Comment Re:Network structure (Score 1) 53
Perhaps we should start by assigning an IP address to every star in the galaxy, and see how many are left over. Or we could try area codes.
Perhaps we should start by assigning an IP address to every star in the galaxy, and see how many are left over. Or we could try area codes.
This is a news-for-nerds site. It’s reasonable to assume dates are in ISO format.
I think the difference is that the Google study used commercial hard drives, whereas this one, since it comes from the upstarts, is about consumer-grade drives. Of course, the conclusions are pretty much the same, which is good news for us ordinary plebs I suppose.
On those ones have you ever tried hitting the button that's supposed to say the captcha out loud just in case you can't read it?(Which is most of the time) I swear it sounds like some sort of inhuman moaning straight from the Necronomicon that would be more appropriate to summon some sort of demon.
And thus, Inglip was born.
But that would be completely disregarding the trials of the current job market. The best thing would be to get your 4-year-old's CV onto Monster.com as soon as possible.
TBH I think the issue about the bank notes themselves is fairly peripheral to all this. The "people" (for want of a better word) sending these abusive tweets probably couldn't care less about who's on the back of their money, they just simply hate women and so will take any opportunity to threaten, belittle and abuse them anonymously. This article in the Telegraph kinda gives some insight: http://www.telegraph.co.uk/women/womens-life/10208418/Twitter-abuse-What-women-hating-trolls-really-believe.html
Pretty much this. If you need to make big, structural changes to an OS, backporting it is gonna cause all sorts of problems. Can you imagine if they produduced a service pack upgrade for XP, or an older version of Windows and broke compatibility with tons of classic games? There'd be uproar. And that's not even considering the corporate sector. Basically, breaking existing functionality is generally a bad move, and MS isn't quite that stupid yet.
Or better yet, don't store sensitive data on your smartphone. Android/Windows Phone are likely to have their own backdoors as well, so simply avoiding Apple doens't necessarily solve the problem.
10 LET JUMP = "to the left"
The system's so efficient it managed to travel back in time by 23 hours.
There are a million and one proxies for Pirate Bay that are accessible in the UK. As far as I know none of these have been shut down by authorities since TPB itself was banned in the country. So if we assume the same model here then chances are proxy sites will be left alone.
Nothing to say the BPI/government (more or less the same thing now) might not change tack of course.
Correction: most of the hack attempts you're seeing appear to come from China. I expect it's likely most of the attacks would come from botnets, which thrive in China thanks to the high adoption rate of pirate software. The actual hackers could be anywhere.
Let's just get in touch every CDN in existence and get them to shut down everything they're doing then. Clearly centralising providers of commonly-used resources is an abysmally terrible idea.
(Sarcasm, just in case you can't tell)
Once again, Webcomic rants are the precursors of life itself: http://www.smbc-comics.com/?id=2834
So do you block ads, or block content from unknown domains?
Real Users know your home telephone number.