Microsoft's Quantum OS
Both vulnerable to malware and in the middle of restarting to install updates at the same time!
1817 posts • joined 16 Jul 2011
Both vulnerable to malware and in the middle of restarting to install updates at the same time!
This would only hurt his bottom line...
The pirating or the porno?
but what's that flat, boring skin they're using for Chrome there?
What we actually saw was 1,101,178 voters voting and 1,115,664 votes cast - both those numbers are from the Chicago election board.
Both of those numbers are from this story: http://chicagocitywire.com/stories/511195461-election-board-lists-more-general-election-votes-than-voters-in-chicago
That story also includes this explanation from the Chicago Board of Election Commissioners:
Jim Allen, a board spokesman, said that the list [of 1,101,178 voters] turned over to the Chicago Republicans was incomplete and handed over prematurely.
“Not all voters were entered electronically into the system at first,” he said. “They have since been added.”
End of story.
You're absolutely correct.
What you've described is not the real problem.
In fact, it's not a REAL problem at all:
Registered Voters, Chicago Illinois, 2016 general election: 1,570,529
Votes Cast, Chicago Illinois, 2016 general election: 1,115,664
This is a 71% turnout, which is consistent with the region historically.
The real problem is morons who still believe Fox News and ultra-conservative blogs after they've repeatedly proven that they believe lying is a valid tactic for pushing their political agendas.
There is no credible source which supports the story you're repeating.
Is there a suggested reading order?
Yes. Don't skip over the footnotes.
Was Namecheap registrar, hosting provider, or both to Daily Stormer?
The role of a registrar is to map text strings to numerical addresses. They are, and should be, solely a technical resource, like a phone book. They should also be treated legally, and by society, as such, and not held responsible for the content made available at those addresses.
Hosting providers, on the other hand, have to actually store and serve up the content. They bear greater risk of being associated with the content as well as infrastructure risk of excessive requests due to either spiking interest or DDOS attacks. Hence they should be allowed some leeway in what content they are willing to host.
How are we supposed to know if it's a x.1.x.x release and hence only for Americans as [N]o sane person would install a x.1.x.x Oracle DB? Last time I made that mistake was 10.1.0.4 oh disk corruption in asm when you add a new volume how I don't miss you.
There you go!
I don't think he could have given the BOFH a big enough cut. 3 digits doesn't seem like much, unless you're talking percentages or fingers.
Nah, this is computerized. So it's more like:
Which is better?
...terrorists had developed a method of packing explosives into notebooks...
On a completely unrelated note, whatever happened to all the batteries from those Note 7s, anyway?
Also, it's doubly worth pointing out that DNS lookups are often cached, so the chances that a lookup will go all the way to the authoritative servers, and hit one of the hijacked ones, is low.
On the other hand, for exactly the same reason, any lookup which did hit a hijacked server might remain cached by non-authoritative name servers and be served up to all of their clients until either the operator of the caching servers finds out and clears the suspicious records or the TTL (which a malicious actor might set quite high*) expires...
* The TTL field in the DNS specification was originally a 32-bit signed integer, allowing values over 2 billion seconds (~68 years). Later clarification required that negative values be treated as 0, but still permits a 68-year positive TTL.
You can't have an open source implementation of a DRM'ed browser without it leaking the content.
Actually it is possible, just very difficult.
Which is why the standard is recommending putting the DRM piece in the CDM, not the browser.
The CDM is the Flash-equivalent binary, except way simpler. The idea is to reduce the scope of the proprietary bits to the minimum needed to support DRM. It's a compromise that is actually very open source friendly.
And whether W3C approves it or not, it's already been here for years. Have you watched HTML5 video from Amazon, Netflix, Hulu, PornHub, et al. In any browser? Then you've been using a CDM.
I believe this is what you meant to say:
This is true: "HTTPS = safer than HTTP"
This is NOT true: "HTTPS = safe"
Adding encryption is just one piece of a complex security framework.
PS. Damn you, El Reg! Complaining that you hadn't adopted HTTPS on every article in which you tell people to adopt HTTPS was one of the few pleasures I had left in this world!
Firstly, having a choice does not equate to being in a position to make a choice, especially when that choice has to be made immediately and without time for analysis.
The parameters of the problem state that you are in a position to act, and most forms state that you do have time to make a choice, but not to analyze that choice. It's a snap decision, yes, but it is a decision.
