Here is a higher resolution version of the map: http://www.nasa.gov/jpl/oco2/p...
I live in an orange area of the US, and it's not the "corn belt" either, but the Appalachians.
We all know that the orange area is in Florida and not the Appalachians.
Now every terrorist organization around the world will see how easy it is to control North American media.
Someone needs to.
i have a postage sized mp3 player from china with a tf/sd card slot it boots up shows a menued screen and plays mp3s. a fake phone that has a plastic explosive bomb could easily use a 'fake' power on screen with menu and the menus would be browsable and possibly functional and also be a bomb.
so no this doesn't make airplanes safer.
It's just a little suspicious that your phone looks like this: http://midlifecrisishawaii.com/wp-content/uploads/2010/10/motorola-first_cell_phone.jpg
What does he think about systemd?
And emac vs vi...
"Exact binaries" is not the point of having the source code.
Uh, you must not have worked in a shop that does continuous integration automated builds? Do you really think QA should be handed binaries that you compile and have them trust them?
The problem is that GCC will always give you a different binary every time you compile from the same source. This makes it impossible that the binary you received comes from the source you claim to have used. You can get around this by never receiving binaries from anywhere but the automated build machine but it would still be useful to be able to test that a build that you received was built from the code you expect.
There were several reasons why Apple moved away from the GCC tool chain to LLVM and Clang but one of the abilities of the LLVM stack is that you can actually get identical binaries from the same source compiled on different machines at different times.
You confused my post and gotten it EXACTLY BACKWARDS. But thanks for playing....
The point that I was making is that source code does not always build "exact binaries". Now if someone is giving you both a binary and the source code and claiming that the source produced the binary, there is really no way to prove that one way or another. But at least you know that you can build a binary from the source code and know what is in THAT binary.
I once trained an Australian Shepherd to fetch beer from the refrigerator. But I wouldn't recommend it as a business model.
Here's one for your business model: https://www.willowgarage.com/blog/2010/07/06/beer-me-robot
I guess that depends on how you define it. On interlaced broadcast (like all old TV), you get a half-frame every 50 seconds, where half-frame means either the even or the odd lines, alternating.
No wonder it looks so crappy!
Why bother finding a dog?
Ok, Tommy Boy
I would agree that 3/4 of AV success is avoiding "dodgy" sites. However, I have never had any problems with malware on any porn site. The sites I have had problems with malware on were like pics of celebrities on Google Images, and you get a redirect to a malware driveby site, or, you lick on an ad that promises things free that should not be
Well for crying out loud, stop licking on those ads. That'll get you every time.