because you should never sign a cert that has an expiration date later that that of the signing cert !
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The tablet is doubtless cool! Restricting oneself to available hardware, the doctor could have a mike inside the suit, and the assistant could then easily take dictation outside.
To put things into perspective, how well would Napoleon do against full might of the 2015 US Military? And that's only 200 years of technology.
No need to go to 200 years. Pitch 1945 US armed forces against anything > 30 years prior.
I've run without AdBlock since forever, because hey the guys running the content get money that way, and sometimes the ads are useful, sometimes I click, and sometimes I've even bought... but just this week I encountered an ad by Essilor that just wouldn't shut up, with the useless AdChoices button but without the X to get rid of it. I closed the page, installed Adblock, went back to finish the page. Three days later I am definitely not missing all those ads!
The better system is called capabilities. Think "everything is a file descriptor". You want to create a file, you get a file descriptor. You want to run most programs, you give them read-write scratch space, a place to find common library routines (that don't carry any rights by themselves), and probably a read-write access to some graphical interface window. You're a browser, your user clicks on a java applet? You download the applet into a descriptor from your scratch space, you run it, giving it a read-write descriptor to some user interface sub-window created from your own window, read-write to a descriptor of some scratch space created from you scratch space, and read-execute of some descriptor containing a library, probably the same one you got from your parent. You have a video with a proprietary codec? You run the proprietary program as above with read-only to the video. You're a word processor? You get a RW descriptor to the file you're editing, and a call-back to your parent if your user requests an "open file" dialog, which returns a RW (or maybe RO) descriptor to the file the user indicated. See a pattern? See KeyKOS, which actually worked for years, and followers EROS, CapROS, Coyotos, which none got to to any useful status. There was a guy who rewrote libc on these principles, IIUC so that you'd only have to change file-handling logic in classical programs and recompile. But I get the impression that most people working on these things are security and OS researchers in academia (sincerely sorry if someone feels insulted, I'm not helping out and if you weren't working on it I wouldn't even know about these things), and not people saying OK, I have a generous budget, I have excellent developers and excellent team leads and stellar project managers, now I want a timeline and then a product.
For other non-OS projects see Plash, Capsicum, Tahoe-LAFS, E-Lang, CapDesk...
An awful lot of them probably died in the process... and 'dead men tell no tales'.
TFA says 320000 imates from the local concentration camp, and the Russians did discover the plant... just not all of it.
After actually RTFA (at the Mirror), part of the facility was discovered and cannibalized by the Russians, but they missed a bit (a bit: 75 acres is 300 000 sqm, 3.27 million sqft...)
I'll invent a tool that allows you to kill people via a phone line. I could see a really HUGE market for something like this.
There might be a volume filter, but I wonder what would happen with an air horn. I suppose they have earphones, so if you start off speaking really quietly...
sounds a lot like The Swarm by Frank Schatzing (excellent book...)
At least they will have done it on purpose and not while researching a windshield for an airplane . . . Splat.
16 megabytes of RAM...
It was 640 kB, and Bill Gates denies having said it
Granted it's not good if the IDs are easy to guess, nor if the list of IDs+names gets out, but as long as you're not using the ID to authenticate people, only to identify them, it shouldn't be a terrible problem. Think ID=username, not password. What they say about the credentials seems a bit more worrying, but we'd need a lot more info here . . .
If you have lots of money, buy PatchSee cables. If not, install your switches so you don't have to run your cables from the front to the back of the cabinet. As for the rest . . . I may be looking for a job, but not for free
he has much too much of a fascination with the French Revolution
I can't say you're wrong, but at least he does it on purpose. The series was supposed to recreate the life of Horatio Nelson (think "Hornblower in space"), and most of the physics "could be"s are chosen so that the battles and diplomacy resemble life at sea in the early 19th century. Of course, the heroine was supposed to die like Nelson did, but I think the story and fans won that battle. It probably explains why she's less present in the later books!
15 years ago I had an MBNA credit card. On their website you could generate a one-time credit card number that was only good for the stated amount. That was a big improvement. I guess not enough people bothered to use it though.
I have this system today, and my "real" card number, while valid, is systematically declined for Internet transactions. It's common enough that Amazon (at least the French Amazon) has an FAQ on the problems it can cause (bigger orders can be split up, and Amazon debits each packet separately). Some sites refuse the virtual card, but I can real-time the on/off switch on my bank's website to use my "real" card number just for the necessary number of seconds. Not ideal, but better than most.