Secondly, you seem to assume that everyone can make decisions easily and instantly when in reality many people find it difficult to make any decisions, let alone stressful ones; you can't simply claim that an inability to decide is a decision in itself.
This is the entire point of the Trolley Problem. It's an edge case exemplifying the line between thinking things through and snap decision making.
Perhaps you personally find it easy to make decisions - that's fair enough for you, but if you start projecting your decisiveness, or indeed any of your personal qualities, upon everyone else you're going to end up criticising everyone else for not being you.
I believe you misunderstand my point. My point is that if you are in the situation described by the Trolley Problem, then, whether you throw the switch or not, you are the only one with the capability to do so. Hence you have a burden of responsibility to do one or the other, and will personally have to live with the consequences of whatever you do.
I am not ascribing judgement on either choice, nor am I suggesting legal culpability would be a good thing in this case (as others have mentioned, the Good Samaritan laws exist specifically to prevent heaping legal trouble on top of the moral conundrum this type of problem poses.)
"if you do nothing then you can't be held responsible for the deaths of the several people because their fate would be the same as if you were not present and unable to influence the outcome."
No, because doing nothing when you have the capability to do something is a choice in and of itself. Hypothesizing about being removed from the situation is simply wishful thinking in an attempt to abdicate responsibility, not a valid logical argument.
The assumption is that this is a good thing but now you may be deliberately mowing down A to preserve B which will be making lawyers salivate.
Or run, depending on where they are with respect to the road...
Oh yeah, and if you don't want to be associated with animal care products, especially by a site known to take tech companies less than seriously, you may want to rethink your company's name -- it's amazing how many people know just enough Latin...
Looks like somebody joined just to plug their company's point of view! Welcome, JohnnyS777!
That Title box above the comment area is for putting a relevant title to your post, not for repeating your handle.
Your arguments about Boeing and Jaguar are speculative and without merit, but to answer them anyway, I'd expect Boeing or Jaguar to pursue the case in all relevant jurisdictions, not to presume a single nation can dictate global activity with impunity.
The question at hand is whether a local judge has jurisdiction beyond their nation's sovereign borders. Do you believe that to be the case?
Scanning for spam detection and scanning for personal info for targeted ads are two different things.
Not as different as you apparently think. They're both essentially contextual key phrase scans. To be effective, they both require the same type of processing, and if you're doing one, the incremental cost of doing the other is very close to zero.
Wait until the AI algorithms can filter out the spam...?
Without scanning it?
Your linked article is not evidence. It's hypothesis.
Specifically, it's a calculation based on published ratings and some tests (not linked or adequately documented) which is assumed to give a good estimate of performance per watt: "We are not pretending that our calculations are 100% accurate, but they should be close enough."
There are also a lot of "probably"s and "assume"s elsewhere in that article.
Evidence would be actually running specific loads on specific systems and comparing those results.
The whole idea of "x is more efficient then y" is incomplete, lacking the vital qualifier "at z."
They've spent billions of dollars over the years writing those laws, they'd love it if their competitors followed them...
No. That's preposterous. Of course
you're we're not in a simulation. Now just go back to your day, subject 3E1AC75B34FF21 yank_lurker...
Safe commenting tip: Don't forget the appropriate icon:
Do people REALLY think that CEOs, C-level people and Board Members travel economy/coach?
No. That's not the point.
At the top there are a LOT of jealously-guarded perks, and the use of chauffeur-driven cars, helicopters and corporate jets are amongst these perks. Different industry but remember the near-bankrupt US auto makers in 2010 heading to Washington to ask for Government money - they went by corporate jet.
Thanks for stating the blatantly obvious.
Is it right? No, it isn't, but it is a rare CEO or Board Member who will share the pain in fiscally-pressured times. Perhaps they should, but it is unlikely to ever happen.
If you can say that it is unlikely for a human being to do what should be done, and not understand why that fact should cause outrage, you are beyond numb.
aaand someone's got a new band name...
However aren't most of the desktop Windows from a later, not NT code base?
No. Windows 1.x, 2.x, 3.x, 95, 98, and ME are the non-NT desktop Windows versions.
Windows NT 3.x, 4.x, 2000, XP, Vista, 7, 8 and 10 are all based on the NT kernel (with various pieces added/removed/rewritten over time.) 2000 was the last NT version which used the same name/number for server and desktop versions, but Server 2003 is based on the same major kernel as XP, 2008 is based on the Vista kernel, 2008R2 on 7, 2012 on 8, and 2016 is based on the 10 kernel.
