And still they come.
10485 posts • joined 3 Jun 2008
And still they come.
I haven't seen Stallman running around, putting guns to people's head and demanding
OTOH, I have seen lots of people running off with BSD and GNU work, unwilling to put up a single cent or contribute any code whatsoever.
In other words: Your glib bullshit betrays a profound ignorance of what the difference is between "donations" and "reallocations"
if 'everyone' does it how does anyone get accused?
Listen buster, we are not putting a sizeable percentage of the population in jail for loong stretches because they took a puff or two so that you can go about muddying the waters!
Your papers, PLEASE!
I don't even know why they use the lettering in the first place.
From the BSD license:
THIS SOFTWARE IS PROVIDED BY [COPYRIGHT HOLDER] ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL [COPYRIGHT HOLDER] BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
lift anything from the memory of a secure server
Actually randomly lift 64K from the process answering the SSL heartbeat.
accept the technical debt of falling back to the comfort of SQL
IT marketing has jumped the shark.
it does have a complicated set of data relationships – "one to one relationships and one to many relationships and many to many relationships," explained Butcher
In the 21st century, texts with more than 140 characters are tl;dr and N-to_n relationships are "complicated".
Its database is needed to reflect these many relationships [The key is in the name, chaps.—Ed.
No, Ed, the "relational" does not come from these "relationships", it comes from the fact that one expresses the relationship between "attributes" using a "relation" (aka a "table") -- as opposed to a set of pointers as was the custom up to Codd.
Put simply, space science fits largely in the "guns" category of "guns or butter".
Correct. Space Keynesiansim brings you a bit farther than War Keynesianism, but it's not a panacea - just allocation of productive capital from the taxpayer to projects the government finds good and from there into the pockets of contractors.
Seeing how 30 billion dollar somehow went AWOL in Sochi, and Russia still being a illiberal basket case economically, I'm not even sure how to feel about all of this.
And now a message from our sponsors:
MOON annexation by RUSSIA will be like a NEW MUNICH! Roll back the NEW HITLER!! Act now! HILLARY 2017!!!
Check the news. Communism has been dead as dead since 1989 or so.
Also, outside of the Linux Kernel Mailing list, has anyone ever seen a code review actually catch a problem? I sure as hell haven't.
You could be a sushi chef for all we know, so your lack of relevant encounters might find an easy explanation.
In favour of...?
2014, and there are still "C fast and C furious" public dangers being deposited on my information highway due to morbidly retarded curricula combined with the attitude of the unstoppable coding matador.
And use the fucking static code checkers. Use them.
I am pretty sure I have hit the "donate" button rather more often than $MYBOSS.
Currently they are pumping the cash from the print shop INTO the banks to keep Wall Street going. Do not expect anything to happen before this goes really sour.
I am not happy about this.
US security experts with a patriotic – generally pro-NSA – perspective (such as the th3j35t3r here), along with former NSA staffers (here), were delighted by the whole episode
Until their $PREFERRED_POLITICIAN is killed off by strategic leaks.
The rule of men, not of laws.
It has been thus since the times of Gilgamesh!
System libraries usually need to be implemented in the most efficient possible way. That efficiency is achieved by working as close as possible to the "bare metal" — And C gets you there.
BOLD TALK ... FROM THE EIGHTIES! Well, already in 1984: The Lilith
Writing in C means you have to be much more careful
THIS ZIMMER FRAME REALLY GETS ME THERE FASTER, I JUST HAVE TO BE CAREFUL WHEN GOING DOWNSTAIRS. SURE I BROKE MY NECK A FEW TIMES, BUT IT'S NOT GONNA HAPPEN AGAIN.
Most people definitions of "simple" mean something like a 10 line script sending one or 2 strings down the line. Not 300 lines of code doing challenge response.
"Most people" are fucking idiots challenged by the simple task of cleaning up the stall behind themselves.
Sending one or 2 strings down the line is not "simple", it's a problem for the "differently abled" (or more charitably, for "first steps" exercises)
Doing challenge response in a 10 line script that can be read and understood by the tester is "simple" and done at the right level of abstraction.
Check out Erlang, then report back, mkay?
just suggesting, perhaps we could be a bit less crap at everything?
The path starts here.
No, that's "spindronics". You are confused.
Because C, "runtime bounds checking is for lamers" and shitty protocols (imma gonna send muh size ... what a good idea)
Or just plausible deniability.
Why no Citriulhu love, Harri?
Polarization by Daniel E. Geer, Jr:
I submit that polarization has come to cybersecurity. The best skills are now astonishingly good while the great mass of those dependent on cybersecurity are ever less able to even estimate what they don’t know, much less act on it. Polarization is driven by the fundamental strategic asymmetry of cybersecurity: the work factor for the offender is the incremental price of finding a new method of attack, but the work factor for the defender is the cumulative cost of forever defending against all attack methods yet discovered. Over time, the curve for the cost of finding a new attack and the curve for the cost of defending against all attacks to date must cross. Once they do, the offender never has to worry about being out of money. That crossing occurred some time ago.
I don’t see the cybersecurity field solving the problem because the problem is getting bigger faster than we (here) are getting better. I see, instead, the probability that legislatures will move to relieve the more numerous incapable of the joint consequences of their dependence and their incapability by assigning liability so as to collectivize the downside risk of cyber insecurity into insurance pools. We’re forcibly collectivizing the downside risks of disease, most particularly the self-inflicted kind, into insurance pools; why would we not expect the same of cyber insecurity, most particularly the self-inflicted kind?
Let me guess ... problems which could have been avoided if the language of predilection for taking relaxing mudbaths of coding wasn't "C" (with or without "lint")?
Of very high relevance, there is an inspiring series of papers on the subject of "weird machines". Check it out:
The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language. The recognition must be feasible, and the recognizer must match the language in required computation power.
When input handling is done in ad hoc way, the de facto recognizer, i.e. the input recognition and validation code ends up scattered throughout the program, does not match the programmers' assumptions about safety and validity of data, and thus provides ample opportunities for exploitation. Moreover, for complex input languages the problem of full recognition of valid or expected inputs may be UNDECIDABLE, in which case no amount of input-checking code or testing will suffice to secure the program. Many popular protocols and formats fell into this trap, the empirical fact with which security practitioners are all too familiar.
LANGSEC helps draw the boundary between protocols and API designs that can and cannot be secured and implemented securely, and charts a way to building truly trustworthy protocols and systems.
That is, sadly, what the efficient markets hypothesis says: that all available information is efficiently integrated into prices in a market.
But seriously, the rationale for wealth transfer from Main Street to Wall Street and Central Bank sycophants via monetary mass inflation and the inevitable bust-induced pain and disruption born mainly by Main Street (of course) is so that we can have .... Google????
I would rather have hard money and well-thought out investment schemes than neverending Ponzis and international dubious Megacorps.
People have been warned about the NSA or serial Easy Money Bubble implosions too, for a long time.
Warnings, like deficits and Big Government, don't matter.
How many non-exFAT filesystems could you write for 100 of millions?
Sorority Girls from SOLAR IV: The Curiosity Files!
nasa is not the experts they claim to be
Behold the Internet!
"Then they set out from Succoth and camped in Etham on the edge of the wilderness. The LORD was going before them in a pillar of cloud by day to lead them on the way, and in a pillar of fire by night to give them light, that they might travel by day and by night. He did not take away the pillar of cloud by day, nor the pillar of fire by night, from before the people."
Laser wouldn't hit just a few pixels in one camera, mon.
tiny statues, fossils, and a carved alien skull
All made in Taiwan!
who's actively campaigning against their human rights
I thought he was just against gay marriage? Does "marriage" count as a "human right" now? Are there any other administrative procedures that are listed under "human rights" that I should know about?
Indeed, and nobody has said that he can't continue to retain his bigotted, 19th century beliefs.
Bigoted takes one "t".
Thank you for the heartfelt righthink message, btw.
A slave is somebody compelled to provide service to another. Elane Huguenin, a wedding photographer from New Mexico, was arraigned before [New Mexico's] state’s “human rights” soviet for politely declining to provide her services to a lesbian couple planning a “commitment ceremony” (the state doesn’t recognize same-sex marriage). The couple had no difficulty finding another photographer willing to accept payment for that service...
In its ruling upholding the actions of New Mexico’s “human rights” soviet, the State Supreme Court claimed that the lesbian couple had a right “to obtain goods and services from a public accommodation without discrimination on the basis of … sexual orientation.” This assumes that business owners like Huguenin have a duty to provide such services – and no right to decline participation in that transaction. In other words, involuntary servitude – despite being explicitly banned by the 13th Amendment – is justified in the service of “anti-discrimination” policy.
Attorneys on behalf of Huguenin appealed that ruling to the US Supreme Court, contending that it violated the free speech and religious liberty “guarantees” of the First Amendment – which it manifestly did. Huguenin’s legal counsel could have argued that the state’s Human Rights Act — which was amended in 2003 to include “sexual orientation” within the protected categories — represents a wholesale violation of property rights. This argument would only find traction, unfortunately, in a society where property rights are properly understood.
Huguenin’s counsel could have pointed out that the preferential treatment of property owners such as Mr. Darden [a hairdresser who would not accept business from New Mexico Governor Susana Martinez because she is an opponent of same-sex marriage with no ill effects] – who is allowed to discriminate against some customers on ideological grounds – violates the principle of equal protection under the law. But such preferential treatment is the entire point of “civil rights” enactments.
The US Supreme Court has declined Hugeunin’s appeal, tacitly ratifying the state supreme court’s endorsement of involuntary servitude in the name of “tolerance.”
All of this outraged entitled vocalatory minomajority is very confusing,
he theoretically could have started making Mozilla give donations to $EVIL
Crowd-sourced rightthink and precrime is exactly what we need.
"He was going to ask for it"
the formation of a modern Standard Oil
A very "progressive" stance. How do you figure?
I don't see why rumpy-pumpy and gpus don't mix?
Oh wow jake and his passion for usenet again.
Chill out mang. This is 2014.
21%, according to the EU agreement
It's time to the kill the EU dead like roadkill.
Even 15% VAT is already stupid beyond words.
Luxembourg has not managed to rein in its cancer of overpaid state employees (overpaid AND with benefits AND hardly working), so they are upping the max. VAT rate to 17% in january 2015. I guess they don't have enough jobless yet (most of which are hidden in the statistics).
There appears to be a wave of common sense flowing over the EU at the moment...please stop, it's messing with my prejudice.
You seem to have been hit by something though. Better have your head examined.
The book "IBM and the Holocaust" by Edwin Black makes the case that the Holocaust would not have been possible on such a large scale without IBM tabulating machines.
So how did Stalin and Mao do better without the devil punch card machines?
May not even be weakly interacting, only gravitationally, so not WIMPs, just GIMPs
5/10, needs more work.
What are "our 1%ers"? Be more specific.
This cert should be kept a closely guarded secret.
No, the private key should be kept a closely guarded secret.
"Working is now illegal and not-working is being taxed". What to do?
The law will prove costly
This. I foresee a few percent of the productive rest-activity of France to go up in smoke (i.e. a few tens of percent of GDP) and quite a few small businesses getting fucked over by zealous civil servants and union members while other put their keys under the doormat in disgust.
Anonymous FTP to NSA servers so that french unions can get their contra-capitalistic material too?