Comment Good to keep that going (Score 1) 139
It's not "WW II", technology, it's late 1950s LORAN-C technology. LORAN-A was WWII. It's good to have this as a backup. Many aircraft still have LORAN-C receivers. It's good enough to find an airport.
It's not "WW II", technology, it's late 1950s LORAN-C technology. LORAN-A was WWII. It's good to have this as a backup. Many aircraft still have LORAN-C receivers. It's good enough to find an airport.
all it requires is that users sign in
Or, all your base is belong to us.
It's not clear if this will work post-Jobs. Jobs was able to get people to wear dweebish white wires hanging out of their ears. Tim Cook can't do the Reality Distortion Field thing.
Hulu recently pulled an interesting stunt. The've been running WGN's "Manhattan" series, about the original A-bomb program. Anyone could watch it free, with ads, after a few days.
Then, for the final episode, they forced people to register with Hulu or sign in with Facebook to see the episode. Their message says "This video is intended for mature audiences. Use your Facebook or free Hulu account to continue." I checked with WGN. Hulu is lying; the last episode is not for "mature audiences". WGN says they'll try to get Hulu to fix it, but it's been over a week and it hasn't been fixed.
Hulu is learning from the cable companies how to put their boot on the user's face.
The pill transmits to a wrist sensor. Of course, that will transmit to an Android phone, which will upload the data to Google's servers. You'll need a Google account, of course. All that data will be available to you (and, of course, Google's "affiliates") via a newly reactivated Google Health.
Declare lack of academic and physical fitness of young people a national security problem on par with terrorism.
That was done in the 1950s and 1960s. I give you the Youth Fitness Song, sent to every school in America in 1960.
When your credit card is compromised, the bank takes the loss and gives you a new credit card. When your phone is compromised, does Apple take the loss and give you a new phone?
Or are you just trying to be cool?
If you can live with an HD 4400 graphics enigne, you can get a Small PC iBrick, which is an Intel Mobile Core i3 processor in a sealed, watertight box with cooling fins.
There are industrial cases available for fast food restaurants. Those can handle routine pressure washing.
This attack on binaries requires a MITM attack. The attacker must be in a position to intercept and modify the data. SSL only prevents that if it's end to end SSL. Using SSL over Cloudflare doesn't eliminate the possibility of an attack on binaries, because Cloudflare is a MITM itself. The exit from Cloudflare is vulnerable in exactly the way the exit from Tor is.
Cloudflare offers a fake SSL service called "Flexible SSL". Cloudfront gets a cert generated with a long list of domains. Users connect to Cloudfront, Cloudflare sets up a secure connection from the user's browser to Cloudflare, acts as a man-in-the-middle, and makes an unencrypted connection to the destination host.
And, of course, there's an exploit for this.
Even if you buy Cloudflare'ss "most secure" option, and have SSL to your own server using your own certificate, you have to give Clouldflare your SSL cert's private keys. Does Clouldflare take responsiblity for the security of your private keys? No.
So do not use Cloudflare for sites which handle any valuable data, such as credit card numbers.
Diaspora failed partly because it presents itself in such a confusing way. See Join Diaspora.: "JoinDiaspora.com Registrations are closed But don't worry! There are lots of other pods you can register at. You can also choose to set up your own pod if you'd like. There's no "Join" button, but two "Donate" buttons. Take a look at a few "pods". You can't see anything without signing up, and many sound like they're run by wierdos.
The latter is the real problem. A system where anyone can join anonymously and can have as many identities as they want will be overrun by spammers and jerks. Facebook has some pushback in that area, which helps. Facebook also started by getting people from big-name schools, so they didn't start with a loser-heavy population.
A social network needs some cost to creating an identity. The cost can be money, or reputation, or even a proof of work, like Bitcoin. Otherwise, the network is overrun with fake accounts. A distributed social network needs good anti-forgery mechanisms, to prevent one node from spoofing another. That's hard without central control.
There are probably security cameras watching the line already. Use them to count the people. Software for this is available from several suppliers.
Cameras at intersections already do this, as part of traffic signal control. The best systems report things like "3 cars waiting at signal, then a big gap, then more approaching cars". The controller can then let three cars through, then turn the light for that intersection face red and let the other direction go.
Here's a list of 62 volunteer-management packages. Some are web based. Some are free. Somewhere in there should be something that solves your problem.
Sending the content of every search request to Apple? Notifying Apple if the user sets up a non-Apple email account? That's a blatant violation of the Computer Fraud and Abuse Act unless Apple properly discloses that up front and gets the user's consent.
Apple didn't do that.
The EULA for MacOS isn't on line on Apple's own site. This matters. It violates the FTC's "clear and conspicuous" rule on disclosures. It's just like bundling spyware, which the FTC and state attorneys general have routinely hammered vendors for trying.
This puts Apple in the uncomfortable position Sony was in when they put a root kit on an audio CD.
Never test for an error condition you don't know how to handle. -- Steinbach