You really gotta be careful with that attitude. The photos seem worthless at the time you take them, and most of them remain worthless forever. Most of them. Then you see that old picture of when your now-grown-up dog used to be a cute little puppy, and awww!!!
A two-disk RAID1, or a RAID5, theoretically ought to be able to detect when there's corruption, but shouldn't be able to correct it. If you've got two different data values, you don't know which one is right.
But it occurs to me: RAID6 (or three-or-more disk RAID1) really ought to be able to correct. Imagine a three-disk RAID1: if two disks say a byte is 03 and one disk says 02, then 03 is probably right. RAID6, similarly, has enough information to be able to do the kinds of repairs that you could do with par2.
It'd be cool to find out this is already in the kernel's md device. Probably not so yet, though. ?
We can be pretty sure that the NSA data gathering was a part of how General Petraeus was forced to resign.
The NSA shares its data with 11 other federal agencies such as the FBI (crime stoppers), IRS (tax collectors), DEA (drug wars). It may be that the FBI acted alone using already shared metadata information from the NSA. Or it may be that the NSA was more actively involved. If they were involved, that information would be classified.
Petraeus stood a reasonable chance of being elected president. The information was there because the NSA collected it. At a certain point it was decided to force him to resign. That decision was a political one because it has a political impact.
His point is that there is an extra problem here, beyond the DRM issue. Even if we didn't have evil laws intended to work against the people and their industries, imagine if the unreviewed contribution did rm -rf ~/* rather than playing video. Time spent on code review is not "wasted," regardless of whatever silly laws you have.
No. Obviously German courts are free from US precedent and could theoretically use a layman's definition of "effective" but it's likely that the US lobbyists who wrote the German law, had their shit together and knew how German courts would interpret that word.
In the US, we had the matter of "effective"'s meaning settled way back in the DeCSS case. It doesn't mean what you think it means. It means what they want it to mean, and judges have agreed. That battle is over (or at least until people start taking an interest in their governments and bother to vote against Republicrats).
Don't ever buy (or subscribe to) DRMed content or things that are nearly dedicated to working with DRMed content. Every dollar you spend on DRM, will have a large fraction used to keep the government corrupt, and keep laws like DMCA from being repealed. If you know someone who is thinking of buying a Blu-Ray player or an Xbox or an iPhone or a Roku in the next couple weeks, try to talk 'em out of it.
Go ahead, check out the stats. By any measure, the US is NOT number one when it comes to health care and we spend a higher percentage of our GDP than everyone else for demonstrably poorer results.
"We" already are starving and overpopulated**.
"we" are not. In fact, only a small portion of the world now faces starvation, mostly in sub-Saharan Africa.
The evidence so far strongly suggests that we now live in a "winner-take-all" world economy, where technological advances do not filter down and only serve to deepen the inequality both within a countries population and between countries.
Again, alarmist babble with little basis in fact. The truth is that the technological revolution of the last 200+ years has extended the average lifespan worldwide from around 30 in 1800 for most people to well over 70. Even the poorest people have seen average life expectancy go from 30 to about 60.
Is everyone where they need to be? No. But let's stop with the Chicken Little imatation, shall we, so we can concentrated on the remaining problems? This scientific research/engineering project is exploring one of those ways to extend benefits to exactly the groups that need it most. Why not just evaluate the feasibility of the project, both economic and environmental, on its own merits?
It lets you be a VPS provider, using nothing other than a copy of Chromium. No need for fancy processors and virtualizing instructions, no hypervisors, no containers, whatever.
Scales beautifully: Got a new customer? Just open another tab!
Voter participation is on an all time low
Ah, humans. We have the perfect strategy for getting what we want from democracy: "Don't like it? Stop voting!"
The problem isn't the website, the problem is the cluster fuck of a law they passed.
That's like saying you're unable to write a computer program that loses at Chess.
Let this be a lesson to everyone. If, like the UK government, you always use the same one every damn time, your bullshit gets so obvious that even the dumbest people will recognize it. Please. Pedophiles again?!
Heh, "financial server institutions." My fingers insist that root just always has to end in "-er."
But what else is there?
It was people smelling the underlying complexity (and security vulnerabilities) of grain sacks, gold bars, paper-dollars, bank-dollars, credit cards, Paypal, etc that led to the succession of those things, with Bitcoin being the latest solution-to-it-all.
Every one of Bitcoin's ancestors had failures, and due to grass-is-always-greener psychology, the most recent ones (dollars and financial server institutions) are naturally viewed as the "worst" (because their failures, unlike grain bags' failures, are part of people's real experiences and memories) so Bitcoin has gone full circle (not exactly, but it's kind of commodity-like) and tends to have security models similar to commodity-money's models. Thus it's having similar failures ("I lost my wallet" == "I forgot where I buried the gold" ; "someone 'hacked' my wallet and transfered my funds out" == "I dug up my gold, and the chest was empty" ; "The online wallet service closed and they, rather than me, is who actually had the key" == "The guy, whom I asked to hold my gold, disappeared").
Maybe some day, governments will use force or sneakiness or "social weight" to make a new chain policy more popular than today's policy, and there will be a Bitcoin fork, which presents a model more like 20th century banking. Then the security complaints will be "my account got frozen" or "I'm leaking wealth due to government-created inflation" or even "the price of everything in BTC changed because of immensely complicated market and government forces that I can't begin to understand, where my currency on the surface appears to be as strong as it was in 2106, but somehow here in 2109 I'm poorer." And then we'll repeat the cycle again.
We'll repeat it again, because money wasn't actually the problem. Real life was the problem, and life is complicated. Life is full of intelligent adversaries (sometimes posing as friends, sometimes not), bumbling fools with too much power, bad luck, freak accidents, etc, and nobody can ever get rid of all that stuff.
For all values of ___, never pay for an encrypted ___ service. Whether it's mass storage, email, or whatever. All service providers who offer this kind of stuff, are snake oil sellers. What happened to Lavabit this year wasn't news; we already knew about CALEA and have known for twenty years.
Twenty years in the tech world is a long time and ought to have conditioned your thinking by now. Even well-meaning, loyal professional allies can be subverted. The popular example case is government pointing guns (a.k.a. "court orders") at peoples' heads, saying to share the secret and keep it a secret that it's being shared. But really, once you even allow for that to be a possibility, all sorts of other things are possible. Replace the gun with a software bug exploit, replace the government with some random script kiddie with pretty much any agenda that you can think of. Anything goes.
Crypto is something that is performed by your machine, always done by software that you can understand (i.e. not proprietary). You never think about additional crypto that somebody else may or may not be doing, or by software not under your control. That's why you use a storage service that doesn't advertise crypto, you use a plain IMAP provider (if you some weird reason you're not handling that yourself), etc. Any service that tries to lure you with "security" is probably lying, unless by "security" they mean certain areas that intersect with reliability, such as DoS resistance.