not water proof. verified twice. can it be repaired? can it be upgraded? is it cost effective?
Upgrade to a new device?
not water proof. verified twice. can it be repaired? can it be upgraded? is it cost effective?
Upgrade to a new device?
“If you open a file, we may collect information about the file, the application used to open the file, and how long it takes any use [of]it for purposes such as improving performance, or [if you]enter text, we may collect typed characters, we may collect typed characters and use them for purposes such as improving auto-complete and spell check features.”
Microsoft is sending, at will, a cryptic event descriptor to their system, based on any event, user initiated or not.
device need to be airgapped?
I don’t need any version other than Windows 7. and I will never need to upgrade. By the time 7 is totally obsolete, the arguments of having access to certain Windows-only applications will no longer be valid.
By default, when signing into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers, for example “web browser history, favorites, and websites you have open” as well as “saved app, website, mobile hotspot, and Wi-Fi network names and passwords”.
Microsoft’s updated terms also state that they collect basic information “from you and your devices, including for example “app use data for apps that run on Windows” and “data about the networks you connect to.”
“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to”, for example, “protect their customers” or “enforce the terms governing the use of the services”.
“Personal data collected by Microsoft may be stored and processed in the United State or any other country wherein Microsoft, its subsidiaries or service providers are located.”
Cortana cannot be disabled without breaking Windows. Yes, you can turn all of the settings off, but the process still runs in the background and auto restarts when killed. I even went into the windows group policy settings and forbade Cortana, and it still ran as a process in the background. So, I tried to use powershell to remove it since it was installed as a “modern app”. I removed every trace of modern app, including the Windows store, rebooted, Cortana was still there, running the background, consuming 0%-0.1% cpu and using ~35MB of RAM. So, I found out where Cortana was on the file system, killed the process, and renamed the folder, so that it would not be found. And that did work, Cortana never restarted. The only problem was Windows Update stopped working! Yes, not being able to start Cortana prevents Windows 10 from installing updates. I had to run sfc (which fixed Cortana) to install updates, and now the Cortana process is back. Also, when I renamed the Cortana install folder, the search feature of the start menu stopped working completely (no type to search). Magically started working once Cortana was back. I can’t believe how deep this thing has its tentacles into the OS, it really is disturbing.
Software can no longer trust the memory, storage nor network. Thus to protect itself one needs to operate counter to spying host and intercept systems.
To run Windows 10, one would need to provision VHD for it, to boot as VHD or to run virtualized. While running a kernel debugger needs to be attached. The host debugger would need to be able to power cycle the Windows 10 at any point.
Context Aware Artificial Intelligence
a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.
This allows them to track you very accurately.
This allows them to index any “unauthorized” content, and build a dossier on you that can be used in conjunction with their tracking data to stuff almost anyone in jail when needed.
recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.
- Almost all of the websites run by companies involved in the PRISM programme do not use PFS.
A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.
If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.
Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.
When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.
Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:
Request to resolver1.opendns.com timed-out
Request to google-public-dns-a.google.com timed-out
can’t find enclosedworld.com: Server failed
Most Internet users typically don’t have much control over the path their Internet data travels. That can prove problematic because routers in certain parts of the world will modify data passing through and effectively censor the content.
Yikes. meet prisoner mastermind Ulbrihct.
Oh. Except. It is not just a movie.
There is a Very Important message a motive that people all people need to Watch. The government Subliminally Brainwashes people with The Power of the Television Movies Shows etc. So We Decided to do the same to beat them at there own game.
Are your processing units fast enough to do 8K yet? Can Samsung Galaxy play 8K yet? 2032?
What about 5K?
You can grow a small business into a bigger business, as long as you aren’t funded by people who are expecting to make a quick buck.
for the record I think venture capital is ”to be honest” for weak entrepreneurs.
VCs, and they tell me the same thing over and over again: DON’T RAISE VENTURE CAPITAL!
it is the most expensive and explosive money you can raise
VC believe in preferred shares and liquidation preferences.
VCs have no problem shutting down your company.
the truth is the human mind”no matter how brilliant”is limited to being able to juggle 7 +/- 2 items in short term memory.
However, when you are in the first two or three years of your business you should focus on one thing: building value
… watch a movie in the passenger seat of a car, any time the car changes direction the whole world inside VR rotates around you.
one could use a secondary compass?
To make this work, she and her colleagues constructed a camera sensitive enough to pick up those few scattering photons. It is built from a 32 by 32 grid of detectors that log the time a photon arrives at them with incredible precision, equivalent to snapping around 20 billion frames a second.
Render a panoramic VR image for Otoy’s ‘Render the Metaverse’ contest and you could win up to $35,000 in cash:… http://fb.me/7dpgVJhDq
You can see the Render The Metaverse entries here without GearVR: http://render.otoy.com/vr_gallery.php
3M-54 Klub launch platform?
When they come for you, They will know how to handle you because they already practiced on Americans via the homeless everyone forgot about. And when they come for you, it will be under the guise of fighting terror, and they will strip America away piece by piece and no one will speak up, they will fill the detention centers and there will be no judge, no rule of law, no ethics, just a computer program making decisions based upon input variables and neighbors thinking they are better than you because it was YOU that got taken away and there was a reason . . . . . until they get taken away . . . . . and all I can say is do not go down without a fight even if you think you are the only one fighting.
