VnutZ's Articles, Page 10 of 82
There’s no real doubt that diesel engines are far and away the most efficient powerplant to put into vehicles. For instance, simply dropping a 4BT into a Jeep Wrangler doubled its fuel economy. In fact, most manufacturers do make diesel variants of US vehicles for the rest of the world – Wranglers (30mpg), Mini Coopers (60mpg), HiLux (25mpg), and even entire swaths of the Ford product line have export only, diesel variants.
What is holding back these engines such that everyone else can enjoy diesel fuel economy? According to Toyota’s Chief Engineer, the United States’ self-imposed LEV III standard adds $3000 of emissions equipment per vehicle that simply isn’t worth the investment for only the United States. This is, according to Toyota, why there will not be a diesel powered Tacoma in 2016 as rumors had led enthusiasts to believe. A similar comment was once fed back by Mini Cooper engineers, that the added hardware required for DEF was too big for the little car’s already packed space. Other manufacturers were on course to produce American diesels but stopped (like the Jeep Liberty) in 2007 when these laws were passed. Now, diesel can generally be obtained only in the higher end models of a product where the company assumes a consumer is already spending big money.
Genetic Algorithms, “are a way of solving problems by mimicking the same processes mother nature uses. They use the same combination of selection, recombination and mutation to evolve a solution to a problem.” They’ve often been used in software but have largely not been applied to hardware. Enter Dr. Adrian Thompson and some 100 cell FPGAs. He created an experiment where a computer would analyze the evolution of an FPGA configuration over time until it could reliably differentiate between two tones (and later two voice commands). After nearly 4000 evolutions, Dr. Thompson’s creation demonstrated a peculiar quirk of the process – unexplainable hardware nuances themselves became part of the design. For instance, the final candidate included some logical loops that were never actually part of the circuit – but removing them results in the chip’s failure. More so, putting the same configuration onto another chip resulted in failure. The algorithm literally adapted to magnetic flux, a “gray area” between transistor ON/OFF states, and other performance quirks of its native FPGA host in order to fulfill its task.
American Sniper is currently raking in money across theaters and has touched many nerves with the public. For the most part, the movie is very well received in its honoring of Navy SEAL Chris Kyle, its visual accuracy of the OIF experience, and its portrayal of the family strife veterans face at home. On the other hand, the movie has also stirred a lot of controversy with various talking heads blasting at snipers as cowards or the SEAL himself as a sociopathic killer. American Sniper has definitely become a culturally dividing movie, though one that is still highly regarded cinematically no matter which camp a viewer falls into.
Fellow OmniNerds – looking for advice with regards to properly helping young children (age 4) handle divorce. At what age do they “get it” with regards to what happened? Should they get therapy? What are some pros/cons to different scheduling methods? What are some of the toughest questions children will ask?
To help our generic readers, the comments could certainly pertain to both full custody and split custody situations.
Recently, the CIA acknowledged their U2 flights accounted for nearly half of the UFO sightings across two decades. The other record of UFOs resides at the National Archives in Project BLUE BOOK. It used to require an in-person journey to DC in order to conduct any research. Now, the entire compendium of the Air Force’s documentation on UFOs is available to the masses on-line. Of course, my encounter’s with UFOs are not documented there – clearly the sign of either a government conspiracy or the pending Great Purge via alien overlords.
YouTube has changed some things up on their site and no longer offers the clickable “old style” HTML embeddable code for their videos. But you can still do it easily on OmniNerd for your news posts. As a quick example, we will embed the George Washington video clip by Brad Neely into this article.
The OmniNerd syntax for embedding a video is:
Now you can’t take the URL directly from the YouTube titlebar. All you need is its content ID and then insert it into the older code YouTube used to provide.
Usually you hear people talking about the zombie apocalypse in terms of what weapons would best be applied, etc. Not the Smithsonian. Those sons-of-bitches went big and sent the rest of us home. Zombies? They saw your Zombie and raised you dragons. Rifles? Again … chump weapons, how about an AH-64 Apache with Hellfire missiles and a 30mm chaingun. The bottom line is the dragon pretty much wins unless the Apache fires every single Hellfire at once.
