it's not about the CPUs it's about the conversion back to analog:
as an example. The higher precision you go (from 8 bit up to 32 bit) the higher the cost.
I'm thinking of WWII- where all material went to the war effort and extremely strict rationing was in effect.
AGW, if it is true, is far worse of an emergency than beating the axis. Why aren't the very people who are trying to convince us that it exists acting like it?
Yep. Violent philosophies are still philosophies. And yes, just about every rational train of thought, and quite a few irrational ones, are philosophies as well.
The scientific method can't be proved by the scientific method, and thus it is a philosophy.
it is encrypted, but knowing AOL the key is prefixed to the message with trivial encoding.
*if* you didn't already use those services.
I found that my kids and I almost never watched broadcast TV, but we used Netflix (and Amazon Prime to a much lesser extent) more than TV. It was so bad that we lost the remote control and no one cared. so I turned it all of, data only. Totally worth it. The only real difference is now when a series I really like hits one of the streaming services I don't get enough sleep because I binge, rather than DVR and watching (roughly) when it was broadcast.
While I can respect your points, I *have* to disagree with you.
What she did was not putting the company's interest first. What she did ensured that there would be a security *and* PR nightmare. Things like this never stay buried, they always come out eventually. That she denied a PWD reset because of being afraid people would leave is inexcusable.
Can you provide links?
Seriously, I (and I suspect many others) have a decent idea of the *concept* of quantum computers, but understanding actual application is... elusive.
Claims that it is it's own thing, disregards the concept of what a Philosophy *is*.
The scientific method is a philosophical argument in and of itself. All axioms are. Thus, because the scientific method is a philosophical argument, science is a philosophy.
The solution is pretty simple, but often skipped:
1) The reason for every search should be required and logged by the searcher.
2) The logs be randomly spot-checked by an auditor(s) who verifies the reasons given by interviewing the person(s) who searched.
But to check it the auditors need detailed access to the records. So who audits THEM?
This kind of question has been asked repeatedly since at least the Roman Empire.
(The U.S. answer to "Who guards the guardians?" , at least for direct abuse of person under color of law, is the Fourth and Fifth amendments and the "fruit of the poisoned tree" doctrine: Fail to follow the law and you don't get a conviction, because misbehaving police are FAR more of a problem for the population than even a lot of violent private-enterprise crooks going back to work. But while it does reduce the incentive, it doesn't block the behavior.)
Not one organization I have ever worked for has seriously cared about IT security.
When it comes to rolling out new products, ignoring security is the norm.
This is because the "window of opportunity" is only "open" for a short time - until the first, second, and maybe third movers go through it and grab most of the potential customers. Companies that spent the time to get the security right arrive at the window after it closes.
This happens anywhere the customers don't test for and reject non-secure versions of the "new shiny" - which means enterprises sometimes hold suppliers' feet to the fire (if the new thing doesn't give them an advantage commensurate with, or perceived as outweighing, the risk) but consumer stuff goes out wide open.
Then, if you're lucky and the supplier is clueful, they retrofit SOME security before the bad guys exploit enough holes to kill them.
I expect this will continue until several big-name tech companies get an effective corporate death penalty in response to the damages their customer base took from their security failings. Then the financial types will start including having a good, and improving with time, security story (no doubt called "best practices") among their check boxes for funding.
Recent research has tended to show that the Abominable No-Man is being replaced by the Prohibitive Procrastinator. -- C.N. Parkinson