Re: cast the first stone
I can only upvote you once, so have a virtual drink on me
218 posts • joined 9 May 2018
"Acts of a criminal nature should always and without question be banned and blocked before anyone sees them or has a chance to download or share themselves because acts of a criminal nature have been through the due process to define them."
Which countries' laws? Saudi Arabia? Turkey? Myanmar? Russia? Egypt? France? China? The United States? The EU? Or all of them combined, in which case I think you'll find that very nearly every possible statement one could make or action one could take would be considered a crime.
This is not a solution, its a bandaid backed by a different set of (state) weapons.
Search the El Reg Archives, specifically for articles by Tim Worstal (as mentioned above), and for fairness' sake, read articles by those people he mentions who have different ideas.
To sum it up, its not that they are rare, but that they're ores are rare compared to feldspar or quartz. The problem is that there aren't actually rare-earth mines rather the rare earth elements are slightly-more-major components of the slag you have left after you extract the more abundant minerals.
That should have been simple. ATT does this for trade shows by bringing in a portable cell site and a large, LOUD generator on a pair of 20' trailers. I'm sure those NIMBYs would love to have a diesel generator running 24x7 on the street in front of their houses until they approve the new masts.
Also, IBM's quote:
"IBM has long rejected all forms of racial discrimination and we are taking appropriate steps to make sure this does not happen again.”
Really must be qualified to read:
"IBM hasn't rejected all forms of racial discrimination since the conclusion of the Nuremburg Trials when we began taking some small inappropriate steps to make sure this does happen again.”
Fuck hotmail.com. Many many years ago, i set up and account with a 16 character password, which worked for about 8 years. Then they changed the rules and started hashing everything you typed in, instead of just the first 15 characters. It took me a couple of hours to figure that one out that I now had to only type in 15 characters, not the 'password that I had set up'...
You, sir, are apparently hard-of-thinking and short of memory.
A short visit to this page:
Of course, you can continue to believe what you want, its funnier that way..
Here's an excerpt from a separate article from CNet from this URL:
"Huawei's system contains text strings, file names and bugs identical to Cisco's source code,"
They even copied the bugs....how stupid do you have to be?
Damn straight. I first discovered author Harlan Ellison on the pages of Playboy when I was 10. By the time I was 35 I had managed to collect first printings of all but one of his books. It took a long time because I wasn't just going to send lots of money to ebay or steal " 'Repent, Harlequin!' Said the Ticktockman " from the public library.
Our division had been spun off and therefore had a new name. A new longer name. Much longer than three initials.... So I found where that setting was in the configuration and I changed it from the old 3 letter name to the new 18 character name. Soon thereafter, calls started coming in from the shop that they couldn't log into the product tracking system (which is as you woulld imagine, rather important). I went downstairs to the closest one (there were a lot) and logged into my account from their terminal and it worked just fine (including displaying the long company name), but when they logged into their production account, it would disconnect them. I quickly came up with a workaround that would get them connected, but required them to log in twice...they didn't much like that, but it did get them tracking product again. Then I opened a case with support. What it came down to was the 18 character name I had inserted was 10 characters longer than the field into which it was written....which, when downloaded to the FEPs, caused part of the transaction processing code to be overwrritten, and crash on login. After shortening it to 6 characters, the transaction processing logins started working again.
The moral of the story is if there's unclear or no documentation, don't make any changes to a production system until you ask what happens if I change ______, especially if its never been changed before...
No we don't.
90% of what I do every day uses the internet only as a transport mechanism to get packets from my work computer (at home) to my company's server (in a data center.) The only parts of Comcast's network that I use are their cables, fibers, routers and electricity. The only Comcast server I actively interact with is their dhcp server.
The rest of the time, my internet traffic only uses Comcast to reach the internet on the other side of Comcast where I interact with some 3rd party server (aws, google, cloudflare, incapsula, etc). The only interaction Comcast has with my traffic is to auto-decrement the TTL field, and update the SRCMAC, and DSTMAC fields as it passes through their hardware as defined in the BCPs and RFCs.
There has already been, in the U.S. at least one murder case where the dead victim (don't remember the facts of the case, or if they've been determined) had an Alexa and Amazon was subpoena'd for the data on the off-chance that it recorded any of the conversation before/during/after the killing.
I won't have one, but I won't prevent Amazon from selling you one.
Biting the hand that feeds IT © 1998–2019