Link to Original Source
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Link to Original Source
One solution is for Cisco to produce network products that use external storage instead of internal chips for firmware storage. Have the customer download a firmware image from a source outside of the US and "burn" that onto a SD card (or whatever medium is to be used). The card is then inserted into the Cisco device which is now ready to use.
I understand that the Cisco system would still require an equivalent of a bios in order to initialise the card reader but as the bios would only need to initialise the card reader and none of the network hardware, it could be fairly securely isolated to prevent hacking at that level. Also the firmware (on the SD card) could checksum the bios in order to detect modifications and prevent initialisation of the hardware, resulting in a brick.
Don't buy a giant phone.
There will always be stupid dickheads in every aspect of life. Some of these dickheads have managed to get in a position of influence, usually we call them politicians but they do appear in other places as well.
You just got to love it that in a supposed "free country" like America, people are being fined for using a mobile phone while walking, yet in a country that is perceived as having a heavily controlled population, they are providing safe areas where people are free to walk and use their phone. Interesting.
So, of the tree listed examples, only the first one is a valid test. why?
- The Simpsons is not funny, hence a simple call to sleep(1320); would correctly identify all times to laugh (based on a 22 minute episode)
- The first rule of Ikea is that you don't read the instructions. If a bot was to read the instructions, then it could be determined that it is not human. Further to that, of the humans that do read the instructions, they are usually incapable of interpreting the glyphs on the (single) sheet. Therefore, if an individual (be it human or bot) could correctly fulfil the third example, it must be a bot.
After reading the article I have a question, how does a bomb squad detonate a non explosive device? Or did they strap the explosives to the device (and hence the bridge) and then detonate them?
Perhaps there are not many girls in IT (any fields) because it is a shit job in where the smartest people (the devs) are always told what to do by the dumbest people (the managers).
Devs are require to build a bridge at a level not much higher than the molecular level without proper instructions and with the possibilities of huge structural changes that would result in either an unstable system (dev's fault) or a broken system (dev's fault) or a system that does not match what the customer thinks they want (dev's fault).
Fuck, if I could do my time again I would be as far away as possible from computers.
It's obvious that Amerika is performing a DDOS attack on North Korea because I once saw some text in a file that was written in Amerikan english.
Curiosity has no one to blame. NASA proves that "he who smelt it, dealt it"
This reminds me of the indestructible passports found in the rubble at ground zero.
Or what about this... the malware was created in South Korea by a phone manufacturer / electronics company that competes with Sony?
Nah, they're friends with Amerika.
So, not only are they going for binary compatibility, but also stink compatibility. cool.
Won't someone think of the y!
I'm not schizophrenic as I know aliens control my movements and they are not just hallucinations.