The fact is a) an employee accepting such a position may not understand that area of the law, b) if Amazon chose to threaten an Employee it's quite likely someone working in the warehouse has no means to defend themselves and both parties know it.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Very few people are ever in a position to force you to do anything, and yet you may still be in no position but to accept their propositions. For example, perhaps you need to eat and keep a roof over your head and there aren't a lot of other opportunities in your area or fitting your qualifications. We have laws to protect people in these situations. Telling someone that they can't exercise their skillset and background for 18 months after they leave a position without otherwise providing due compensation is about as clear as an abuse of overwhelming power during a negotiation as you can get. Almost nobody would agree to that given a real choice, other than due to short-term need.
Start visiting locations of concerned customers, tear-down their units, check for implants, pull chips, put them in readers, verify firmware, etc. etc.
Figure out what changes are being made to the equipment and then warn customers to check for them upon receipt. Tactics will then change, so check new shipments again 6mos. later.
.. I had to electronically send in a picture of a government-issued photo ID and a recent utility bill showing my home address.
Short story: Retailers should probably trust Google's platform more when it comes to fraud.
Compressing data for important backups is not a good idea. A one-bit error and entire files or worse become garbage.
Your product line stagnated and your latest effort was seemingly launched to no end of trouble. I said this would come and now it has.
I'm really looking forward to scanners that finally have nice UIs with modern features like GPS built-in, recording, RR db access, and communities developing for them for additional protocol support.
I'd prefer if the cards came with a cert from the carrier on it so your phone could verify it's talking to a real tower, disabling stingrays in the process, and then your phone generated and exchanged keys with the tower. It would periodically generate new ones and expire old ones when you weren't actively exchanging data or on a call, and weren't hopping between towers. The towers would counter-sign them and hand them back. You could then hop towers quickly because each new tower you tried to connect to only has to verify the networks own countersignature.
Exactly. Their explanation is basically, "we did notice a couple of breaches in the outer layer of our network, this was probably that, nothing serious was taken". Meanwhile the NSA is loading firmware-level rootkits into hard drives via numerous exploit techniques that can remote update and survive reformats, etc.
Yeah, buddy. Just because you didn't notice the intrusion did not mean it didn't happen. If the NSA wants in they're getting in, and they're good enough not to get caught in most cases.
Why would the Snowden materials say they got in if they didn't? It's not as if they were leaked intentionally.
Google have been absolutely useless when it comes to marketing Wallet.
It works great. It's been out there for years now.
But have you ever seen an ad on TV for it? Have you seen ads online for it? Have you ever read an article about NFC payments that didn't talk almost exclusively about Apple Pay?
Google seem to think that as long as they put the tech into phones people will just somehow discover it, go through the pain of setting it up without really understanding how it works or the benefits of it, and trust loading it up with cash even though they've never really heard of it.
Seriously Google, your marketing people are failing you really badly here.
While I agree that native parental controls would be great, and as a parent I was also surprised they weren't there, there are apps that you can use to lock down devices quite easily to limit what your kids can access.
Kids Place is a good one:
The bigger problem is no end of "free" games stuffed full of ads that kids accidentally click all the time. IMO Google needs a policy that says if you are marketing to kids under a certain age you may not have certain types of ads (or any ads) in your app. As a parent, I'll gladly give you a couple of bucks to have a "safe" app for my child to use.
How's the systemd C# port coming?
You'll need to be more specific, are we talking about systemd running in C#, systemd running C# code, or the port of systemd in C# that runs C#?
Have we slipped so far down the performance-orientated slide that we are impressed by *how well a dungeon generator runs on an i7 with 16GB of RAM*.
I am genuinely curious. That is an outrageously high spec for a dungeon generator.
And how are you going to go about recording your stop when the police just took away your camera? What if they don't bring it back when they come back to your car, something serious comes up, and you have no evidence regarding what happened?
AV products will have to kill this dead, because they won't be able to easily detect malware. If it can't be inspected it can't be known to be safe, so I'm going to bet anything using this that isn't whitelisted e.g. by digital signature is going to be DOA.
... to a more extreme version:
"I don't always test my code, but when I do it's via live patching the kernel on production"