What does it matter?
The doll makes great kindling either way.
39 publicly visible posts • joined 11 Oct 2011
Even cheap Joint Direct Attack Munition (JDAM) strap on kits that turn dumb bombs into "smart bombs" contain BOTH an integrated inertial guidance system (an INS) coupled to a Global Positioning System (GPS) receiver specifically to deal with GPS spoofing & jamming. And that's 20th Century technology. These drones are 21st Century technology.
The whole GPS spoofing thing is Iranian disinformation, just as the initial claim of shooting it down was, or the Iranians constantly releasing Photoshoped photos of their weapons tests. GPS Spoofing is irrelevant, even if is can be done. These drones all contain Inertial Navigation Systems (INS) specifically to tell how reliable the GPS is, and they can navigate entirely on INS.
First of all, these systems don't rely entirely on GPS. They also have an Inertial Navigation System (INS) . INS's cannot be jammed, as they rely on nothing external to the aircraft to deduce location. While INS's are subject to what is called "integration drift" which means the uncertainty in it's location (according to the INS) increases with time, even after 24 hours of operation the uncertainty is enough for the drone to navigate back to base using INS. The INS can tell the unit if the GPS is being spoofed even if someone manages to spoof it, as the GPS location will differ from the INS location, and it's programming should give priority to the INS. These drones, if they lose the Command & Control link for a certain period of time, are programmed to return to base, and spoofing the GPS signal would not stop it from navigating its way back to base using the INS. One would presume that by the time it got back to base via INS, it would be out of GPS jamming range anyway. The fact that this drone did not fly back to base, assuming it did lose the C&C link, implies something malfunctioned.
"It’s not clear what caused the ADIRU to shift into failure mode, as this is only the third time that it has happened in over 128 million hours of operation – although one of those other incidents was down to the same ADIRU in that aircraft."
Take that specific ADIRU out of the aircraft!!
Apple gets a quick ruling on an insignificant bogus patent that never should have been issued in no time, whereas the Chinese drive the entire US Solar Cell market out of existence through the use of illegal government subsidies, with the U.S. International Trade Commission figuring they "might get around to looking into that" around 2025.
I do a lot of numerical simulations, which can benefit from things like whether the machine has a GPU in it, how much RAM (to a point), etc. I find there's only one benchmark worth anything, namely, put one of my own simulations on the test machine, run it, and see if I like the performance in comparison to my existing hardware. Primitive, but what do I care about how well anyone else's stuff runs?
Every NAS device I've used was basically a UNIX box, and could have it's firmware completely replaced by another (unsigned or easily forged signature) OS. One example (amongst many) is replacing the D-Link DNS-323's firmware with "Alt F" firmware ( http://code.google.com/p/alt-f/ ).
The point being that NAS devices are, due to their larger processing power and the fact that they are the network storage, larger potential problems for this type of embedded spying.
The problem with these types of academic exercises is that they make a very risky assumption at their very beginning, namely that we'd recognize an "alien" artifact if we came across one. That's like assuming a chimp would recognize a USB flash drive as a storage device for information. The chimp "culture" doesn't even contain the concept of "information", much less have the ability to progress down the road towards recognizing the USB flash drive as being unnatural, a storage device, nor any concept even one iota down the path towards reading one. And that example does not even start along the more complex path that a very logical mode for "alien artifact" propagation would be to have the artifact be biological (maybe even all life on this planet) so that the "artifacts" are self propagating.
Obviously, most of the posters don't understand how stock options work. If the board grants you 100,000 options with a vesting date that starts today with Apple closing at, say, $400, that means that what is called the "strike price" is $400 per share. That means when you have vested in those shares and you want to exercise them (convert them to actual stock), YOU PAY $40M to Apple. For those options to be of any value to you, the market price needs to be ABOVE $400 per share. So suppose they vest in a year, and at that point the stock is worth $300 per share. Then those options are worthless and you'd ignore them. But suppose at that point the stock is worth $500 per share? Then, if you want to exercise them, you do what is called a "cashless transaction" where Apple takes those 100,000 shares, sells them for $500 per share ($50M), pays for the options ($40M), and gives you the net ($10M). The IRS makes you pay Capital Gains taxes on that net $10M. So no, these guys are not being handed $40M-$60M. They are being handed an incentive to work to increase the value of the stock for the benefit of all shareholders. So in this example, if the stock price goes up from $400 per share, they can make money. If the stock price drops below $400 per share, then they don't.
The reason thermoelectric generators are not used except is very specialized applications is because even using best metamaterials known, for fundamental thermodynamical reasons, the efficiency is poor and always will be. Typically about 20% of what can be extracted using other (better) Carnot systems. Using magnetic tunnel junctions does not change this.
Is the stupidity of using the internet for sensitive Command, Control, Communications, and Intelligence (C3I) functions for military and infrastructure C3 (e.g. power plants). What the US should do is create a network physically separate from the internet for their military C3I, and a another network physically separate from the internet for their infrastructure C3.
Of course, Jobs over looks the fact that just about everything Apple did was, by the definition he applies to others, "stolen". The fact is that Jobs took what others did first, and refined it into his products to produce things that were even better.