Comment Re:Must be controlled with a keyboard... (Score 1) 874
Then why aren't most people playing FPSs with a keyboard?
Then why aren't most people playing FPSs with a keyboard?
Considering that one of the things it seems the article's computer *can't* do is handle a slashdotting without crashing and going up in flames, I would hardly consider linking to them being a reward.
I love that someone used that "going up in flames after being Slashdotted" cliche on an article about things computers don't actually do.
You might not have had happen but I have. A proxy server whose RAID controller quite literally caught fire, fortunately it didn't burn for long or hot, just enough to char the inside a little - the server room suppression system didn't get set off...
All I remember from the first film was that one of the octets in an IP address was in the 300s. Boy did that ruin an otherwise spot-on movie.
Yep - a blog elsewhere says "75.748.86.91" and "23.75.345.200" were used.
IPV4.5?
Thats would have been purposely done to prevent people deciding to attack a real IP belonging to someone out there after seeing it in the film, something along the lines of the 555-xxxx phone numbers they usually use. Of course they could have just used a 10.../192.168.../172.16.. address instead.
The problem is that theora potentially infringes on patents that are tied to mpeg. So theora is a clean, patent free solution.
Can I be the first to say "huh?". I think the logic is back to front there...
I thought this article was about supermarkets, where it might be a good idea anyway too..
We could always just compress the carbon into diamonds, that would lock it out of the atmosphere for quite some time. Of course De Beers wouldn't be too happy about the glut of diamonds that would produce....
Now that "the network is the computer", it is not enough to emulate just the local machine... much of what a computer does relies on interaction with a network that will be radically different in just a few years. E.g. how will all those DRM encumbered videos and tunes authenticate?
Simple: take a snapshot of environment that the authentication requires, and then emulate that in perpetuity.
Sounds simple... so why aren't pirates currently doing just that?
Pretty much what I came here to say.
This will rapidly drive natural selection towards unattractiveness being a survival trait..
It may depend in the jurisdiction but it generally works like this:
They send out a form letter to the owner of the car to sign and pay which is basically an admission of guilt which they expect the vast majority of people to just pay and be done with it.
It also allows the nomination of a different person as the driver, who would then get that form letter themselves.
I can a niche for a new website, a barcode anonymizer.
Feed it in the barcode, it decodes it, strips any identifying information and spits out a new valid barcode.
Of course your mileage may vary if the existence of whatever is used to track is part of the validation....
Agreed, noone starts programming w/o ever seeing someone elses code.
I suspect Ada Lovelace may disagree with you on that one.
- Protecting your shuttle
I'm not sure what that section would be doing in an Apollo 13 manual even if it was printed today...
Could you please define 'Level 9 visitor'? It just sounds like something that doesn't cover everyone....
The original submission had tags referring to that episode but the editors have apparently removed it.
Also why am I not surprised someone with 'Anubis' in their username is making the above post?
Lawrence Radiation Laboratory keeps all its data in an old gray trunk.