That is correct. Constitutional rights supersede treaties.
Deleting the Google links is a quite serious hindrance to scholarship and informed research today. One may as well put it here (with due credit to Douglas Adams for writing this.
"But look, you found the notice didn't you?"
"Yes," said Arthur, "yes I did. It was on display in the bottom of a locked filing cabinet stuck in a disused lavatory with a sign on the door saying 'Beware of the Leopard'."
It is not Islam-specific. The equivocal attitude the US displayed during the Kargil conflict — when India was clearly the injured party — is not entirely unlike the attitude displayed this year towards Ukraine (where what few Muslims reside, all strongly resent the invader).
Though Obama (as Clinton back in 1999) talks the talk of supporting the invaded victim, the US would only help with "non-lethal" supplies — and only after a significant delay.
Americans may have a Florida drug dealer to thank for expanding our right to privacy.
Police departments around the country have been collecting phone metadata from telecoms and using a sophisticated spy tool to track people through their mobile phones—often without obtaining a warrant. But a new ruling out of Florida has curbed the activity in that state, on constitutional grounds. It raises hope among civil liberties advocates that other jurisdictions around the country may follow suit.
The Florida Supreme Court ruled Thursday that obtaining cell phone location data to track a person’s location or movement in real time constitutes a Fourth Amendment search and therefore requires a court-ordered warrant.
The case specifically involves cell tower data for a convicted drug dealer that police obtained from a telecom without a warrant. But the way the ruling is written (.pdf), it would also cover the use of so-called “stingrays”—sophisticated technology law enforcement agencies use to locate and track people in the field without assistance from telecoms. Agencies around the country, including in Florida, have been using the technology to track suspects—sometimes without obtaining a court order, other times deliberately deceiving judges and defendants about their use of the devices to track suspects, telling judges the information came from “confidential” sources rather than disclose their use of stingrays. The new ruling would require them to obtain a warrant or stop using the devices.
The American Civil Liberties Union calls the Florida ruling “a resounding defense” of the public’s right to privacy."
Link to Original Source
>but when you apply for them you get a response that the job doesn't exist
Oh, dear. This is a quite old trick. It's even more fascinating when they say "we already have candidates", but when your colleague with a different age, gender, or citizenship applies with similar credentials at the same time their application is accepted for review. The classic example of this is tuning HR requirements to only hire H1B candidates, as shown at:
> They were suffering from price competition
Not just price competition: they were also suffering profoundly from fraudulent Cisco hardware.
Not only does it cost Cisco profits to lose the legitimate sale, but it costs them profoundly in customer support for the purchasers of fraudulent Cisco hardware. And Cisco support is a very large business cost to Cisco.
Goodness, are you hiring? I'm doing a lot of partnership consulting with environments that have good people that have been trying to fix things for years. We respect them profoundly for their input and do our best to make sure they get full credit. But there is sometimes political infighting to get the work done and they wind up as sacrificial lambs. I'd love to send some your way: I wish _I_ could hire them, but my team is pretty well staffed and we often have non-poaching agreements.
> Let me try to bring some perspective into the discussion. Lest somebody misunderstand, the very essence of an enterprise (any enterprise) is that it is a bundle of labour and capital whose essential structure and identity is independent of and more persistent than the labour it employs. The identity behind its labour component is no more important than the identity of its capital component.
I'm afraid, sir or madam, that your very opening statements show exactly why engineers will disagree with the entire rest of your statement. You've redefined a common word with a well understood social and legal meaning. Your definition reflects a business school philosophy that does not match either the common or the legal meaning. And it breaks down very, very quickly in the real world.
> It is for this reason that any contemporary HR policy is aimed at (and this is important) divorcing the work from specific individuals.
Nonsense. This guarantees failure in the long run for a tech business. It can work for Wal-Mart or even McDonald's or even non-technologically innovative business, such as spam advertising and domain squatting. There are profound evolutionary economic pressures against it for the more interesting or leading edge technologies. Networking tools and hardware, lab instruments, software virtualization, and systems security are examples that require insight and mastery to improve designs and remain effective and profitable..
> So it's up for debate really, and this isn't a new debate. It's a debate about a basic balance in our society that needs to be realigned from time to time.
And it's vital to know what the debate is really about. Please do not try to redefine basic terms in ways that obscure the actual debates. It's framing the question in a way that is misleading and helps prevent understanding of the underlying problem.
I don't think Apple or Google making phone encryption suck so criminals can find and abuse the law enforcement backdoor would improve public safety.
If it were to suck so badly, yes. But it does not have to...
That said, the paranoid cynic in me suspects, it is — and will be — recoverable already. And the government simply wants us to believe otherwise...
You can encrypt text files as well.
And how exactly would a binary log be any more secure even in that regard? You can have binary streams in stdio as well.
Binary logs are anti-*nix. Rebut that.
Getting to the point. A couple of KVM hosts may have to stay Debian for a while, but my other servers will be migrated very soon unless Debian removes systemd dependencies.
What if I want a straight text log file that requires no other tools? Why would anyone even have a binary log on a *nix system?
If you want binary log files that require tools to dump them to text, use Windows.
Binary logs are also far more secure, but I guess that doesn't matter to you.
That has to be most bizarre justification I've yet read. How exactly is a binary log more secure?
*nix systems have had permissions systems for the better part of half a century. If you don't want someone looking at a file, don't give them permissions, but if they do have permissions, the mere fact that a file is binary isn't an obstacle save to the technically illiterate (who wouldn't likely be looking at a log file anyways).