The FBI is going to be setting up command and control centers around the country SPECIFICALLY FOR THE 4TH OF JULY to “handle a terror attack” And the kicker? After the 4th of July, these so called “holiday weekend command and control centers” will remain in place PERMANENTLY.
Sktriker Units. Network Centric Warfare
mapping the minds of people alive
Human Terrain Analysis
JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. JADE “learns” from results of previous executed scenarios. In other words, it re-writes it’s own program on the fly.
The generic population, at this point, is not qualified to understand, handle nor mitigate such an immediate threat of the asymmetric military AI.
The persons delivering the JADE fully autonomous robots, skynet, are building a new form of enemy. Once such new enemy is operational, no human can help those persons, as they are too weak to conceptually understand the variables linked to the situation.
Generates anwsers to questions not asked yet
Review from 2015.08.12
The big break through for me with Wearality is the high quality experience without all of the usual HMD setup friction. I have been using Oculus for over a year but constantly find myself fiddling with the cables and the motion tracking and even occasionally have to check drivers when using on a new machine. With Wearality I get a high quality experience that I can share with people on planes, in restaurants or anywhere
Sense feedback by directed and shaped ultrasound.
Audio hints to get the player gaze at the wanted direction
PS. WordPress your new editor sucks! I like the old editor.
Look what I found. Asynchronous content loader based on the count of cameras on the target.
An app to manage ideas, papers, time, negotiations, contacts, contracts, accounts and companies.
One can start by exploring all his business contacts. Such contacts relationships to each other shall be visualized.
All nodes are interactive, can be activated by gaze or other input devices.
How many coffes do you have with them?
How often are you calling them?
How often are you emailing them?
Whats the tenor of the communications?
This app will allow one to visualize and manage his company all in VR. The app is connected to other data sources and devices in local WiFi.
An app could pop into field of view if the local WiFi UDP broadcast can pick it up. First we could keep it as an icon. Then load the app into invisible iframe and postMessage about the environment it can live within. First step towards interactive thought forms.
The scoped app will want to query interfaces, see if the host is talking the same language.
while it’s a great feat to control your cursor with your head, it actually gets a bit annoying over time and I would prefer to control the pointer with a different device.
a 360 turning chair is an ultimate must for the 360 VR experience. One piece of hardware I’ll predict is an augmentation device for regular office chairs that controls their rotation
They could have at least made the GearVR a hub and allow another usb entry to charge a connected device.
I really like that the original image is shown on screen as well. You feel so lost guiding somebody else when you don’t see what they’re seeing. It’s like helping your mom browsing a website over the phone
With the GearVR you can sit in a rotating chair and really go 360.
The default demo app has a keyboard full of toggles built in. I love that. It allows you to demonstrate certain features, like low FPS, wire frames, latency, etc. While purely interesting for engineering or development reasons, I really dig that sort of thing.
What about VR DNS manager and janusVR?
new ways to create the things we imagine
Because when you change the way you see the world
you can change the world you see
The PN66T module is designed for mobile devices like smartphones and wearables and enables converged deployment of a broad set of transaction related applications such as mobile payment, access control, transit, and authentication.
The module combines a highly secure Smart MX2 element (P61), Near Field Communications (NFC) radio, operating system and trust provisioning. To accelerate the deployment and meet the increased demands around mobile transactions, PN66T features a loader service, which enables service providers to easily deliver new applications by significantly simplifying the value chain of deploying credentials to devices.
Windows 10’s forced automatic updates don’t simply cover security patches, they cover anything and everything Microsoft wants to put on your PC as part of Windows 10. This can range from new software and services to changes to core features and functionality.
HDMI secondary display not detected?
go to “second screen” and then while plugging in the hdmi cable at the same time with the mouse choose the connection you want, either duplicate, second screen only, extend or pc screen only.
Apparently the connection is recognized when you click on a choice WHILE plugging in the hdmi cable.
Windows 7 SDK Visual C++ Compiler will not install for Windows 8.
Can we log into a drone Eagle with our Oclus Rift to fly and explore the earth yet?
I wonder, now that we have async/await available for Web Workers, how would it compare to WebCL. The performance gain running your physics on GPU needs to overweigh the pain of writing and debugging WebCL kernel code. This will likely not happen before 2018 as it has already taken 4 years for WebGL to reach this far. Cant find it in blink source either.
The future for GPU compute in Firefox is ARB_compute_shader, which is now part of ES 3.1.
… a distributed system that can move seamlessly between servers, borrowing techniques from other industries where latency is key the way that mobile phones stay connected even when users move between cell towers.
… “You don’t have to worry about scaling if someone tweets a link to your game and 30,000 people pile in,” says Narula.
Now, the difference is, the server will be your phone running on a 3G data connection.
… to allow for live development, so the system world is always on and developers can continually push content and improvements to it
This memo describes how to use Adobe’s Secure Real-Time Media Flow
Protocol (RTMFP) to transport the video, audio, and data messages of
Adobe Flash platform communications. Aspects of this application
profile include cryptographic methods and data formats, flow metadata
formats, and protocol details for client-server and peer-to-peer
[…] your metadata, chained contacts and content will be stored for 15 years