Comment Muzak (Score 2) 81
How can I avoid "consum[ing] that slop" if grocery stores play proprietary music over their speaker system, the royalties for which come out of the price of the groceries I buy?
How can I avoid "consum[ing] that slop" if grocery stores play proprietary music over their speaker system, the royalties for which come out of the price of the groceries I buy?
Hate copyright? Change the friggin' law.
How is that possible when all major TV news sources that cover candidates for federal office share a corporate parent with one of the members of the MPAA? Fox=Fox, CBS=Paramount, ABC=Disney, NBC=Universal, and CNN=Warner. A candidate for federal office who openly opposes the excesses of what copyright has become will draw smear campaigns from all five of these studios' co-owned news channels.
A few months ago, there was an "OMG Global Warming!" story here on Slashdot that reported atmospheric CO2 levels rising more than expected - based on measuring CO2 on a friggin a volcano!
If you're talking about the Keeling Curve, it is known to be accurate, based on similar measurements taken all around the world.
No credible scientists is predicting the end of the world. Nor have the ever done so
Well yes, actually they have. Here's one saying that the oceans will boil off. Quote: "that's it for all the species on this planet." That's James Hansen, one of the leading climate scientists in the world.
employment of less skilled but competent workers.
There aren't many of those. If they are competent, they get skills pretty quickly.
But Sony did clearly not even have the basic level of protection they needed in place.
True, Sony could (should) have made it a lot harder.
Who makes bikinis for weiners?
Who else but PETA?
SQL injection. My work place had a typical example:
INSERT INTO users SET fname='$fname', lname='$lname';
Apart from the fact that you're mixing UPDATE syntax with INSERT syntax, substitution is perfectly valid so long as each string has been sanitized in the correct manner for a particular database connection (that is, not addslashes()). For the MySQLi client library, it looks like this:
$fname = $db->escape_string($fname);
$lname = $db->escape_string($lname);
Don't get me wrong; it's bad practice to escape manually unless you're using operator IN on a database client library that supports neither array parameters nor named placeholders (such as MySQLi). But code that correctly uses $db->escape_string() (or the equivalent for other languages or database drivers) should be safe from SQL injection, just as code that correctly uses htmlspecialchars() should be safe from script injection.
With Clonebox, if a customer's web server is hacked or otherwise damaged, we can switch it over to a ~read-only mirror. Sure that protects against hackers, and some customers have been hacked and used the protection. More often, customers simply screw up and delete important files or databases.
But how long do you keep these mirrors around, in case there's a screw-up that goes undiscovered for a while?
Because it only takes one blockbuster renamed as a Linux distro to give them grounds for a lawsuit.
Against the uploader of the torrent, not against the site. OCILLA shields compliant providers from liability for uploaders' actions.
You have no clue.
Well that's definitely not true lol
Cult classics are usually good movies (Big Lebowski), or really bad movies (Plan 9 From Outer Space).
So which is Battlefield Earth? Or is it a cult classic only to those actually in a cult?
To the systems programmer, users and applications serve only to provide a test load.