Didn't the original scrolling intro always say "episode 4"?
It did when I saw the original theatrical release on opening day in1978. Seeing that go by, I thought they were showing a serial out of order by mistake.
They had to come up with something. Not nearly as many crosses around.
Not only that, but if the airlines are sharing more than e.g. the last 4 digits of the credit card info, they're probably in violation of PCI (Payment Card Industry) regs and could have their ability to take payments that way suspended.
That would be a lovely data stream for identity thieves to intercept.
This is a solution to a very special problem - one program with cryptographic code running in a VM, and a hostile program running in the same VM. There are some crypto algorithms which can be broken if you can submit keys to them, and watch how long they run or what cache misses they make. This is very tough to do in the real world.
It also comes up for crypto modules which do DRM for content owners. There, an attacker can watch the signals and interfere with the operation of the crypto unit to slowly extract its internal keys. That's a real threat to DRM systems.
This isn't for general purpose computing.
This sounds like something a music promotion company would do.
A 79-cent plastic water pistol filled with cyanide* is even more lethal, and just as easy to get past security.
Sure, the assassin will likely die from the cyanide too, but what are the odds of him surviving long with a one-shot gun anyway?
*(and sealed to prevent premature leakage; substitute other poison of your choice)
Extruder-based machines aren't a very good technology. The fundamental problem is that you're trying to weld a hot thing to a cold thing. Welding metals that way produces flawed joints, and soldering that way produces cold solder joints. Heating the build platform helps a little, but once you've built something of any height, the heater is too far from the action. Some of the machines have better temperature control of the build area than others, but they're all rather flaky. TechShop has tried four different brands, and they range from mediocre (Replicator2 ) to useless (the Up).
The UV polymerization machines seem to work quite well. The high-end machines produce consistent results and don't need to be watched while running. They're still slow, though. The Form1 printer may get there, if they ever really ship the thing in quantity. The ship date has slipped from April 2013 to October 2013, even though their Kickstarter funding was way oversubscribed. They also charge $149/liter for their custom resin. (I suspect that resin for 3D printers is going to be a similar racket as ink for inkjet printers. The stuff isn't inherently expensive; a slightly different formulation is routinely used for making printing plates, where it costs about a quarter of the price.)
"... an electric car is emission free, it's a lie, it's a big, big lie.
Fine. Let's do an experiment. Ulrich (or you) can lock himself up in a garage with the non-electric car of his choice, I'll do the same (different garage) with the electric car of my choice. Then we'll let the motors run for a couple of hours. Winner is whoever walks away afterwards.
Now, electric power production may not be emission free (depending on the source), but the car itself is (not counting trivial vapors from lubrication etc). Ulrich shouldn't lie.
Too bad the article doesn't list the URLs
Yea, shame. The article only lists a bunch of thingies that all start with: ws-cloud112-blur.svcmot.com:443/blur-services-1.0/ws/
Too bad that isn't a URL
Not reproductions of robots from famous works of fiction.
Not models of actual robots used in real life.
Not functional in any way.
This looks like something a young kid would build with some super glue and a box full of electrical fittings and cabinet hardware from Home Depot. What's next, bleach bottle pigs?
This was years ago. I think it was even on Slashdot.
SELinux isn't claimed to be secure. NSA's defensive side, the Central Security Service, created it because they wanted application developers to start writing applications that would run under a mandatory security system. Once all major applications could run under SELinux, it would be possible to swap out the Linux kernel for something smaller, with far less trusted code.
That didn't work out. Not enough applications were redesigned to run under the tight restrictions needed to make most of their code untrusted. A good example of commercial developer incompetence in this area is Matlab, which won't run with SELinux enabled. So Matlab's official instructions tell users to turn SELinux off. There is no justification for Matlab requiring security privileges.
There is also a new "backdoor" to SELinux in Linux installed recently to support a competing "security" package.
The hardest part of climbing the ladder of success is getting through the crowd at the bottom.