Intel has been doing this for a long time. They know how to make money off of it.
Dice Holdings on the other hand only seems to know how to ignore their readers and create a "BETA" website that is flat out painful to read.
From viewing the diagram in the link, it appears that the ChipSiP is larger in both volume and mass. I'm not 100% sure that those specs should be considered "better."
I could build a frame to attach a laptop to the side of my head and blow away the ChipSiP specs out of the water but nobody would want to actually wear it.
For the portion of the population that has a habit of stabbing a screwdriver into their car body panels, this is not the car for them. I'd hazard to guess that very few people have that habit.
Velcroman1 writes "More than $1 billion worth of bitcoins now circulate on the web – an amount that exceeds the value of the entire currency stock of small countries like Liberia, Bhutan, and 18 other countries. Bitcoin is in high demand right now — each bitcoin currently sells for more than $90 U.S. — which bitcoin insiders say is because of world events that have shaken confidence in government-issued currencies. 'Because of what's going on in Cyprus and Europe, people are trying to pull their money out of banks there,' said Tony Gallippi, the CEO BitPay.com, which enables businesses to easily accept bitcoins as payment. 'So they buy gold, they put it under the mattress, or they buy bitcoin,' Gallippi said."
Well, here in the real world, we have DR plans based upon the suggestions of the trade journals and then we have the actual implementation of the DR plan based upon the budget cuts of the past X years. Guess which one includes multiple redundant datacenters in locations of a significant distance away from each other and which one doesn't include those datacenters.
Awesome, I'd love to see what they can do eventually turning this into a 3d map. 1mm^3 at nanometer resolution would be a huge data set though. The possibilities of seeing the processes interact from different POV would be very cool though. Throw full motion into the mix and you've got yourself a nice base to create a near perfect replica of life.
Simple answer, if "a guy like this" just took donations for his own personal gain, then he would not be "a guy like this" and would instead be an a-hole douchebag. As has been already stated, if you want to directly support him, buy his stuff.
I2 is meant for transmitting huge amounts of research data like black hole simulations between universities and other research institutions. GigU is meant to connect residential communities in the areas surrounding the member universities so they have access to fast broadband.
Posted
by
Roblimo
from the whatever-you-just-said-made-no-sense dept.
If you're working at home or from a coffee shop or, really, anyplace outside your company's offices, they need to hear you when you talk, and you need to hear them. The same goes for dealing with clients via VOIP or video, the two communications techologies that seem to be driving POTS into obsolescence faster than we thought possible just a few years ago. In this video, Plantronics PR person Karen Auby -- who works remotely most of the time herself -- explains how Plantronics products help make work easier in a world of "unified communications."
Putting classes online doesn't necessarily mean that the class is held online. I would have loved it if all of my classes had been archived online. It would free me to concentrate on what the professor was staying instead of concentrating on writing down notes as fast as possible. I could also go back to the lectures at a later time while studying for a test or even after I've finished the class and want to review a concept that is built upon in a class that follows.
If you're looking for something that won't have a direct cost to the school district to implement, take a look at Matterhorn ( http://opencast.org/matterhorn/ ).
Camtasia Relay by Techsmith is also a product built for this purpose.
Granted, it could be a simple ROT13 but the mere fact that the passwords were "encrypted" and that the data didn't contain the entire credit card number indicates that the company or somebody inside the company at least put a little bit of effort into securing the data. Unfortunately, securing data is hard and it only takes one oversight to make it vulnerable. The true test will be what the company does now that the breach has occurred.