The fundamental problem here is that a container for internal state for NTFS appears as a file in the file name space.
No, the problem is not exposing internals as files (that's a convenience found in many systems [/dev , /proc anyone?]), but in not properly securing said internals.
Name one of them "A Knife" and the other seven "Not A Knife"
Which is why the FBI didn't use the image to charge the "good" doctor, but instead used it to obtain a search warrant. Evidence requirements for obtaining a search warrant are lighter than for prosecutions -- otherwise you'd have to prove a crime was committed before you could search for evidence of crime.
Bit of a cart, horse problem there.
Here. -> 1010 <- Install these bits on your computer. They're a memory dump from an infected PC distilled to 5C, so they should provide adequate immunity.
Based on what I understand of current theory (and I understand that I do not understand enough),
I believe it says "we don't know what parameters could produce a planet like this."
So not so much that it's wrong but that it's incomplete. Not surprising since until recently our sample size for planetary observations was less than 10 entities in a single environment.
This finding exemplifies why I fully support searching for and investigating exoplanets. I bear no illusions that we will visit any of these planets in the foreseeable future, but understanding the possibilities and how they come to be helps understand both the overall physics of the universe and the specific physics of our locality.
Never looked into what the acronym WINE means, huh?
I won't spoil it for you. Suffice to say that what WINE is is much tougher to get right than a simple CPU emulator.
"GoDaddy's attorney and legal fees in the case, around $14,000."
So did they just use an unpaid intern, or did it take just about 10 billable hours for their attorney to prove how useless those patents were?
When it comes to bugs, I'll take probably over definitely any day.
...when the better function to use is also easier to use, and in fact on the same man page.
"For the i7-7700K, momentary temperature changes from the idle temperature are normal while completing certain tasks like opening a browser or an application," a spokesperson said.
"It's normal for the temperature to rise while the CPU is logging the task completion for later transmission to the proper authorities."
How do you get trojan.win32.reconyc to load and execute from the /tmp directory on Linux or Mac systems?
Well, first you need to install and configure Wine...
If you're going to lie, at least pick some that aren't so easily falsifiable. For example:
See that? That's what we call evidence.
...up to three of which may even be ethical!
The problem is that it has to be defined by case law. For those playing along, case law is law that has been tried in front of a judge. Hence the expensive lawsuits we both want to avoid.
The best way to do that is to define "reasonable" in this context before a judge ever has to listen to any arguments. That's all I'm asking for.
Thanks, Richard, for twigging off of my joke rather than answering my legitimate concern.
In doing so, you've extended use of the very term which needs definition. How do you define a reasonable amount of time or reasonable grounds? Without a fairly comprehensive definition, this proposed rule would only have the effect of wasting local governments' time and resources with those expensive lawsuits you hate so much any time they don't give telcos whatever they want.
It all hinges on the definition of "a reasonable period of time" -- should that be measured in weeks, days, or minutes?
If I were a city administrator, I'd be tempted to create a specific e-mail address required to be used for notification, with an auto-responder that simply stated "application denied." This is why it's probably good that I'm not in politics.
2. C'mon people -- stop kidding yourselves. If you had the knowledge, ability and resources to obtain and assert patents and make money from doing so, you would do the same. Instead, you throw insults at a company that is legally enforcing a property right it owns.
No, hrearden, we would not. Many of us have a uniquely unpatentable invention called a moral compass. You should look into getting one sometime.
There's a joke in there somewhere...
Just shove a
torpedo potato down that thermal exhaust port muffler...
I never thought I'd say this, but Donald Trump is an honest, intelligent, compassionate individual -- compared to Google's spokesthings.
They clearly do not give a shit about reality at all. All they had to say was "Yep -- we took the marketing thing a bit too far -- backing off already." But instead, they're still trying to spin an obvious ad as not an ad. That shows such incredible contempt for their own customers -- it puts them square in the class of cable companies.
“If you cannot explain a reason for a merge or be bothered to try to write a commit message, you shouldn't be doing that merge. It really is that simple.”
That seems uncharacteristically polite. I'd say it more like “If you cannot explain a reason for a merge or be bothered to try to write a commit message, you shouldn't be touching anything in source control at all."
Biting the hand that feeds IT © 1998–2017