A quick skim through the two patents suggests that my Asterisk box is in violation of both of them.
Seeing as the first release of the Asterisk PBX was 1999, I claim prior art...
3265 posts • joined 19 May 2010
I suggest you go and Google Tunguska, or if that's not close enough in time to worry you, how about Chelyabinsk.
Both of those were near misses, that could have so easily been much, much worse. Maybe not extinction level, but seriously disruptive.
Perhaps you might then consider the justification here to be a little less thin?.
Human beings have only been on the planet for about 4,000 years haven't they?
I'd be intrigued to know where you get your dates from...
Construction of the Step Pyramid at Djoser in Egypt has been carbon dated to around 2667BC which is 4683 years ago, and humans were around a long time before that.
Interesting fact: The date of Cleopatra's birth is nearer in time to the invention of the iPhone, than it is to the building of the Great Pyramid at Giza.
I think a slight amount of journalistic exaggeration has crept into the narrative.
If you read the linked PDF it actually says the following:
The only morphological feature that is unique to the axes
is the highly polished ground surface. These smoothed
surfaces are created by extensive abrasion with another
rock and cannot be incidentally produced by other
knapping actions such as platform preparation.
Grinding basalt to a polished bevel has been experi-
mentally shown to take 1.5–5 h depending on the
character of the base stone and abrasive agent being
Even in optimal conditions hundreds of forceful strokes are
required to create the smoothed bevel. Our experiments
and comparative measurements confirm this proposition
As mentioned, they didn't use RIPA, which already has a 2-year jail term for failing to hand over encryption keys, because they couldn't meet the requirements laid down in that law.
So what they were effectively trying to do was to enable the law enforcement body to scrutinize Love's private data without evidence of wrongdoing, or any valid justification whatsoever.
The sneaky bastards.
As well as network infrastructure weaknesses, the hackers behind the heist used custom malware specifically created to target SWIFT. The code even adjusted the SWIFT system’s printed reports to hide fraudulent transfers from the Bangladesh central bank account at the New York Federal Reserve Bank.
If the above is true then surely SWIFT can't possible deny all responsibility for the losses incurred.
Eric King, director of the Don't Spy on Us coalition, said: "We have been talking to all of the parties, our members include many cross-party organisations, and we're very enthused by the work that Kier Starmer [Labour MP] and Joanna Cherry [SNP MP] are doing. We hope there's going to be more opposition to what is a bill that we're still very concerned about."
Unfortunately, our duly elected representatives have already had the opportunity to vote against this legislation, but chose instead to abstain, so effectively endorsing it by tacit consent.
Well short of beating it out of him, I'm not sure how they could "force" him to give up the keys anyway.
It's noticeable they didn't use RIPA either, which already has a 2-year jail term for failing to hand over encryption keys.
What they were effectively trying to do was to enable the law enforcement body to scrutinize his private data without evidence of wrongdoing.
Thanks, but in the video you can clearly see a nozzle of some kind with ice crystals forming round it as it vents, so it's not venting through the engine bell.
If there isn't a similar vent the other side, I would expect that to cause a sideways movement of the craft.
I've been watching the 1970s comedy series Porridge and there's no theme tune.
Yes there is, it goes:
"Norman Stanley Fletcher, you have pleaded guilty to the charges brought by this court and it is now my duty to pass sentence. You are an habitual criminal who accepts arrest as an occupational hazard and presumably accepts imprisonment in the same casual manner. We therefore feel constrained to commit you to the maximum term allowed for these offences — you will go to prison for five years."(SLAM)
You really need to try violence. Threats sometimes work, but for those really stubborn ones, actual violence is needed.
I'm sure I've posted this tale before, but it bears repeating:
A colleague of mine was working on a desktop machine which steadfastly refused to boot cleanly.
All the component parts, (motherboard, CPU, Fan, RAM, PSU, Video card, network card, etc) had been tested in other machines and were known to work, but put them all together in one case and it wouldn't work.
Finally, in exasperation, my colleague picked the whole thing up and threw it out of an (open) second-floor window.
When he had trudged downstairs and retrieved it from the flowerbed it was occupying, he emptied out the soil and plugged it in, and it worked first time.
On the workbench in the comms room here we have the skeletal remains of a Dell PE860 with a large screwdriver embedded in its mainboard. It is left there as a salutary lesson to all the servers in the racks...
A Drone America spokesman told The Reg that there was a much larger drone in the works that can fly high and long enough to make cloud seeding a possibility. However, it's grounded until the US government can make up its mind on where drones can fly.
Umm, here's a thought... Use a proper aircraft, instead of pissing about with drones!
I know, as an IT Manager, the users would be in uproar for a few months but they'd soon get used to it.
Unfortunately, when your users include the directors and board of the company, the uproar doesn't last long - say five minutes after the first email the Chairman can't open the attachment on? Then, status quo returns, and you as an IT Manager take a long walk off a short plank.
You'd think he was the messiah ffs.
Whilst I sort of agree with the sentiment - news channels and the internet have gone way overboard about this - you must acknowledge that he had a massive influence on popular music, not just the songs he performed himself, but all the work he did for other bands, and the industry as a whole.
One of the US Government's primary jobs is the protection of its citizens. Right to privacy isn't absolute, and it loses when it comes to security of the nation or protection of the people.
You just don't get it, do you. What the Government is asking for is NOT POSSIBLE.
It is not possible to create strong encryption with an easy way in "only for government use".
The two possible choices are:
1/ Strong Encryption for everybody which cannot be easily bypassed or broken.
2/ Weak Encryption for everybody, which can be bypassed or broken by governments and criminals alike.
The drawback with #2 is that strong encryption already exists, so even if law abiding citizens and companies do as the government asks, and only use weaker encryption, there's nothing to stop criminals and terrorists from using the existing strong encryption.
Accurate? Just wait for the lawsuit when the app tells people that Brand A is clucking unhappy, when, in fact, it's clucking cheerful.
The data the App uses is taken from a report produced by Choice, a consumer protection organisation similar to Which?.
This information is freely available here:
So it won't be the App developers who get sued no matter what.
Biting the hand that feeds IT © 1998–2019