Who subcontract it to BT who get Huawei in to do it.
6766 posts • joined 31 Dec 2009
Who subcontract it to BT who get Huawei in to do it.
These are perfectly legal tax arrangements - as Google/Apple/Amazon keep telling us - so the BBC mandate to inform and educate is being served.
They were all from government users who had forgotten their passwords
You mean Spooks ins't a fly-on-the-wall documentary ?
So if you work in science and being "normal" means you aren't as able to do the work.
Does that mean we can't fire people for not being brilliant - because that is the defn of disabled?
You know you're aspie when .....
You crash because the powers of 2 you are counting overflow and trigger an exception .
>DSM is supposed to be a general mental health manual
Although it did still list homosexuality as a mental illness into the 1970s
>So what you're suggesting is being NT is a disability?
In my line of work, being the one in the office without a maths PhD means you are handicapped - yes !
So only a cynic would believe that, instead of a heroic attempt to find terrorist needles, it is in fact an attempt to have some dirt on everyone.
So if you are the family of a murdered black teenager, or a newspaper seller that accidentally died of natural causes in the middle of a group of riot police - the police will be able to do a quick lookup and find your "links to terrorism". ie you went to a website that discussed IEDs
>ie this is designed to not catch the people who it is supposedly aimed at.
It's designed to make ordinary people think twice before looking at "dodgy" sites, like Al Jazera, CND, Greenpeace, Medicine Sans Frontiers or the Labour party - if they think these are being logged and will be made available to an employer, local council or the policeman that stops you for speeding
If you are using tor then everything that goes over Tor, dns requests, web pages, email is secure.
Unless all the Tor nodes are being run by the spooks or you are sufficiently of interest that they are monitoring a majority o the network and can do timing attacks.
But against general data gathering it's pretty secure.
Nobody uses networks based on token women anymore.
Having all the men and women rush around together with collision detection was much more efficient - and more fun.
And not first in 1976 as the story says. Gravitational redshift was first experimentally tested in a stairway at Harvard in 1959
The UK government famously prosecuted the communist party for destroying a bug.
While denying that MI5 had planted the bug or even that MI5 existed.
The prosecution's argument was that the spied upon believed that it was the government was doing the spying and so intended to destroy government property !
So if the cloud isn't the future - BUY BUY BUY a legacy on-site mainframe maker ?
And then you need to fire up the VPN to see if it is available on Netflix UK or Netflix USA if it isn't on Netflix Canada
>Which means it goes into the big pool of available oxygen (and other stuff) we call "the atmosphere". >And something will make use of it eventually.
May contain upto 100% post-consumer recycled Oxygen ?
How else are cats going to populate the universe unless their servants keep building rockets ?
A hugely expensive to build and operate data center in the UK.
So huge losses reported by amazon.co.UK to the tax man, while the income from the data center is a huge profit for Amazon.co.CaymanIslands
>I really think Facebook's actual plan is to get taken over by the US government
That's a relief - I thought Facebook's plan was to take over the US government
It's perfectly reasonable that a VC should demand 4x preference shares that guarantee their money is paid back 4x before any of the founders or employees, that made the company a success, see anything.
It's totally different from a loan shark demanding 400% interest - totally different
Wouldn't the CPS be the ones deciding if they should press criminal charges against the CPS ?
If GCHQ collect all the communications and keep them locked in a big safe - the terrorist won't be able to get their hands on them.
All he needs to understand is that he was appointed by the prime minister to do what his boss says
If the contract to build the road and then the contract to maintain it went to the same company - that might affect your choice of road surface.
Even better on the Samsung. How many ARM executable viruses are there ?
So where can I get your public key? How do I know it's really you? And what procedures do you have for securely informing me if it has been compromised?
>Fortran-I, Fortran-II, Fortran-III, and Fortran-IV are different beasties.
At least with Fortran77 you didn't have to use roman numerals for all the calculations
If they were reciprocal.
