Exploded from hatred of Open Source?
It's not carpooling. These are cars and drivers that would not be on the road without the service.
It may not purely increase congestion - the riders might otherwise use a car of their own. But it's basically a taxi with 10x better service (in function, not just attitude), slightly lower prices, and total dependence on GIS for knowledge of local geography.
There are a variety of reasons to regulate taxis, but the original one was that otherwise, taxi drivers would run a ton of scams. This isn't a problem with Lyft, specifically. Now we have additional concerns about traffic congestion and ecological impact. I don't know whether that is a problem with Lyft, but it's not crazy to suggest regulation.
And it's the launch of the Dev Kit, not the launch of a consumer product. I thought the whole point is that it wouldn't have support for any games at all when the dev kits first shipped.
So it sounds like the contents of blah.zip haven't been published and he can't state what they were without further charges? That sucks. I wonder if Daniel Domscheit Berg deleted that shit.
With its limited pin count, it's not a surprise that the Lightning connector does not have the bandwidth to transfer uncompressed video.
I totally disagree. Coax and Ethernet get you plenty of bandwidth on fewer pins. When Apple announced this thing, I was delighted that they must have some kind of brilliant plan for using these very few pins in a flexible, high quality, eventually low-cost manner. If their plan for flexibility was just "send a system image over USB, then connect via USB to that thing once it boots" then I am surprised and disappointed.
Costs may come down as we approach computing ubiquity, but this puts a ceiling on quality and that seems like a poor plan. We might want our iPads to drive 4K displays. Probably not next year, but in 8 years, sure.
I'm sure there are real, physical limitations that I don't understand that make this required, but I'm still disappointed.
Although this evidence does seem to show that the NYT reporter is a liar, one of the most alarming issues was the overnight loss of charge. Broder claimed that his car went from 90 miles range to 25 miles range overnight for no reason.
When I parked the car, its computer said I had 90 miles of range, twice the 46 miles back to Milford. It was a different story at 8:30 the next morning. The thermometer read 10 degrees and the display showed 25 miles of remaining range — the electrical equivalent of someone having siphoned off more than two-thirds of the fuel that was in the tank when I parked.
You can see what looks like exactly this issue in the charts between Milford and Norwich.
A few years back, I considered uninstalling Flash, but there was Homestar Runner. Now, I'd consider uninstalling it, but there's the animated segments of Homestuck.
If I uninstall Flash, won't I just miss out on the next awesome cartoon whose name matches the regex
Sure, I know and like DNSBLs including Spamhaus's, but this is a distinct application from XBL. Specifically, removal needs to be rapid in order for it to be useful for rejecting customer Web traffic. That's an engineering requirement that email anti-spam systems don't have, since SMTP is designed to retry for days if necessary to get a message through. Moreover, hosts that send any legitimate email are very few compared to hosts that send Web requests; and even though email admins are frequently dense, unresponsive, or victim-blaming, they're still a level above typical users in knowing what the fuck is going on with their computer.
One approach would be to have each DDoS victim continually (e.g. every hour) assert which addresses were attacking it, and only list those addresses which are currently attacking. This way, as soon as a host stops attacking, it will drop off the list. This has weaknesses — for instance, an attacker can use your host all night while you're not using it, without you noticing — but it's still an improvement over what we have today. And it still depends on each subscribing site having a good enough backchannel to the listing service to stay open during the DDoS. Back in the day we'd do it with a dedicated modem line — the bandwidth requirements are really quite minimal — but nobody knows what that is any more.
Sites under DoS attack should publish (through a channel not congested by the attack) a list of the IP addresses attacking them, through some trustworthy third party. Then, other sites should subscribe to that list and refuse service to those addresses until they clean up and stop attacking.
For instance, consider your uncle who uses AOL. His computer is infected with botnet garbage and is participating in a DoS attack against (say) Slashdot. Slashdot sends a list of attacking IPs, including your uncle's, to Team Cymru (the third party). Cymru aggregates these and publishes a list, updated every three hours. AOL subscribes to that list. When your uncle goes to check his AOL email, he gets an error: "We regret to inform you, your computer has been hacked, and is being used by criminals to break the Internet. You can't get to your AOL email until you kick the criminals off by installing an antivirus program and running a full scan. Click here to install Kaspersky Antivirus for free. Thank you for helping keep criminals from breaking everyone's Internet. Sincerely, Tim Armstrong, CEO, AOL."
Then your uncle gets mad and calls up AOL and complains. They try walking him through using the antivirus program, but he just curses them out and says he'll go to Hotmail instead. He tries
Even if Silent Circle is secure, that doesn't mean that the cell phone is secure. The safest mobile innernet device is probably an iPod Touch.
I think it would be more harmful to those people junking up the web if we made a browser extension that clicked on every +1, like, and follow button you surf past.
Machines have less problems. I'd like to be a machine. -- Andy Warhol