Here's the project description, I think it's probably safe.
"Ten Thousand Cents is a digital artwork that creates a representation of a $100 bill. Using custom drawing tool, thousands individuals working in isolation from one another painted tiny part the bill without knowledge overall task. Workers were paid cent each via amazon's mechanical turk distributed labor tool. Total cost of the bill, creation, and reproductions available for purchase are all $100. The work is presented as video piece with 10,000 parts drawn simultaneously. The project explores the circumstances we live in, new uncharted combination markets, crowdsourcing, virtual economies, and reproduction."
The test was run twice and the AI was released both times but the logs of the conversations weren't made public. Also all of the extra protocols weren't in place for either test meaning he could have bought the AI's release.
It's an interesting thought experiment but it's a bit ridiculous that the "tests" are mentioned on the page when they don't have any relevance to the rest of the idea.
Yes, not saying it's never used ironically - I agree that that is probably most common - just pointing out that it originated as a serious label for anyone unfamiliar with the history.
I almost never shut it down. Probably only once a month.
Waking from sleep is faster and I don't have to re-open my applications and documents. Shutting it down would save a small amount of power but that's rarely an issue (I'd shut it down if I was flying somewhere).
Are there some benefits to shutting it down I'm overlooking?
If you suspend, you are vulnerable to reading decryption key from RAM (firewire, ram freezing). If you are doing full disk encryption, then only shutdown or hibernate are secure.
My encryption key doesn't live in RAM because I use TRESOR. It's hidden in the debug registers of my CPU. There is still going to be other sensitive information in RAM though which I wouldn't want to be accessed.
With SSD, on OSX, it's pretty fast to reboot. Most OSes can now be tuned to boot very quickly; the big thing was getting rid of the BIOS for EFI I think.
AFAIK a 0-day exploit is an exploit that was found in the wild. No one previously knew about it and there's a scramble to fix it.
In a week this exploit will be an "old 0-day exploit" because the "0-day" bit describes developer preparedness at discovery, not how long the exploit has been known.
edit: And the white block on the top, far right a little in. <3
And just right of the left hand side black border, about halfway down.
And the white block to the left of the F on the bottom right serial.
And the white block in the top of his hair.