Getting FDA approval is horribly long, complicated and expensive. If I could just have a model contract for doctors saying that we intend to obey the law in some other country - and that was acceptable to the FDA it would be fantastic.
Hence the famous American declaration of the need to "arm the bears"
Even more bizarre, according to Barry Cryer who wrote the scripts, she was originally called Mary Hinge but the BBC decided that was too rude and so they changed it to cupid ...
It's worse over here in Murika. We have the "this facility contains a substance known to the state of Ca to cause cancer" warnings on our office door. Because it applies to so many things (printer toner, floor cleaner, nail varnish remover) that it's impossible not to have it.
But our anodizing plant - full of really nasty chemicals - has the same warning message.
The city of London is the best place in the world to commit a crime - that's why so many institutions have their HQ there.
Compared to the finacial regulators in New York, Frankfurt or Singapore you can be pretty sure that the City of London police will take very little interest in your activities
They would also see if somebody went to "random warez site" and it had a 1x1 pixel link to a tracker on dodgy_porn site. Except they only see a request to "dodgy_porn_site/"
That's the beauty of copyright.
You have the copyright on every single line of code you write - even after it goes into the kernel.
So if you misuse it by breaking the GPL, every single author of every single line of code can sue you. In this case vmware are specifically using (allegedly) a module written by this guy
It is going to be a lot less entertaining having the case heard by a judge that understands the facts
Because it's more effective to shut down an airport/train station/shopping center with a call rather than an actual bomb.
An actual bomb risks you getting caught or accidentally blowing up a photogenic disabled child which would look bad on the news. The official terrorists have code words registered with the police so that both sides know it's a real call.
Probably the production line wasn't shut down but continued happily on its automated way.
3000 managers didn't do any powerpoint or hold meetings for an hour - leading to $$$ in increased productivity.
>but having the ability to crew them is a requirement for missions like nuclear strikes
We salute the brave pilots of our ICBMs
1) Airpower can suppress opposition but
The opposition comes from your own voters.
Stealth aircraft look cool and you don't get many dead pilots if you stay high enough.
2) ground forces are needed to drive them out and
Why would you want to drvie them out, good enemies are hard to find these days.
3) political will is needed to keep them out.
Commies are funny now and since we have fracking we don't even want to keep them out of countries that have oil
4) You can't indefinitely occupy a country whose inhabitants don't _want_ to be occupied and (Soviets in Afghanistan?)
That's why the Brits always split the country and let them fight each other - works for centuries.
5) you don't win hearts and minds by dropping bombs on some bystander's family
Only hearts and minds of congress matter. As long as you build the bomber in their constituency they will support you.
6) (on the other hand, doing so is one of the best recruiting tools for terrorists that exists) case in point: ISIS
ISIS mostly kill other people that we would be killing. We will get round to re-doing the terrorist league tables next year.
"Give me liberty or... give me cheezeburgers" ?
As does the Queen and Prince Charles for meeting Mr Adams
They don't abuse their own laws. They do exactly what the laws were designed to do - keep journalists afraid and compliant.
I hope you aren't in the UK - that sounds like you are supporting the words of a known terrorist.
And in the eyes of the UK and USA government.
I think it's disgusting that the state security apparatus has to go through all this pointless bureaucracy to access data from the state broadcaster.
To improve efficiency we need all depts of government to work together so all information from the state health service, state broadcaster is immediately available to the police and cabinet office.
No you just require all locks to be opened by a special master key that only The Security Administration have, and just hope that all their 100,000 employees are perfectly honest and that nobody ever loses a key
The same bill that required you to hand over your password also applied to steganography. The wording was something like "any document that contained a hidden or secret message" so if you had a copy of anything by James Joyce or pretty much any religous book in the house you were in trouble.
It's a bit tough to get 5years if you can't explain Paradise Lost
"The penalty for non-disclosure might be significantly less onerous than that for any crime revealed to have been committed if the key is disclosed. "
Not that now the penalties for displeasing her majesty's intelligence services include being extraordinarily renditioned to some -istan to be tortured and then chained to a floor to freeze to death.