The first Silk Road used to be the go to hub for all things dark and illegal lurking on the Internet – drugs, weapons, identities, etc. What was intriguing about it was the use of many technologies for anonymizing the participants such as Tor, Bitcoin, etc. But it was, of course, a target of the government and the whole thing came crashing down. Some attempts were made to resume its operation with Silk Road 2.0 but that effort did not make it very far.
Biometrics are becoming increasingly popular as security mechanisms – visa terminals, smartphones, etc. The premise, of course, is that certain characteristics of a person are globally unique and therefore serve as both an identifier and authenticator. Therein lies an access vector for thieves. For years, movies have depicted the easiest method for fingerprint defeating simply by cutting people’s fingers off. But now, hacker Jan Krissler, demonstrated the ability to clone fingerprints of famous people (a politician for his demo) using nothing but high resolution photographs available all over the Internet.
The CIA has certainly taken to enjoy using it’s Twitter account. Most recently, the clandestine agency tweeted about their most read documents of 2014 and highlighted one about their U2 program. Essentially, the CIA took credit for more than half the UFO sightings from the 1950s through the 1960s based on the aircraft’s ability to fly so much higher than anybody thought possible back in the day. Their basis for assuming they were the UFOs was made on correlating UFO reports against their log (previously classified) of U2 flight activity. Of course, the CIA’s revelation only accounts for half the UFOs, the rest are still unknown.
A vulnerability analyst developed a proof of concept for infecting OS X computers with a persistent rootkit simply by plugging in a Thunderbolt device. A customized Thunderbolt device can send unsigned firmware updates into the host machine that are accepted into the host’s Option ROM. Upon reboot, the rootkit begins execution before the OS even loads, allowing it to perform whatever nefarious functions it wants via hooks and patches on the loaded code before security software ever has a chance to see it. The technique is more dastardly version of existing techniques – exfiltrating/infiltrating data via FireWire DMA or the Dirty USB presented at 2014’s BlackHat.
Gamma Rays – everyone knows they turn normal people into superheroes. They are a form of radiation that are correlated to mutating active DNA sequences. It turns out, the elusive Gamma Ray is not so elusive after all and occurs naturally with a high daily frequency. NASA’s Fermi satellite reveals nearly 1100 Gamma Ray bursts daily from Earth’s lightning storms. So if you want to gain superpowers (or die), go hang out next to lightning strikes.
About a year ago, the price of a single BitCoin skyrocketed above $1200 apiece. I finally opted to get in on the action after having now missed the BitCoin boat for a fourth time. It began with getting myself a single 10GH/s miner and a little slice of cloud time as the days of CPU and GPU mining were long past. Although I eventually made it up to 120GH/s worth of Chili Miners, I never really kept any mining hardware longer than three months and continued to exchange it out on Craigslist to minimize monetary loss on equipment. I also dabbled in with the AltCoins [LiteCoin] and doing pooled exchanges which were possible with a home built GPU mining rig. All of this was quite entertaining at least to build the equipment, solve cooling, optimize hash rates, and plan a mining strategy. I eventually grew tired of the GPU fan noise and dumped that equipment before the summer time heat set in. At it’s peak, I was using nearly 2KW of power between the GPUs and the ASICs. In the end, I settled on trading GH/s as a derivative on CEX.io while using my “owned” speed for hashing.
The motivation behind the massive hack against Sony Pictures became more clear in the past few days. Seth Rogen’s and James Franco’s new film The Interview is at the heart of the attacks from North Korea for its portrayal of a comedic assassination attempt on Kim Jong-un. Following the cyber-attack were many messages posted to pastebin from the alleged hackers included one presumably threatening violence to movie-goers that simply stated, “We will clearly show it to you at the very time and places ‘The Interview’ be shown, including the premiere, how bitter fate those who seek fun in terror should be doomed to. Remember the 11th of September 2001.” At first, Sony pictures remained defensive but on Wednesday night the media giant caved to North Korea’s threats after five major chains dropped the movie.