Solve real business challenges on Google Cloud and run workloads for free. For Slashdot users: Get $300 in free credits to fully explore Google Cloud. Get started for free today.
Minecraft Mods are an excellent way. My youngest latched onto those with no issues. Ironically, I tried to teach my 13 year old Apple's Swift language and he was totally uninterested, but mu youngest is latching right onto it, finding ways to modify our test game we're working on, and reciting back to me what objects, methods, and attributes are. I think he even understands inheritance and method overrides. He's got the tree structure of nodes in SKNodeKit down as well. And he's 9. And to think, the 13 year old was the one who expressed a desire to learn how to write games. To each his own...
Cash payments, while really nice for the drivers, would open them up to attack. In markets like DC. Uber drivers have to have clear signage indicating they are driving for Uber (see how many you can spot on the street corner sometime). But if they have this signage, there's nothing saying they can't be carjacked or mugged.
It somehow doesn't surprise me that Apple is still hosting the exploited CA cert. They released patches to a number of openssl (which OSX does use) that supposedly fix the high level vulnerabilities of late (Security Update 2015-3?) But at the same time, the version that's running is 1.0.1g... and there have been several high level vulnerabilities such as the down channel exportable encryption bug that still haven't been addressed. Thinking Apple needs to step up their game!
While I like Apple just as much as any other Mac fan and have been known to be ding as a troll when commenting on Microsoft posts, I have to ask my self one good question about all the litigation between Apple and the world. When will this litigation cross the threshold of aggressiveness and open up Apple to review by regulators as acting in a monopolistic fashion? (dread the thought! I have zero desire to run Internet Explorer on my iPhone.)
So, does this mean that when this "smashed" asteroid's new trajectory causes it to hit another planet with sentient life that we will at fault? How does that law suit work?
Clearly some lawyer has some teenaged kids he's looking to put through school. But food for thought here. Having just gotten into analysing the ECMs in my car and figuring out how to analyse the performance characteristics of my car, I appreciate the ability to figure out what's going on with the vehicle without paying $1000's to the mechanic. That being said, I have serious doubts that a public/private key cryptographic authentication mechanism on the vehicle ECM would be shared with the consumer that purchased said vehicle and would ultimately eliminate the ability of people to work on their vehicles.
So Some cell providers in the US provide "x" amount of GB's of data on a rate plan and when that data is used up, they turn off access to the Internet (blocking) and other providers will allow you to use "x" amount of data and then throttle back your remaining data (throttling) to dial up modem speeds (EVDO or less). Since these rules prohibit blocking and throttling, what will Net Neutrality do to cell phone plans?
And would the same trade-sanctions be applied to France, Russia, China, North Korea, Canada, South Korea, Germany, Spain, Iran, Norway, Sweden, South Africa, Australia, Egypt, Israel, Syria, and the Federated States of Micronesia? (ok, took some liberties on that last one).
Whether or not the use of this technology is a violation of Constitutional Rights is really up to a Judge to determine. And as for "the people need to know", that's really pointless. The people are powerless to prevent the use of such technologies if their elected officials aren't doing anything to prevent the use of such technologies. The nature of globally connected communications in this era leaves open the avenue for exploitation of technology across vast distances. Cell phone intercepts, such as the ones in the article, firmware exploits such as the ones published last week, and any other manner of exploits are going to define the new normal. Unless laws are passed (and with the Patriot Act, I have sever doubts) that prohibit not only average citizens from engaging in these activities, but law enforcement as well, then we just need to suck it up and deal with it. For professionals in our field though, this does present us an opportunity to review our standards and identify logical risks associated with them and then to redefine them to take privacy and security in mind. Encryption designers need to up the bar and create stronger and more secure algorithms. Right now, there are only a small handful of manufacturers looking at this level (black phone?) but even they aren't digging deep enough.
And today, Microsoft release 12 patches, three of which allow for full system administrator remote level access with no interactivity from the user needed.