Re: Ts & Cs
I would have thought that a simpler solution (at least for those to the right of The Pond) is to invoke GDPR to have the photos removed from the dataset. After all there can be few things more personal that a photo of your face!
71 posts • joined 3 May 2018
So the only consequence of his screw-up was being made to buy the Head of Faculty a beer and being on the receiving end of a first-class bollocking. He got off lightly, however I suspect that the Head of Faculty realised that he had scared himself completely witless, but at least had been able to repair the damage.
I agree. Once logged in to a Sun workstation as "root" with the intention of cleaning out "/tmp" (it was really cluttered and causing problems). I entered the immortal command:
rm -rf / tmp/*
Note *very* significant space. Ater a couple of seconds my brain caught up with my fingers. Unfortunately it was too late and I spent the rest of the day reinstalling the OS.
Lesson learnt, I have never made that mistake since!
However there is no evidence to suggest that white dwarfs have a magnetic field string enough to do what you suggest; in fact the evidence to date says that whire dwarg magnetic fields are no stronger than that of the parent star.
Could you be thinking of neutron stars that do have strong magnetic fields (at least when they are relatively young)?
Of course they can ignore the rules about starting up a new company. However it will be spotted (probably by Companies House who maintain a register of banned directors), at which point they will either face much bigger fines or even time in an HMP (for basically ignoring what amounts to a court order).
A man who represents himself has a fool for a client
As far as I remember, the actual saying is "The lawyer who represents himself has a fool for a client". However I otherwise agree - if you don't have good knowledge of the law, then you are best served getting someone who does!
The real mistake was not to the system to make sure that an existing security policy does not have the same name. It does open the question however - were the security policies actually documented?
Saying that this is the sort of mistake that all IT admins make sooner or later; once the dust has settled, the scream silenced (possibly using the sort of techniques taught at the BOFH school of IT admin) and the system been restored to what it should have been, you tend to be a whole lot more cautious/paranoid when pushing out any subsequent changes.
Regardless of anything else, if the FCC had the authority to create the rule, then the FCC has the power to change or scrap the rule.
I fully agree with this statement. The real question is: does the FCC have the power to completely abrogate itself of all responsibility.
Correct, however in this case the Secretary of State for Transport is authorised under the Road Traffic Act 1972 to produce regulations covering a restricted domain as defined in Section 199(2) of the Act. He cannot exceed those powers without having the courts declare the regulations as being unlawful (this has happened, albeit rarely, when certain government ministers tried to expand the scope of their powers).
In the UK at least this is a fairly common approach when addressing certain dynamic legal issues that may need response times far shorter than is possible by passing primary legislation. Basically if a problem arises that falls under the domain of a given Act of Parliament, but is not covered by existing legislation, then the rules can be quickly adjusted to as appropriate. In fact if really urgent causes (where there is a safety-of-life issue) the rules can be changed within a few days; it can take months (if not a year or more) to make substantive changes to primary legislation.
Can he actually provide proof that the Facetime bug actually caused him a problem? At the moment he seems to be saying that because it could (in theory) have caused him a problem, then it must have caised him a problem, and therefore Apple must pay up. In practice he is going to need to prove that the information leak occured in the meeting, and that neither him nor anyone else in the meeting was not carrying any other devices that could have recorded the meeting,and that neither him nor anyone else in the meeting talked to any third parties after the meeting. A pretty high bar to leap over unless he can prove that the bug was actually used in the course of the meeting (which will be even harder to prove).
However there is always an elected politician who ultimately has to take the flak if the civil servants screw up; that tends to ensure that the politicians usually (but not always) keep a close eye on what's going on an reins in most of the excesses. The civil servants in Brussels answer to unelected politicians who are answerable to no-one, so they have no reason to discourage excesses (and may actual encourage it at times).
"The living Darwin Award is for those who eliminate themselves from the gene pool and survive to tell the tale."
An example being a guy who sliced his scrotum open and decided to deal with it by stapling the wound together. By the time he got to A&E, it was well too late for the family jewels.
This is an old problem. If you read "Most Secret War" by R. V. Jones, he relates how a new building was built for the Admiralty in the late 1930's that had no provision for utilities at all. They had to move in as-is and wait for 6 months, at which point the necessary modifications could be attributed to depreciation.
At which point Google can (and probably will) argue that the person concerned deliberately and actively concealed their location, and that there is no technical mechanism in place for Google to be able to determine their true location given the intrinsic technical characteristics of a VPN.
