Does the U.S. version of Netflix really use a library model, where they strive to keep content available indefinitely? Video streaming services here in Germany continually change the content they are offering, so it's more like a TV with very many channels and random access, and not really a replacement for a collection of your favorite movies and shows.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
It also makes sense to raise the issue with downstreams such as Debian, OpenSuse, or Fedora (assuming they exist for the project). Or if it is in one of the enterprise GNU/Linux distributions, approach those vendors.
If the video is only hosted on Youtube (and I suspect many such videos are, otherwise the uploaders wouldn't make such a fuss), it will be gone from the Google search engine as well, so the net effect is the same.
An Argentinian chef is more likely to make great sushi than a Japanese automotive engineer.
You generally want to use programming languages designed by experienced programmers (even better, experienced language designers) who work closely with subject matter experts. Left to their own devices, experts are likely to get a lot of things wrong, and if the language is sufficiently popular, you are stuck with their mistakes for a long time to come.
The reference implementation of UEFI is open source, and some vendors use it as a basis for their firmware.
Unfortunately, most Coreboot-using devices are tied down and do not allow non-interactive booting with custom firmware (if they allow custom firmware at all).
Isn't this called search engine spamming, and several publishing outfits have been doing it for about a decade, with varying degree of success?
And Apache has the Apache Portable Runtime, with similar goals, but probably geared more towards writing server code.
The trouble with mental health is that there isn't any kind of magic bullet treatment like there can be with just about any other disease.
Pulling those people out of poverty should help a lot (as it does with a lot of illnesses).
That's actually missing a key piece of information. Patent licenses can be very narrow in scope, which allows an owner to charge different parties for different aspects how a device uses a patented technology.
Does anybody know why I wouldn't need a separate licensing deal with MPEG LA if I built a web application using WebRTC? Their typical licensing agreement (as used in Windows and Flash, for instance) does not extend to third-party applications that use the codecs through APIs.
Bingo. I agree that's the most likely explanation.
Is there any indication why Lua scores so highly here? It seems a rather benign little language to me. Certainly, nil-terminated arrays are can be tricky, and a missing local keyword can ruin your day, but that seem minor annoyances. And for the local-vs-global issue, there are now editors with semantics highlighting that clearly disambiguate the two cases.
And the article confirms the large-scaler users aren't part of that elusive group, either:
Many of the largest MySQL users — Twitter included — do not currently pay Oracle for an enterprise licence. Twitter, like Facebook, prefers to build their own extensions and customisations off the community version.
With classical, it's worse because current performers are directly competing with the big names from the past. Glenn Gould's original recording of the Goldberg variations even went out of copyright in some European countries (and has been re-copyrighted in others).
The relays in that networking protocol are decrypt-and-encrypt, so it enables even more (undetectable) eavesdropping.
Quantum key distribution has a strange security model where it is assumed that someone inside the network cannot run two instances of the protocol and give the two parties in a communication the illusion of talking directly to each other, when they in fact talk each to the attacker. In other words, it is assumed that there is confidentiality without authentication. All kinds of strange things follow if you make that kind of a mistake.
77 TB per month is an average bandwidth usage of around 230 Mbps (more if the TB are actually TiB). That's not too bad for someone who has 365 Mbps of nominal bandwidth available.