Comment Solving a problem that... (Score 0) 34
...doesn't exist.
...doesn't exist.
This is overly direct causality thinking and overlooks transitive benefits.
Older individuals often mentor, advise, and guide younger generations - supporting not just immediate reproduction, but higher-quality, more sustainable reproduction across generations. They can also shape longer-term thinking and more stable environments, which indirectly improve conditions for successful procreation.
By your logic, we might as well argue that "writing down accumulated knowledge in books doesn’t support optimal reproduction." But clearly, preserving and transmitting hard-earned wisdom gives later generations a significant head start.
There is a good reason that the human race is a social collective, and not just an ongoing pool of breeding meat.
In other news, California also proposes for Google to pay Amazon for any products that Google show in it's search results.
It's a shame they haven't adopted what3words (https://www.ted.com/talks/chris_sheldrick_a_precise_three_word_address_for_every_place_on_earth) instead - Easily rememberable addresses like "blocks.evenly.breed", vs "F26X+9F Gurugram" as a Plus Code.
How do you avoid information overload?
Make space in your life.
1. Stop reading the news. It's amazing how (1) information isn't really all that important, nor informative and (2) you tend to get to know important information by IRL socialising.
2. Deactivate your Facebook. Or at least, remove the bloody app from your phone and stop checking it every damn day.
3. Socialise with real people, in real life. Have meaningful conversations.
You could roll your own remote/Cloud backup with Duply/Duplicity and AWS S3. It will be a few dollars per month
Intuitive really doesn't exist in the computing world. It's all about familiarity.
How are you meant to know that moving the plastic thing with a wheel corresponds to moving pixels on a screen? Or caressing the touchpad on your laptop. You only know about the F/J keys because you were told (in some way).
The Mac and PC HIDs are sufficiently different enough that PC people really struggle with Mac keyboard/Mouse shortcuts and use (and vice-versa).
lynx.africa
People don't buy a phone to get Google Now or Siri, it's a convenient extra. People buy the Echo almost certainly for the voice control as that is it's main selling point. Numbers aside, 3x growth at that scale appears to indicate ongoing and growing demand.
The scanning part isn't the problem, it's everything else that is: The triplicate passport checks, the questions, the confused passengers, having to take off your belt, coats (and sometimes shoes), laptops, loading onto the belt... and the reverse after scanning - And that's just the inefficiency in the security line process.
Tesla took a huge risk by taking a completely new technology (battery-powered cars) and applying it in a completely new and untested way (performance car). They went into it knowing that they'd be taking a loss for the medium term.
If Tesla are already at taking only a $4k loss / 10% loss, they're doing extremely well:
- The "Supercharger" units that are being aggressively installed across many countries will be accounted for within this unit cost... It won't be long until they reach diminshing returns on their deployment, and the impact of this will tail off.
- They added a number of new product lines, all sinking huge money into R&D. They're close to establishing a range of products so the impact of this will tail off shortly.
Musk could easily choose to add $4k to the sale cost of each cars with minimal impact and result in a 0-dollar P/L, but increasing production count ensures far better long-term return by economies of scale improvements, as well as learning opportunities when scaling aggressively.
"There is, however, one large problem: What if a person mistypes a password? In that scenario, a fake vault is generated, and a user is locked out of his or her accounts."
This is the weak point - It forces the user, or the system, to generate an additional artifact to inform the user (but hopefully not the attacker) that the password safe is correctly unlocked.
"One possible fix is to create a hash of the master password that is linked to an image that is shown when the password is entered. The authorized user should recognize when the wrong image is displayed, but an attacker would not."
I'd expect this one image to be shown only when the master password is entered. i.e. it is an unique indicator. Fake images will need to be generated for all other passwords, and if there are duplicates then they can be eliminated as false-positives. Strategies like this will always be the weak point. It's commendable that they're attempting to fix the problem, lets just hope the additional complexity doesn't weaken the system overall.
That's fine, just be aware that Indispensable == Unpromotable.
The Gap Between What The US Public Thinks And What Scientists Know.
Thufir's a Harkonnen now.