Comment Re:Alternative to one tough tablet (Score 1) 96
Yeah, not sure how you'd provision it out in the field though...
Yeah, not sure how you'd provision it out in the field though...
I was encountered a Panasonic ruggedized Tablet. I felt sorry for the poor people who had to use it, the screen was terrible and impossibly dark. I would imagine anyone using it outdoors would have to work by feel alone...
My music is also organised by folders, but Musicbrainz Picard does all the heavy lifting of sorting stuff into the right folders.
I use Amarok and do use the library feature most of the time but every now and then I drop back to folder view for certain albums that confuse Amarok (Age of Wonders 3 OST...)
I don't know about you,but I hardly ever use the camera on my phone. Or any of the phones I've used. I would happily just not have a camera in the phone at all...
I live 60kms from a nuclear power plant (Koeberg Nuclear Power Station) and I'm not worried.
All these people who can't read fiction because they can't skim it...Hilarious.
And yet sad as well. Makes me think of Mockingbird by Walter Tevis...
How on earth do we end up talking Climate Science in a thread about Encryption?
Slashdot has the worst track-record when it comes to staying on topic
Really? Can you back that up with some data? Not sure if I believe you without evidence...
Amen!
All hail the one true religion: Usenet.
That said, a lot of fake movies have been getting posted lately...
...I will continue to obtain what I want though the underbelly because at the end of the day there are less hoops to jump through.
If only Big Media would realise that their method is basically madness.
So, this is all well and good for really simple sites but what about larger, more complex sites that require server-side processing of data that, as I understand it, will only be available unencrypted to the client? Does this mean you need to expose your business logic on the client-side? This does not seem very secure to me no matter what promises they make about being able to detect client-side tampering...
Also, with regards to "searchable encryption", can this be applied to real search tools like Solr or ElasticSearch?
I used to be a big NetBeans fan but since Sun died and was consumed by Oracle it's become an Also Run IDE. Oracle, as is the case with many of the things it buys, has basically abandoned NetBeans and it really just can't keep up with the spectacular work done by the guys at JetBrains.
IntelliJ Ultimate is probably the best IDE you can buy if you develop in more than one non-M$ language.
I suppose I should add that with the adoption of STM PyPy will be essentially removing the GIL, something people have been asking to be done for a very long time...
This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian