I tried a few drawings just for fun. Success seemed to correlate with how photo-real the artist's style happened to be. But is this recognition? (Other than for male/female.)
I've got a early 2009 17" MBP just extensively serviced by Apple (new logic board, display, etc.), and I've noticed that when closed and I pick it up and put it down on a table, the apple logo glows for a moment and goes out. I'm convinced that this has something to do with the built in Sudden Motion Sensor that wakes up the computer. It seems to have started with Lion on my particular MBP.
They claim:
"Design and functional elements are additionally protected by patents, including European patent No 001742719, Russian Federation patent RU2010501345, and US patent (pending)."
I did a few minutes searching at the WIPO website because this really does seem like old art, and I was wondering if they simply did design patents. I could not find public documents on either the EP or Russian patents.
It's a US-centric graph, if I'm not mistaken. But it is interesting that WW2 doesn't trail effects. Although, there is a long-standing theory that WW1 and WW2 were just the same war.
Methinks Alkamie disguised a call of 'bullshit!' behind a sort of empty platitude such as "I find it interesting".
>It's a US-centric graph
The title is "Human cycles: History as science"
A US-centric graph that represents the cycles of humanity?
>cliodynamics
Do we need a fancy name for the phenomenon that aspects of history tend to repeat?
Yes, aspects of history tend to repeat, but there's no way to use that knowledge to determine periodicy, severity, when it will happen, if it will happen etc.
The point is that they don't -want- you to use pseudonyms. I don't know about the rest of you but I segregate the various presences in the aether. What I found most offensive is that they omitted the option of saying that you did not want to use your real name solely because you didn't -want- to use your real name.
No, I don't believe so. I could (or can and do) use my real name. I simply don't -want- to use my real name.
I dislike giving incorrect answers to questions. I did use that box when testing the new requirements for lack of a better fit. By so doing, I am allowing Youtube (Google) to misrepresent my reasons for declining to use my real name. I don't care for that.
As I said in my video response, Youtube (Google) can either acknowledge my desire for a certain level of anonymity when I interact with youtube, or I simply will move to Vimeo or another provider.
Like a lot of people, I'm kind of stuck on the gmail tar baby. It will be hard for me to step away from gmail. Youtube, on the other hand, is not something where I have built up a lot of utility. It could be that they simply have decided that Youtube will now focus on the 'professional' posters, and not worry so much about casual posters and users like myself. I believe that is a mistake because the people that make a buck (or think they might) on youtube start as casual users.
I have noticed that youtube seems to be paying a lot more attention to the commercial users than to the casual users. That is their choice, but I'd bet that there will be other folks that would be only too happy to focus on the hoi pilloy. (http://en.wikipedia.org/wiki/Hoi_polloi)
It almost seems like they are preparing YouTube for some TV displacement role they hope it will play in the future. It's not just funny cat videos anymore.. you can watch live concerts, rent movies, watch lectures or even broadcast your own content live via hangouts. I'm not sure where the real name initiative fits into here, though.
After looking at the screenshots of the carrier-side it seemed to me that the Carrier IQ system allows much more interaction/control from the carrier side. Pending patent applications sometimes can tell you a lot about where a company is heading.
Here are a couple of quotes from Carrier IQ's pending U.S. 20090207749 USER-INITIATED REPORTING OF MOBILE COMMUNICATION SYSTEM ERRORS:
"...This configuration enables the system 200 to dynamically generate and download to a population of wireless devices rule-based data collection profiles. Data collection profiles may be generated manually by a network administrator, a software developer or other personnel involved in the operation of the network (hereinafter referred to as "network administrators"), created offline as a portion of a data analysis solution, or automatically generated based on network parameters or other events. Profiles define what information is to be collected on the devices in response to which conditions and events, as well as the conditions and events that cause the device to upload the collected information.
[0038] Conditions or events include any occurrence in the network or on the device that the device can sense, such as a call dropping or a user pressing a button on the device. Conditions and events also include the passage of time, or a request from a network administrator that the device report information back to the server. Conditions and events which cause a device to collect information or upload the collected information may generally be referred to as "triggers." "
and:
"[0080] In the exemplary embodiment, triggers may be included in the data collection directives of a data collection profile, and their inclusion causes the client to initiate, abort, and terminate data collection activity as appropriate when the associated trigger condition is invoked by the wireless device 400. A trigger invocation that matches the initiating trigger causes data collection activity to begin. A match of the terminating trigger causes the data collection activity to end, and a metrics package is then prepared for uploading. An abort trigger causes data collection activity to cease, and a metrics package is not prepared or is not uploaded. In the example used earlier, launching an application caused the client to be invoked with an "application launched" trigger event, which is matched against triggers in downloaded profiles and causes data collection activity to begin on a user's device. The user's entering of a particular key sequence, pressing of a dedicated button, or selection of a particular menu option while the application is running would cause another trigger to be activated, and the SQC would match the event to a terminating trigger in the profile, cause data collection to stop and a metrics package to be prepared and uploaded. As can be seen, the inclusion of a trigger in a profile effectively selects the condition under which a specific action associated with that profile is to be executed. The trigger is not strictly within the profile, rather it associates specific profile actions (start, stop, abort) with a specific event on the device. "
And the claims from their pending "USING MOBILE DEVICE TO CREATE ACTIVITY RECORD" application No. 20090210516 is quite interesting to browse:
1. In a communication system, a method for creating an activity record, the method comprising: recording data at a device, the data including one or more events and event-related data that describe activities of a user; uploading the data to a server, wherein the server organizes the data based the event related data; and generating an activity record using the data that can be presented to a user, wherein the activity record represents at least a partial log of the activities of the user.
2. The method of claim 1, wherein event-related data comprise one or more of: a time an event occurs; a date the event occurs; a location of the device when the event occurs; a filename of an event object associated with the event; a mobile device number (MDN); and a contact name.
3. The method of claim 2, wherein generating an activity record using the data comprises creating an entry for each of the one or more events describing where and when an event occurred.
4. The method of claim 3, further comprising presenting the activity record on a website, wherein the website is accessed by the device or using another device.
5. The method of claim 3, wherein the one or more events comprise at least one of: making or receiving a phone call; sending or receiving a message; taking a photograph; recording a device location; receiving and playing a broadcast; connecting to an 802.11 or Bluetooth access point; and using a device application.
6. The method of claim 5, wherein the location of the mobile device is recorded periodically and independently of other events. ....
I's suggest that Siri really is something new under the sun: it is the first large-scale, distributed AI system interacting with the 'real world' in an uncontrolled manner. It would not surprise me if somewhere in the back end queries are being looked at and humans are fine-tuning or making suggestions of possible responses. There is a scale here that's never been seen before. And Apple can afford a legion of unseen human beings helping in the background if it wants to experiment with this.