Comment Re:because drinking water is so pristine (Score 1) 242
Your water comes from Clear Lake? Ewwwww.
American river water here.
Your water comes from Clear Lake? Ewwwww.
American river water here.
They remembered too well what had happened 20 years earlier and prepared to fight WWI again. Right down to the incompetent leadership sitting in chateaus sipping brandy.
Plan B had a punchline: 'Table for 250,000 misure?'
Your posting on
Railroad ties make decent improvised shelter roofs.
Sorry, but there are lots of very specialized yeast strains. You don't use the same yeast for wine as you do for beer, and that's different from the one you use for bread. Etc. San Francisco sourdough bread used to be made from a regionally available wild yeast, but I think things may have changed so that it no longer lives here. Certainly given the urban levels of pollution I wouldn't want to depend on catching a wild yeast. There was one bakery that used to have a baker who kept his culture growing on his hairy chest, but the food & drug people forbade this., even though it had been safe and popular for decades.
You aren't going to get one strain of yeast to take over the world. Particularly not one that's become dependent on being cultured in a lab.
Not in most cookies, but there ARE cookies that use a yeast dough. The problem is the yeast eats most of the sugar, so they aren't very sweet. (Maybe you could call them biscuits?)
Actually, I was just repeating a factoid I'd heard elsewhere. I gratefully accept your correction. (But do note that it doesn't change the point, merely slightly decreases it's significance.)
A drone can and does fly safely 1 foot off the floor of my living room. Should the FAA protect it from my cats and dogs? They (hide/bark from a safe distance) so no issue.
Just wait until the grommits (dead heads that never wash, aka louse sprinkler when they spin dreadlocks) get yeast infections with this stuff.
If you eat THC it will mostly just pass threw your system.
You generally want to put it into an oil solution first, so it can cross your gut boundary.
Well another part of the problem is that bikes are also not registered... Cars have license plates which allow people to easily identify the vehicle, bikes do not, which means bike riders feel far more anonymous and able to get away with illegal activities.
Except the DMCA is *NOT* written like that.
http://www.law.cornell.edu/usc...
The relevant portion:
(3) ELEMENTS OF NOTIFICATION
(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:
(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Notice the wording of section VI: A Statement that the information in the notification is accurate, and UNDER PENALTY OF PERJURY, THAT THE COMPLAINING PARTY IS AUTHORIZED TO ACT...
The only part of any of that in a DMCA takedown is a statement under penalty of perjury that you are actually authorized to send DMCA by the owner of the material you are saying this infringes against. There is no perjury on any other portion of it, including the good faith, or accuracy notification.
This law was written specifically this way to protect any agent of copyright holders from mistakes and/or malice.
Many police departments now have a policy of not performing chases for non-violent crimes because, statistically, you're more likely to kill bystanders by chasing than by letting the criminal drive off.
Given that it's a Tesla (and a dealer-owned one at that), was a chase necessary at all? I suspect that Tesla Corp could have given the police a live feed of the car's GPS co-ordinates at any time?
Well...I'm not sure how hidden it is. We know that they are Apple surveilance devices, and we know that Apple will roll over if the Feds ask them to.
That said, I'd be surprised if there weren't zero-day exploits that haven't yet been made public. OTOH, the same is true for EVERY smart phone.
We've also be informed that the NSA records 80% of all voice conversations. (True? False? No way to check.) This plausibly means that they have all cell phone towers bugged. So they probably rarely need to bother Apple for the information.
Siri clearly requires that the phone know where you are to properly understand you. (Also to communicate with you.)
Etc.
So whether they were intentionally designed for the purpose of being a surveilance device or not (I lean towards not) the capabilities are there. It has also been reported that the microphones and cameras can be remotely activated without signal to the user. Bug or feature? Or did it start out as a bug, but has not been documented?
Whatever, what Apple has been accused of seems blatantly true. But perhaps a result of feature creep than of malign intentions.
I thought they already had a couple, but perhaps those are from Tiawan.
You are embarassing. The GP was right about ONE of the messages being sent by this action. It's probably also intended to help a local company. And It's probably also intended to assist in upcoming negotiations with Apple. Etc.
Don't think that a government announcement sends only one message. Each one sends multiple messages.
Also, don't think that just because China has no problem spying on itself, that it wants anybody else to do so, no matter what it, itself, does abroad. The Chinese government is historically more insular and self-centered than even the US government, and with good reason. China holds most of the world's population, just as Africa holds most of the worlds genetic diversity (among humans). If Africa weren't so fragmented they would also be justified in thinking of the rest of the world as "insignificant tag-ends".
FWIW, you might consider that the current supercomputer speed record is held by a Chinese computer. They may have copied much of the technology from elsewhere, but they've certainly improved on it locally.
P.S.: Much of the information that you refer to as being stolen was actually transferred under contractual terms. I will grant that this isn't true of all of it, but if you look back a couple of centuries, you'll see that the North American colonies, and later the United States did a lot of technology stealing from Britain. As well as getting a lot of it via contractual transfer.
This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian