Some people work fast and think about a problem even when "off work", and some people sit in front the computer all day long. This hole project is misguided and I would never give out a contract to somebody who measures his work this way.
Just my $0.02
That might be so. Zuckerberg may also have written an email where he talk about eating babies alive. Unless Ceglia has a signed contract he is standing on thin ice.
Not that I am fan of FaceBook.
This reminds of car chasing scenes in American movies I watched as a kid, where folks would force their car to its limits... and a closeup of the speedometer would show the needle laboring somewhere between 90 and 100 mph. We always had a good laugh from that.
If a game is multiplayer only, I usually avoid it.
Furthermore sometimes it seems companies just want to avoid the cost and effort to develop a good AI and then sell this as a feature.
I know there are always black sheep, but a basic trust relationship between management and the employees is very important and better for the morale.
If security is an issue, some security awareness training may be money better spent.
The liquid sensor is right to go off, as it should since many electronic gadgets/laptops were destroyed this way.
It seems to me the US is quick to access other countries' data, but it far less willing to provide equal access to internal data as well.
Hence this would either level the playing ground or put a stop to US demands.
> You can tell ZFS to do full byte comparisons rather than relying on the hash if you want full security against hash duplicates:
I once did similar a project with web content caching that replaced some data with a hash of said data with a way to get to the actual data. All sorts of people were worried about hash conflicts, etc. People are always worried about collisions.
It took a lot of convincing that that risk is lower than a nuclear strike on the data center(s).
What finally did convince my team mates was that 2^256 (~10^77) is by some estimates is close to the number of elementary particles in the visible universe (without a few orders of magnitudes at least).
So assuming the hash function is good (there's no evidence to prove otherwise), we'd have to try almost as many inputs as there are particles in the universe. The chances of hitting duplicates are so astronomically small that doing byte comparisons is most certainly useless, and just check mark feature for those types who worry about these things. AFAIK there are no known SHA256 duplicates.
Existing information is replicated or copied nothing more and nothing less.
That may not be legal by current law, and there might be an "opportunity loss" for the content owner, but that is not "piracy" nor is it "stealing".
"Illegal content replication" just doesn't sound as snazzy and dirty as "piracy".
It does not even help! One can put any questionable content on a memory stick and mail it across countries. If the content is encrypted one doesn't even have to worry about it being intercepted. If it is intercepted, just send another one.
In fact that is probably what I am going to do with private photographs/movies from now on (my parents and I live in different countries). The border agents then can nose around on my laptop all the want, without invading my private life. The point is that I should not have to do that.
Any terrorist actually caught during a border search is likely too stupid to carry out said terrorist act anyway.
Every program is a part of some other program, and rarely fits.