Paraphrasing the work of Steve Keen;
Taking out a loan to buy something, increases the income of the seller and the supply of money in circulation. A constant velocity of new loans, would result in a constant influence on economic activity. An accelerating amount of new loans will boost the economy and create jobs. The reverse is also true, decelerating loans will cause spending power to shrink and jobs will be lost. And this is borne out in economic data, there's a strong correlation between debt acceleration and change in employment.
Now, since the 60's the level of private debt has been growing, to become a significant force driving the economy. While borrowing more to buy an existing asset does nothing to create real wealth, it does push up asset prices giving us the illusion of rising prosperity. While rising interest payments are draining real wealth from borrowers.
The banking system should eventually go bust. Probably not tomorrow, but all we have managed to do so far is delay the inevitable. The loans they have issued cannot be repaid. The only question is how we are not going to repay them. Either we go bankrupt, or we find some other way to wipe off the debt.
The Great Depression started with the stock crash of 1929, lasting for the next 10-ish years. But it was the rising debts of the 1920's that were the real problem. Through the depression, those debts started to reduce. But it took the huge spending effort and industrialisation, fighting WWII to really eliminate them. Setting us up for the boom years of the 50's and 60's.
Our economic woes will not go away until we deal with the problem of our private debt. We may see another Depression, some parts of the world already are. Or we may see an extended period of stagnation. History doesn't repeat, but it sure does rhyme.
POODLE, BREACH, CRIME etc all require the attacker to control some bytes in the ssl stream in order to deduce other bytes that they shouldn't be able to see. POODLE requires the attacker to change the http url & form post body in order to force the alignment of bytes, BREACH and CRIME are gzip length attacks. Both require the attacker to control bytes in a http request in order to guess the contents of other bytes in the request that they wish to know, like a session cookie.
All of these are attacks on HTTP & SSL, not on SSL alone.
In Australia we forced the utility companies to buy any solar power you sent to the grid using a separate meter, at a fairly high rate to encourage adoption.
Those higher tariffs are now over. So now we pay around 30-40c kWh (AUD, from memory) for mains, and they only pay about 5c kWh for any solar power you provide. But at least you're better off if you can use that power yourself.
... the other guy just sucks.
True, but the world of programming is full of these people. If your entire team is full of them, you won't even realise it.
In Australia Telstra maintain the copper line, if there's a problem you log the fault and they fix it within 2 days or they have to pay you. Unless they file a claim for a natural disaster, which can give them an extra couple days to fix it.
At the other end of the copper, your wire may be patched directly into your ISP's equipment. Though in practice I think there are only 2 or 3 companies running the DSLAM's. Smaller ISP's then lease them per line.
Weston has the potential to clean up the UI quirks, I hope they're headed in the right direction. It's way past time we got rid of X11, it's been holding us back for far too long. If they can't do it, I doubt anyone else will bother.
For 20-ish years windows games have been optimised for windows proprietary drivers, and vice versa. That's a lot of invested effort from both sides, that the linux eco-system hasn't had. Frankly I'm surprised at the recent rate of improvements, but linux is still a long way from parity.
Just because you can prove that there are *some* programs that can't be proven to halt, doesn't mean that there isn't a subset of programs that *can* be proven to halt.
We can build a language / compiler that rejects all programs that aren't provably correct. It might be difficult to get any useful work done, but it's not impossible.
Something like the rust programming language might be more useful in practice. You can still write completely unsafe code, while being careful to limit the impact of doing so.