energy is only being converted - from chemical energy to heat energy. Even when someone talks about the (supposed) nuclear reaction inside earth's core, the mass lost really is converted into heat which is spread on to the mantle and perhaps the atmosphere, but definitely not radiated away. This increased energy would add to an equal amount of mass as lost by the (supposed) nuclear reaction if calculated using E=MC^2. The quantity (E+M*C^2) is conserved in a closed system.
The only real increase to this would be the energy from the sun, which would be approx 173 petawatt, of which 30% is reflected out (Albedo). Given that 25million kilowatt-hour is a gram, this would only contribute to an increase of just 4.8tons.
Link to Original Source
The objective of the Working Group was to provide a set of guidelines to banks covering the entire gamut of electronic banking. This would serve as a common minimum standard for all banks to adopt as well as lay down the best practices for banks to adopt in a phased manner for a safer and sounder banking environment. The Group felt that there was a need for banks to follow a consistent approach in each focus area, to minimize differing interpretations.
The report covers various areas such as IT Governance, information security (including electronic banking channels like internet banking, ATMs, cards), IT operations, IT services outsourcing, Information System Audit, Cyber frauds, business continuity planning, customer education and legal issues.
The Group recognised that the recommendations are not “one-size-fits-all” and the implementation of these recommendations need to be based on the nature and scope of activities engaged by banks and the technology environment prevalent in the bank and the support rendered by technology to the business processes.
The Reserve Bank will begin implementing the recommendations of the Working Group shortly."
Link to Original Source
The "join" command in DOS could do this too... way back in the 90's...
Encryption is not going away. Any half good programmer can whip together a 3-DES or RSA routine together - why, many programming languages even have ready APIs for it.
Most governments go through this growing up phase with respect to encryption. Even US had export control norms for encryption software till they realised that directly controlling it is plain impossible (PGP was born outside the borders of the country due this very reason).
The Indian Law permits the Government to ask for the encryption key. Now, if someone asked for an encryption key to a SSL session, pray tell me how it can be retrieved... Some parts of the law are not very compatible with the technology that exists today. I do hope someone brings some sanity into this situation.
What India also needs to do is to have a due process to ask for encryption keys (warrant sounds fine to me), develop the ability to break encryption if the keys are not forthcoming (bruteforce the simple stuff - or get access to unencrypted material stored on the mail server), and importantly, learn who they should approach for the encryption keys (i.e, not the ISP).
Till the Government heeds solid technical advice on how to manage encryption, I am sure we will continue hearing such headlines.