top HP Unveils Industrial 3D Printer 10X Faster, 50% Cheaper Than Current Systems
That would be fantastic. However, the link appears to be created by file:///Users/lucasmearian/, and
Lucas Mearian works at ComputerWorld, not HP.
top Extracting Audio From Visual Information
30 Hz is
far below the Nyquist rate (6800 Hz, going by POTS specs), so no, that wouldn't be possible without some fundamental changes in our understanding of information theory and physics.
top Psychology's Replication Battle
So history and political science are useless, and should stop being taught in schools?
Empirical knowledge isn't the only useful knowledge.
top Wikipedia Mining Algorithm Reveals the Most Influential People In History
Wikipedia is very slanted towards
recent and Eurocentric events.
Yes, this is somewhat explainable in terms of how much literature has been produced over time, and how much literature is accessible online. Wikipedia isn't the problem here, the problem is that the authors didn't acknowledge this issue, let alone attempt to account for it in their computation. (though it's a long paper, so I might have missed where it was discussed)
top Disney Algorithm Builds High-Res 3D Models From Ordinary Photos
3D scanning is really important. Whenever we figure out how to do it faster/cheaper/easier, that's important. 3D scanning is useful for all kinds of future activities, from the maker movement (3D printer + 3D scanner = 3D copier), to gaming (eg. Kinect), to driving (eg. DARPA Grand Challenge), to mobile devices (eg. Google Glasses).
about a year and a half ago
top In a Security Test, 3-D Printed Gun Smuggled Into Israeli Parliament
whose idea was it to use metal detectors as gun detectors? Time & technology change... and detection methods must change with them.
If non-metallic guns were truly viable, they would have been used 20 years ago to sneak past metal detectors and kill judges and politicians and airplane pilots. Plastic manufacturing has been around for a long time, the only thing 3D printers do is reduce the cost. There are well-funded spy agencies and a few individuals who would have paid hundreds of thousands of dollars for a single gun. And yet none has materialized:
   about a year and a half ago
top In Praise of Hackerspaces
I can only speak to how
my local hackerspace handles it, I don't know how others do.
At this one, most power tools are owned by individual members. If someone gets hurt and wants to sue someone, the only person they can sue is the individual owner. On one hand, this sucks because it puts all the burden on individuals' shoulders. On the other hand, it decreases the chance that someone tries to pay legal fees from prospective damage awards, because damages are likely to be very small, so it reduces the chance someone will lawyer up.
Our hackerspace hasn't had any incidents yet, so I don't know how well this plays out in practice.
about a year and a half ago
top Student Expelled From Montreal College For Finding "Sloppy Coding"
Shooting the messenger does nothing to solve the underlying problem. Thanks to the fourth estate and the Streisand effect, shooting the messenger is likely to get you
more attention, not less.
top DARPA Wants Wireless Devices That Can Blast Through the Noise
The goal is to
"engineer software-based radios that transmit data faster than a competitor using identical hardware".
The goal isn't to develop fancy new hardware, or to use an overwhelming amount of power. The goal is to develop fancy new software.
With frequency-hopping and
time-hopping techniques, if you can intelligently adapt to the local interference, and transmit in the time and frequency gaps where the interference doesn't occur, then you can transmit more data for the same amount of power. That's the goal.
top ElcomSoft Tool Cracks BitLocker, PGP, TrueCrypt In Real-Time
This tool extracts the keys from RAM dumps. There are
free tools that do this too, of course.
But isn't it difficult to get a RAM dump, you say? Not really:
Hibernating a computer writes this data to disk. Starting in Windows 8, "shutdown" actually writes some hibernate data by default. VMs also have their own suspend functionality that does a RAM dump, as well as non-SAN VM migration. Firewire ports actually allow devices to scan RAM of the machine they're connected to. Obviously, if you have access to a live machine, you can get the keys directly from RAM.
top 100km/h Sailboat Sets Speed Record
Interesting fact — There's an
85% fatality rate for the speed record for any boat. This sport is extremely dangerous.
The sailing speed record is 80% slower than the overall boat record, so the sailing record is a little safer. Nonetheless, one of the SailRocket crashes led to the pilot having a
top Running Netflix On Linux
Netflix runs fine on ChromeOS on x86, which is Linux-based too.
top Yet Another "People Plug In Strange USB Sticks" Story
The Teensy is a little too wide, and has the wrong USB connector, to fit in a flash-drive shell.
Here is a list of others that DO fit within a flash-drive shell. Ones that definitely fit include:
AVR-Stick, by Reusch Elektronik
top US Warns of Problems In Chinese SCADA Software
"DCS is commonly used to handle operations on a single locale, while SCADA is preferred for applications that are
spread over a wide geographic location."
The term "SCADA" is specifically used for industrial processes that have to be connected by long-distance networking.
top Upscaling Retro 8-Bit Pixel Art To Vector Graphics
PDF mirror is here
top VMware Causes Second Outage While Recovering From First
If I saw a Madagascar button in a datacenter with a sign on it that said "DO NOT PRESS THIS! It will SHUT DOWN EVERYTHING!", I would probably remove that key from the keyboard.
top Predator Outdoes Kinect At Object Recognition
It may not really be open source. The author says it's
available under the GPLv3. But the author also says something completely contradictory:
top Using XSS & Google To Find Physical Location
Wrong, wrong. A default password means you ARE vulnerable. It's such a problem that ISPs are willing to do questionable things to fix it.
(it's a slight variant of your #2, though "compromising" in this case doesn't mean a full compromise, it means mildly abusing the DNS spec to work around XSS restrictions)
top Chernobyl Area Survey Finds Lasting Problems For Wildlife
This isn't a chicken-and-egg problem. Scavengers existed before humans evolved.
top A New Take On the Fermi Paradox
If you're at all intellectually honest, you'll have to admit that there's a rather substantial difference between HIV/AIDS and religion.
Only a matter of degree. Compare it to the common cold instead. For most people, it drains their energy that could be used elsewhere, but they otherwise live fine. In its most virulent form, it does kill a few people (inter-religious violence, anti-medicine beliefs, etc).
interiot hasn't submitted any stories.
interiot has no journal entries.