Robert Sund’s Techdirt Profile


About Robert Sund

Robert Sund’s Comments comment rss

  • Apr 21st, 2014 @ 7:53pm

    (untitled comment)

    IMHO the main article really should have included the amazing results obtained by the University Hospital of North-Norway (UNN). In particular the work done by world famous doctor and researcher Mads Gilbert and the rest of the Cold Water Survival team.

    One such rescue was the one of Anna Bågenholm, that went head first through the ice 18:20. She managed to find an air pocket and stayed conscious for 40 minutes upside down and locked in the ice. Her friends chopped away the ice for 80 minutes and were then able to drag her up and out of it.

    Her body temperature was 13.7 degrees Celsius.

    Mads Gilbert and his team of doctors saved her and the first heartbeat came 22:15.

    She recovered completely and is now a full time doctor herself.

    Information in norwegian

  • Feb 3rd, 2014 @ 9:55pm

    The freezing of time

    I have thought about it, and I subsume that matter cannot fall trough the event horizon because the speed of time would be zero, but the same consideration have to be made for all directions including matter that would be moving away from the gravitational pull.

    This would have a profound effect on the pressure particles close to a event horizon can exert on particles further out. Fewer photons would exert pressure for the same reason.

    It follows that the reduction in the speed of time in the center might be as important as the gravitational pull itself in triggering the collapse.

    As the surrounding matter falls towards the center the gravitational well deepens and time gets frozen gradually further from the center.

    If nothing can fall through the event horizon, then nothing can escape it either.

    This would explain both what triggers the collaps, the release of energy in the supernova, and why black holes are rather dark.

  • Jan 24th, 2014 @ 4:32am

    Would you copy a fish

    If he bought one fish, were the copies theft?
    Jesus did massive copying and sharing, no wonder the establishment hanged him.

  • Jan 24th, 2014 @ 3:57am

    Slaves and serfs

    A slave that ran away actually deprived the owner of his property. Someone that steals him/her-self is a thief, and theft is immoral. Free slaves is worse than pirates.

    Poor owners. Squeezing serfs for centuries to carve out a livelihood.

  • Jun 6th, 2013 @ 1:21pm

    Re: Re: Re: I don't get it..

    Sony have changed its mind before and shown its true face. They have infected peoples computers on purpose as proved by the Sony rootkits, and they removed the ability to run GNU/Linux on playstations after the customers had bought them, rendering rendering-farms expensive junk.

    They will change their mind again.

    No one in MS or Sony have been jailed for any of their scams. They game the citizens with inpunity.

  • Jun 6th, 2013 @ 12:56pm


    Why the surprise?

    ASIC have always been synonymous with single-mindedness and applying that inflexibility quickly and efficiently to large numbers in parallel!

  • Apr 26th, 2013 @ 6:11pm

    hex stricken

    There will call upon you to night, a Deutsche Grammar phone, and on mere suspicion strike your line six times!

  • Mar 11th, 2013 @ 8:19am

    Re: Re:

    I knew someone that wrote rm -Rf * .o during his doctorate. The computer responded back that there were no .o files. This puzzled him as he had just compiled some software and were convinced that there would be a lot of those .o files.

    Notice the extra space.
    His line of thought were (erase, all of, the .o) files.
    I believe in backup. It can be a real savior

  • Feb 27th, 2013 @ 8:14am

    Heavy encryption

    4 bytes larger key gives more than 30 extra years;
    1kB more gives several thousand extra years;
    1MB more gives several million extra years;
    before it is feasable to crack the key.

    For good (symmetric) algorithms the strength doubles for each additional bit. This is true both for computing power and the size of look-up tables[].

    If computing power and RAM size doubles each year, 4 bytes gives 32 extra years before it is feasible to crack the key (because the key is times stronger). It is one among many easy improvements one can make to significantly improve resilience. It is also a strong argument for longer pass-phrases.

    For asymmetrical crypto the key must be longer (because the strength/bit is lower), but this isn't a problem as the key is both generated by a computer and used by a computer.

    Proper end-user to end-user crypto use a combination of both. GnuPG use a new (one-time) symmetric key for each file you send; and it uses asymmetrical (personal) crypto to encrypt that key. This enables strangers to exchange information, and to send information to several different people that don't share the same personal asymmetrical key.

    I presume that part of the reason citizens assume that governments respect their privacy when they use Internet to be at the same level as communication with letters, is that the governments really should.