Comment Re:How do they get waste heat to those 11,000 home (Score 1) 29
The Funen district heating system do use a heat pump:
https://www.datacenterdynamics...
The Funen district heating system do use a heat pump:
https://www.datacenterdynamics...
==
Most proposals for UBI would fund it by dramatically reducing current entitlements. So someone getting a $1500 social security check, would see it reduced to the "universal" $500 or so. That chance of this being politically feasible: 0%.
==
Even if there was enough money to maintain the same average amount, some would get less and some more than now, because the idea is to get rid of detailed bureaucracy.
That is also the problem with making realistic experiments. It is difficult to select 10000 random people and give some of them $1000 more than they got before, and some $1000 less.
Until you actually need those warranties. Then you realize it is only valid if you currently live in the US. You have to pay for shipping and handling out of your own pocket. And if they refuse to pay out, there is not much you can do.
My experience tells me that if my hardware is not running Debian, then at some point there will be no more updates.
And hackers is not the only problem, often the hardware just becomes useless.
E.g., I have a perfectly good old WiFI IP phone, but it only works on open networks or networks encrypted with WEP.
I have some devices that I would like to use to browse the internet. But they fail on websites with newer certificates.
This is from the Frederiksberg court.
It is not final. But most likely the alliance won because the people behind Convert2mp3 did not bother to show up in a Danish court. And they probable also will not appeal. The transcripts from the court is not made public yet as far is I know.
"Secondely the EU cj does not define hate speech, individual countries do"
But does that mean that EU is now demanding that Twitter censors speech that is forbidden in just one EU member state even if it is legal in the other 28 EU states?
So EU are unhappy with Twitter only blocking 38 percent of flagged content.
They acknowledge that not all content flagged by users isn't prohibited by law.
But how much is that really? Maybe it is 70 percent and then Twitter is blocking "to much".
Who actually decides what should be blocked? Because it is certainly not the European court of Justice or any other court that is reviewing all the tweets.
We are some European citizens that believe that we have the right to seek information without being blocked by some German company hired to oversee some code-of-conduct policy made by bureaucrats supposedly based on some member-state laws that are never tested in courts.
Yes, and Java showed the same thing.
Just because you might know who signed the applet, that does not mean you should let them take over your user account.
Eventually you can get Linux to boot on UEFI just fine. But it is harder than before.
It used to be that you could just put a DVD in a computer and click OK to install Linux, and that was it.
Now people people ask me for help when Linux installation fails. Usually the installation seem to succeed, but the computer cannot boot. I usually install Boot-Repair on a live USB disk, boot the computer and fix it. Boot-Repair is a nice toot but really, it should not be necessary.
And sometimes it does not work. Early versions of the Intel NUC would fail starting Ubuntu because if expected the executable to be named uefi.exe, not grub.exe. Intel fixed it in a later firmware version. But it is telling that they created something so complex, that not even Intel could get it right.
So when every yahoo on your segment fires up BitTorrent your VoIP stops working? No thank you.
Basic prioritization:
1. Realtime Communications Traffic (VoIP)
2. Remote interactive sessions (RDP/SSH/Games/etc..)
3. Streaming Video
6. Downloads
Except that my VoIP works just fine without any prioritization.
Prioritization will just be a way of making sure that just my kind of VoIP will become unusable.
And how are they going to determine which traffic is VoIP anyway? Port numbers?
Then again, my downloads through SSH-tunnels will be faster.
Yeah. Just the silly warning screens on every startup would turn me off a built-in system.
You are comparing apple and oranges here.
There have been other fatal Tesla accidents that was not caused ty autopilot. And plenty of the fatal accidents in average car were not caused by bad driving (i.e., you cannot assume that autopilot would have prevented them).
IANAL, but setting up such a system could not be illegal. At the time you set it up, you cannot know who will be forcing you to unlock. It could be a member of an Armenian gang.
What happens when you are required to unlock is less clear, IMHO.
==
“Unlike disclosing passcodes, you are not compelled to speak or say what’s ‘in your mind’ to law enforcement,” Gidari said. “ ‘Put your finger here’ is not testimonial or self-incriminating.”
==
But are you required to warn them about "bad" fingers?
And you might not have told you girlfriend which of her finger, will start the self-destruct.
And even if you are required to warn them, if you _do_ believe that your rights are being violated, now they have to prosecute you, and you can argue they had no right in the first place.
The USB gadget support seems to be difficult.
But if you get it to work, you could e.g., have several encrypted and unencrypted filesystems on the SD-card.
Give it to someone and let them see a USB flash drive with the unencrypted data, or give them the password to some files.
Or you could have filesystems, where you can write unencrypted, but not read (from e.g. cameras)
It might not have to be unattended.
In 1992 I traveled through Moscow airport with a pressure cooker with a slide projector inside it (I had trouble keeping my luggage in one suitcase).
When they put it through the airport scanner there was a lot of shouting and they made me take it apart in a corner with concrete walls while three guys was pointing rifles at me.
==
GPL2:
>You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
Note that if anyone with copyright over the kernel wins such a suit, the rights to use the kernel are lost for all time ("terminated").
==
That is not what that clause means. For example GPL also says that they not have to accept the license.
What it means, is that they then have distributed the kernel without permission from the GPL.
And they could get in trouble for that.
Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy.