Wil Wheaton sez,
I totally agreed with Cory's take on the whole Author's Guild vs. Reality (and text 2 speech) kerfuffle, and I saw that other authors like John Scalzi and Neil Gaiman were pretty much on the same, uh, page.
wil wheaton vs. text 2 speech
But then I wondered: What if we're all wrong? As an author, performer, and consumer of audiobooks, what does this mean for me? Are we really threatened by this?
To find out, I picked a short passage from my book Sunken Treasure and read it. Then, I took the identical passage, and let my computer read it. I recorded the whole thing and put together something I call "Wil Wheaton versus Text 2 Speech" so you can hear for yourself.
Back in 2014, Google announced Project Ara, a click-in/click-out modular concept-phone that you could customize by adding or removing modules as you saw fit.
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]