When I was an undergrad, I spent a year working for Link-Miles (the old flight simulator manufacturer) down on the South Coast of Blighty. I was actually working in the business support section of the company, and my manager had a Commodore PET computer - the more expensive business-class model. This was used to generate various reports for the PHBs.
Some of these reports required over-night runs, which most of the time was not an issue. However once or twice a week we would come in on the morning and find the computer frozen with the report job only partially done. Much head-scratching occurred, and I eventually put together a small program (almost embarrassingly simple) which we could use to work out when the computer was freezing. To our surprise it was at almost the same time every night - about 2:00 in the morning. Cue more head-scratching for the next couple of days, until someone realised that there was a medium-engineering company next door. Light-bulb moment! A quick trip over resulted in us finding that: (a) they had an electrically-powered drop-hammer on the premises, (b) they tended to use it during off-peak hours to save money, and (3) they where currently using it two or three times a week in the early hours of the morning.
It turned out that the drop-hammer was generating voltage drop-outs on the primary mains supply which was serious upsetting the CPU of our PET computer, hence the lock-ups. The subsequent installation of a UPS to regulate the voltage saw the problems magically disappear.
Depends on which country you are operating in. Since the miscreants are are encrypting peoples files and then demanding money before they *might* give you the key to decrypt them, under UK law they are committing blackmail (or technically, "demanding money with menaces"). If you set up a brokerage company like you describe, you could end up being charged as an accessory to the blackmail, since you are clearly profiting from the actions of the bad guys even though you are not performing the blackmail yourself.
Many, many years ago when I was young and working in my first job, I was given responsibilty for managing a small network of Sun workstations (one of which was a diskless node). One day I decided I need to clean up /tmp since it was close to being full and causing problems, so I logged on as "root" and entered the command "rm -rf / tmp". Note the significant space!
Control-C followed after about 2 seconds, but there was not enough of the system left to be usable (although I was able to dump the data directries to tape prior to a full re-install).
The effects of gravity on time has been known for nearly a century. Surprisingly the SI definition actually takes that into account; a measurement of (say) a second will be identical whether made on the surface of the Earth or in deep space; however an absolute comparison of the measurements will show a (very small) difference due to gravity-induced time dilation.
In order to detect gravity waves, they will need a network of four or more clocks equally distant from each other. One would then measure the absolute differences in the clock readings caused by gravity waves; by looking at the order in which the clocks drift back and forwards it becomes possible to determine the direction from which the gravity wave hit us.
I can remember in my first job we received a Dec VAXstation which was going to be used on a specific project for a customer. The thing arrived on a pallet containing a vast quantity of boxes (including one that just contained a sheet of paper saying "this box is empty" - shades of Douglas Adams), including enough manuals to fill 3 shelves of a cabinet.
About a month later the software engineer working on the project needed to know the system call to print a text message on the console. This ended up talking 4 us, and having to refer through 4 fully cross-referenced manuals before finally tracking down the system call.
Paper documentation is good, and I often still prefer it. But Dec used to take it just a tad too far in my opinion.
Brussels will never agree to weaken GDPR, that could be seen as an admission that they might have got something wrong, and hence is completely against their standard dogma.
I very much doubt that Washington will enact something as tough as GDPR since there will be too many "interested" parties who will be busy buying the votes of Congress/Senate critters to let anything through like that.
I think that what is more to the point is that the UK Human Rights Act does not apply inside the Ecuadorian Embassy (the Embassy is diplomatically considered a part of Ecuador), so Julian's court action will probably be tossed out PDQ. However it is likely to annoy the Ecuadorian government enough that, shortly after the case is tossed out of court, Julian will be tossed out the front door. Probably after giving the plods a heads-up so they can organise a "taxi" for Julian to nearest nick.
Ecuador did try to give him diplomatic immunity a couple of years ago; I suspect so that they could get him on an aircraft to South America. HMG refused to agree to it (diplomatic immunity is only valid if the recipient country agrees to it, you cannot just extend it to anyone you like) . The whole point of diplomatic immunity is that it is not supposed to be abused; Ecuador came within a cat's whisker of breaking this rule!
No, they stopped that several years ago. However you can be sure that if Assange does decide to leave, old Motor Mouth will let everyone and their dog (or cat) now about it. At that point the plods will make sure that they are in a position to greet His Dickheadness with open handcuffs.
Biting the hand that feeds IT © 1998–2019