Comment OMG, the web requires a 2sec workaround, RUINED! (Score 1, Informative) 141
My google image search works just fine. If you don't wanna get pinterest images you can try: "-site:pinterest.*"
My google image search works just fine. If you don't wanna get pinterest images you can try: "-site:pinterest.*"
It's a drawing, they "plan to build a prototype". Big drawings of big turbines have been done before and failed
That square design, how does that draw more energy than other shapes? I hope you know that the available energy depends on the area swept, not the amount of blades (or the amount of coverage).
Even taking such wild claims as 5x energy at face value, that thing looks like it has *much* more than 5x the number of moving parts compared "normal" turbines sweeping the same area. Unless they have magic parts, that means a lot more maintenance, which will suck the economy right out of it very quickly.
The real challenge in turbine design is balancing the 3 targets:
1. Minimize number of parts (and their reliability)
2. Maximize area swept
3. Minimize support structure required
That is why you see scaling of individual turbines to scale 2, but that scales "only" square with blade length, unfortunately 3. scales (roughly) cubed.
That is why you see scaling of parks, as that scale all 3 linearly, at the cost of something like n*log N scale in electrical support.
BTW: Vestas has a smaller scale test like this, with 4 rotors, i encourage you to go looking for the results of that experiment.
Excellent. But If anyone intercepts your IPFS URL's, then you are providing them with exact information on what content you are requesting. So trying this in an oppressed country might be a VERY bad mistake. You will absolutely need a privacy preserving layer!
The first problem with PKI is that it *exactly* prevents anonymity in the voting process (that is it's basic feature).
There are other, very nice, ways to tally votes that allows both total anonymity *and* securely counts the votes.
Don't throw PKI at things that are not about identity. That would be like throwing blockchain at transactions that you don't want to perform in public
There is a big difference between "may have an effect" and "being the reason".
If something is "the reason", it must dominate the other factors, so that they can basically be ignored (or close to that).
That is highly unlikely to be the case with Corona. You cannot pick a single region and interpret a temporal overlap of temperature-change with a reduction in infection-rate as evidence. Assume that the weather dominates, and explain Iran?
I don't see a fundamental difference. You don't need to fake the brain, only the transmitted "measurements".
My whole argument about biometrics security properties being tightly local is exactly the constraint needed to make an argument that you "would require compromising the target machine".
"The sensors would record the persons brain waves. Just as when registering a fingerprint for an iPhones Touch ID, multiple readings would be needed to collect a complete initial record. Our research has confirmed that a combination of pictures like this would evoke brain wave readings that are unique to a particular person, and consistent from one login attempt to another." -- TFA
This suggest that one would simply need such a "complete initial record" to pose as your brain. That would make sense as attackers and the "real" authenticator would then have the same information. You certainly don't want two different systems authenticating off the "complete initial record".
Maybe some difference in information can be maintained in a secrecy of the images show in the "real" scenario, but it should be quite hard make that difference remain. At least some of it would leek every time you authenticate.
For this to work, I think you would essentially need the brain to work as a cryptographic secure hash-function. Maybe it really does, but I think such a claim requires quite a bit more than "Our research has found that the new brain password would be very hard for attackers to figure out, even if they tried to use the old brainwave readings as an aid" and "demonstrated to provide 100% identification accuracy in a pool of 50 participants"
Biometrics cannot replace any secrets. They can, at best, be used to authenticate local presence in closed systems.
"Authentication" via remote biometric measurement carries absolutely no guarantee that actual bio was involved and thus does not have any valid security properties.
Such remote usage is *bad* both ways: An attacker can replay biometrics and a non-attacker cannot recover from biometric information copying,... ever!
Think about that every time you show your fingerprint to random scanners. You are effectively giving away your (lifetime) biometric to the scanner so it can simulate it to the authentication software. It could choose to store and forward to others and pretend that your finger is there at will. You are effectively trusting *every* scanner not to do this.
Nice angle on the story there
I would lean more towards a conclusion like: "Stores that experience low sales apparently place products on discount and there is individual price elasticity".
The figure on page 38 shows that "Avg. Profit relative to existing Products in the Category" has a strong bias against "products that flopped" already at *Week1* relative to "Products that survived". That is *right* away, there is a systematic bias that seems constant so if I were to look at data after that I would be *highly* suspicious about directions of causality.
In addition, most of the article is vast amounts of bread-text that seem to support circular reasoning.
Can anyone find a place where they actually come up a direction of causality?
Proving the direction of causality being *from* the "harbingers"-group picking loosers could be supported by
Note, Separating the two parts without interference may be hard
I sincerely hope this is a prank, even if it's apparently from a biology department.
Perhaps the security is adequate if that is the best plan.
Security is not about making absolutely sure, it's about:
1. Lowering likelyhood: Making it reasonably hard to break, so that the bad guys will go somehere else.
2. Spend wisely: Not spending more to defend that the likelyhood of loss times (value lost + value bad guys gain) (in general terms)
BTW:
a. Round up the likelyhood, the bad guys are better than you at getting ideas.
b. Destroy sensitive and remove generally valuable parts to reduce the bad guys value
c. The value lost is *not* the money spent on the lost property. Perhaps you wasted a small bit of effort making it? pehaps you can recreate new and better cheaper?
I think the value of the space-shuttle is mainly sentimental and image-loss on theft, so you should probably not spend more than a simple escort -- mainly to prevent traffic-problems.
Im guessing you have a diNovo edge? Run the following as root:
# fix hiddev to hidraw in BT rules and put it where updates dont overwrite
for x in
do sed -e 's/KERNEL=="hiddev/KERNEL="hidraw/' \
<"$x" >/etc/udev.d/rules.d/$(basename "$x");
done
# restart udev
service udev restart
It even work if "they" change the numbering again
"Open the pod bay doors, HAL." -- Dave Bowman, 2001