Comment Re:Clearly... (Score 1) 366
That clam was asking for it.
That clam was asking for it.
Twitter is doing nothing of the sort. Not even by your fevered stretch of the imagination.
Really? You jump immediately to "sue them!"? Even the submitter calls it "libel" right out of the gate. What the hell is wrong with people anymore? Twitter is under no obligation to link you to anything at all. When sites like Twitter start getting sued every time there's a broken link (or a warning that a link may be to an infected site), they'll just stop parsing links altogether to avoid liability. Enjoy your cut-n-paste web browsing experience from then on.
Since it seems to meet the criteria of RCW 9A.52.110, I'd say every attempt to connect is a Class C Felony. However, at the very least, it's a misdemeanor.
RCW 9A.52.110
Computer trespass in the first degree.
(1) A person is guilty of computer trespass in the first degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another; and
(a) The access is made with the intent to commit another crime; or
(b) The violation involves a computer or database maintained by a government agency.
(2) Computer trespass in the first degree is a class C felony.
[1984 c 273 1.]
*****************
RCW 9A.52.120
Computer trespass in the second degree.
(1) A person is guilty of computer trespass in the second degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another under circumstances not constituting the offense in the first degree.
(2) Computer trespass in the second degree is a gross misdemeanor.
[1984 c 273 2.]
******************
RCW 9A.52.120
Computer trespass in the second degree.
(1) A person is guilty of computer trespass in the second degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another under circumstances not constituting the offense in the first degree.
(2) Computer trespass in the second degree is a gross misdemeanor.
[1984 c 273 2.]
At the very least, Experian's board should be held accountable by its shareholders for gross negligence in failing to do its due diligence during the purchase.
9/11 changed the stakes dramatically. Prior to 9/11, hijackings almost universally meant "fly this plane to Havana and we'll let you all go". As soon as the hijackers upped the ante to "we're gonna plow this thing into the nearest building, killing all of you", they forever ensured that no box cutter would stop the passengers from beating them into a paste.
...says the Anonymous Coward...
I would like our current laws to be enforced. If the NSA is violating the law, those responsible should be prosecuted. If they aren't enforced, then there is literally no point in creating new laws.
A law to stop the NSA? Yeah, that oughta do the trick. *rolls eyes*
The easiest way to not be a victim of this kind of marketing is to simply wait six months before purchasing a console. Don't buy it at launch. After six months, it should be obvious what's crap and what's not.
I don't think there's any such thing as "pretty much finished", especially with a piece of software involved in the arms race that is spam vs. filtering. There's only so much you can do with rules before you need to revisit your engine. Also, it's not just the software that's been stagnant for two years. The website itself hasn't been updated in as long. Not a single news item since 2011. The other respondent mentioned that dev is still active, but dev is not production. Dev is dev. Ever since Spamassassin moved to Apache, it's been pretty much dead.
Latest News: 2011-06-16: SpamAssassin 3.3.2 has been released, a minor new release primarily to support perl-5.12 and later. Visit the downloads page to pick it up, and for more info.
Last update was more than two years ago. I know you can refresh your rule sets periodically, but is the software even still maintained?
I assume that by "built into your spreadsheet", you mean integration into Office365. It means that it can be centrally-administered by the company IT department, with contact lists, group messaging, security, etc.
A $3.5 billion company is a "startup"?
I think it's amazing how far-ranging the sharks are. It's interesting that it swims in a wide circle that includes Bermuda. How did it navigate to the island? How did it find its way back to the mainland? I would have expected a much more meandering course, but it's almost like it made a bee-line for it and then another bee-line back to the coast, but in the opposite direction.
The biggest difference between time and space is that you can't reuse time. -- Merrick Furst