|The hardware failed, it’s unrecoverable. They did testing and it’s no longer fixable from the ground.
Allard Beutel, as quoted in Hubble Space Telescope Suffers Serious Failure
|To really solve these VoIP problem, Wi-Fi systems must be able to constantly choose transmission paths between the AP and voice device that deliver the strongest signal, fewest delays and lowest packet error rates, while simultaneously attenuating any interference or noise.
David Callisch, Minding the VoIP…
Wi-Fi Multimedia (WMM) is four traffic queues (voice, video, data and background) that are shared among all users. The problem is if one VoFi device is lost (for whatever reason) the AP typically retransmits to that device before servicing other devices. The solution is to have a wireless LAN system that uses a per-client, per-traffic class QoS scheme so every client and traffic flow is fairly serviced.
|IPTV is a system where video content is transmitted in the form of IP-data packages over a closed secure network. The infrastructure is configured such that viewers can only receive the IPTV provider’s own TV-channels. IPTV focuses primarily on the TV-set in the living room, generally a wide-screen TV with high image quality. A Set Top Box (STP) is required to receive the signal.
Rob van den Dam, IPTV AND INTERNET TV DEVELOPMENT – Let the TV-battle begin
|Fittingly, the NEOSSat project was announced just a few days before the 100th anniversary of the Tunguska event, when a meteorite blasted into the Earth’s atmosphere over a Siberian forest, scorching and knocking down millions of trees over 2,000 square kilometres.
Dawn Walton, A Canadian gadget that may save the world
|When you enable Mail Goggles, it will check that you’re really sure you want to send that late night Friday email. And what better way to check than by making you solve a few simple math problems after you click send to verify you’re in the right state of mind?
Jon Perlow, New in Labs: Stop sending mail you later regret
|The bad news is that with clickjacking, any computer with a microphone and/or a web camera attached can be invisibly coaxed into being a remote surveillance device.
Jeremiah Grossman, Clickjacking: Web pages can see and hear you
[kml_flashembed movie="http://www.youtube.com/v/6_X04XwrUY8" width="425" height="350" wmode="transparent" /]
|Another dimension PaaS vendors should think about is who is the target user of the platform. The typical choices are programmers versus so-called business users (non-programmers). Bungee, Google App Engine and 10gen are all clearly targeting programmers. Ning, on the other hand, allows people without any code-writing skills to quickly create their own social network.
Geva Perry, Thoughts on Platform-as-a-Service
|If WiMax is the hippie, grass-roots parents on “Family Ties,” LTE is closer to Alex P. Keaton.|
This is a great quote. If you’re confused about all the mobile acronyms, Gizmodo has put together a good list.
|Mathematicians at UCLA have discovered a 13 million-digit prime number, a long-sought milestone that makes them eligible for a $100,000 prize given out by the Electronic Frontier Foundation. The group found the 46th known Mersenne prime last month on a network of 75 computers running Windows XP. The number was then verified by a different computer system.
Nuno Morgadinho, New Prime Number Discovered
What’s the big deal about finding very large prime numbers? Encryption.
RSA encryption is based on prime numbers — two prime numbers multiplied together. The original two prime numbers are known as your ‘private key’. When you multiply them together, the product (a number that’s only divisible by one, itself and those two prime numbers) is called the ‘public key’.