Not necessarily: to come to this point, you need two things: development quality, and auditing quality. The first to create, the second to discover, the bugs. The second is what you get plenty of, in the open source world, presumably. But you assume that an open source developer is just as good as a closed source developer. That might not necessarily be true.
I dread to think: what's the IRL equivalent of a shadow-ban?
He was just testing out to see if slashdot has started transmogrifying posts through filters yet.
You're absolutely right. s/functional/declarative/g; However, you're also wrong: SQL definitly *is* a declarative language.
HTML is a functional, not an imperative, language. Perhaps the reason that you don't recognize this, is that you never knew there is such a thing as a functional computer language. Both types of computer languages tell a computer what to do, but they do it each on their own level. Functional languages don't care how a problem is solved, as long as it is solved. Another example of a functional language is SQL, another example of an imperative language that renders graphics as its core business, is postscript.
1) It's beautiful hardware. 2) I don't want to run an OS that the NSA can simply summon the passwords of.
With IPv6 the IETF has shown that they're on a long path toward oblivion. Too many cooks in the kitchen.
Governments need to make their jobs cushy, because a) they are already fraught with risk, b) they couldn't afford the salaries if they weren't this cushy. Protection from being fired is part of the job.
Article seems like a bunch of selective quoting in order to make someone look bad. An anecdote by a speaker, a confused musing by some scientist, and all of a sudden we have faux science created by unabashed nationalism. Right.
Huh - DDoS traffic looks like a virus signature now?! An IDS filters traffic based on (pre-distributed) rules. They look for virusses. DDoS traffic is legit traffic, but just too much of it. I don't see how you could stop a DDoS on a router by turning it into an IDS.
I'm not saying it's the begin-all, end-all solution. I'm just saying that until you have an AI algorithm that can discriminate legit traffic from illegit traffic, you're forced to use something that will, in effect, transfer your firewall rules upstream. It would have to be combined with other measures (monitoring point-of-origin networks, anycast, ISP application specific logic (eg. TCP traffic shaping of ISP client hosts' SMTP traffic)).
Send some sort of ICMP message upstream that indicates your maximum capacity for handling traffic. It's a DOS vector in itself, but you could minimize it.
"Your center detector needs re-calibration (travel anywhere in the world outside the US). All media in the US is right to far-right."
Your rest-of-the-world detector also needs some recalibration: that's old school. The rest of the world is getting significantly more right-wing at the moment, while pubilications such as Slate thrive in the US.
It's much worse. If the NZ authorities fail to turn over Kim DC, the filming of the next Tolkien epic won't be allowed there.