You know I think they have a point....
So when someone says it would cost an arm and a leg, we now know that is $200.
Thanks for the info!
On a more serious note, anybody have an update on
Did this project take off?
Read the comments on CNN. Most of the best one-liners from "Airplane" are there.
Nice for a morning laugh
Correct, an orbit is a lot harder than just achieving an altitude.
I do however, disagree with you about the conclusion you are trying to prove with your analogy.
If you have never built any sort of a vehicle before, evolving from the toy stage through many many many steps to a formula 1 car may actually be a logical process, and therefore is relevant.
Likewise, a progression from earthbound to an orbiting space station and beyond, may include a developmental step of placing a monkey in a missile.
Canada indeed has a couple laws that would be relevant
Most relevant, The Criminal Code section 342 "Unauthorized use of Computer" http://www.efc.ca/pages/law/cc/cc.342.1.html.
This criminal code section is subject to colour of right, meaning if you have permission from the system owner to perform testing, this section and owning the tools to perform this section become OK. If however you do not have permission, the investigation into this breach could expose other CCofC violations probably section 430 "Mischief", Section 351 "Possession of Break-in instruments",. as well as something from sections 354-360 which are the possessions of proceeds of crime sections.
Side note, don't break-in using any technique that involves intercepting someones communications (eavesdropping, man-in-the-middle) as that falls under privacy laws (CCofC 183-196) which are much more strict and can't be waived by the system owner, only by the sender or recipient of the communication.
IANAL, but for this case I would say the first time he found the vulnerability, there was no intent to commit the crime, he stumbled across it. The second time he was checking the other system to see if the flaw was there which seems like an unauthorized use of computer system. If he had asked the system owner (or manufacturer I suppose) if he could perform tests to ensure the flaw in the system would not be made worse by his code or his system would not be affected by the flaw, he would have been on better legal footing.
and once more IANAL
CCofC = Criminal Code of Canada
IANAL = I Am Not A Lawyer
Running an anti-virus does not provide 100% protection, it does however provide infinite times as much protection as not running one.
I wonder what the impact on ride quality would be when you pick up a large piece of metallic debris, like say an exhaust system that rusted off.
This wouldn't happen often, but would be interesting when it did.
According to the Jargon file 37 is the most random number.
Yup, if you dont want people to know the information, dont post it publicly. Seems simple enough to me.
So if I don't want to get stalked I... shouldn't go outside?
Or connect to networks. But wait, aren't networks Cisco's business? Perhaps they are just after the exhibitionist market.
Step aside, or I'll have to use my telepathetic powers.
You would have just thrown the Cannon copier into a Star Trek Logic Bomb death spiral. Your post talks about reproduction and RPGs. Does not compute....
I have done a little research on the effects a hot girl's boobs have and indeed for most males there are some outwardly observable signs.
Upon closer examination a typo was found in proposition 8 that limits marriage to being between one man and one wolfman.
With voice communications thrown into the mix, mobile users can stay in touch while roaming the property inside or out, and even on the road. The acceptance of the fixed to mobile convergence concept by the telecommunications industry only promises to fuel the fire for the adoption of VoIP over WiFi networks.
The Challenges of Implementing VoIP over WiFi Networks
As with any emerging technology, there are challenges to overcome. The development of the converged network, i.e. data and voice on the same IP based LAN, while yet to be an established norm, is proving to be beneficial for businesses from both a cost and productivity perspective. Adding the prospect of VoIP over a wireless network brings up a whole new set of issues.
VoIP is a time sensitive technology. Calls must be set up and authenticated, and voice packets must arrive at their destination without interruption and on time. This requires a near continuous network stream, uninterrupted by less sensitive data transmissions. The implementation of Quality of Service techniques on wired LANs assure that these voice packets receive priority, and call quality issues such as latency, jitter, and packet loss have been sufficiently addressed.
Enter the standards based wireless network, a technology in an earlier stage of development, and more challenges occur. While today's wired network provides plenty of bandwidth for both voice and data to coexist, WLANs provide less bandwidth, and Quality of Service issues must be revisited. Security measures such as authentication and encryption must be implemented and can add to the problem by increasing the size of the voice packet. Additionally, users on the move will traverse wireless access points where handoffs must be quick and smooth.
The IEEE 802 standards governing wireless technology are evolving rapidly and promise to deal with a broad spectrum of WiFi issues (see sidebar). Increasing the bandwidth available, prioritizing voice packets for QoS, authentication and encryption protocols for security, and enhanced roaming techniques are all being addressed.
Also in development is the wireless technology commonly known as WiMax, providing for the implementation of high bandwidth wireless communications covering distances of up to 30 miles. The evolution of WiMax could prove of great consequence to developing countries, as well as Metropolitan LANs.
Security in a VoIP/WiFi Network
Companies wishing to implement wVoIP must take security issues into consideration from the start. As in any IP network, the dangers of hackers, denial of service, highjacking and spam, all lurk in the shadows.
Because a wireless network uses radio frequencies as its transmission media, the security normally provided by a firewall in a wired network is not sufficient, simply because of the physics. Whereas to break into a wired LAN requires hackers to either physically be inside the network or to hack in through the Internet, in a WLAN they can grab network transmissions from the air while parked across the street. The security issues that network managers must consider in a VoWLAN are the privacy of conversations, and the protection of the network infrastructure.
For WiFi networks, security has had a shaky start with the implementation of WEP as its security mechanism. WEP provides for authentication and encryption between the user and the access point, and was found to be easily hacked. The 802.11i standard, adopted as WPA2 (Wireless Protected Access), provides for more robust security by requiring two way authentication between the user and the network, and uses AES (Advanced Encryption Standard) as its encryption engine.
As network managers plan the rollout of a wireless VoIP network, the greatest security threat they face is improper implementation. Building security into the design of the initial deployment can, and should affect the network topology, as well as material costs. Failure to do so could lead to further expenses in loss of services and network redesigns in the event of compromise.
WiFi, VoIP, Fixed Lines, and the Cellular Networks
Manufacturers of cellular devices are incorporating WiFi radios into their handsets at an ever increasing rate. New versions of mobile operating systems are coming out complete with a built in VoIP stack, inviting carriers and manufacturers to add VoIP functionality to their devices. Dual and Quad band cell phones can choose between the strongest network available, cellular or WiFi, and place a call accordingly.
As cell phones become more like mobile offices, the benefits of a mobile work force become apparent. In the case of the road warrior, the ability to communicate via email, text messaging, video or voice, allows them to stay on the road longer without losing touch. In the age of instant information, mobile office applications allow files to be downloaded, edited, and uploaded, increasing the productivity of the traveler to the point where just about anything that can be done in the office can be done on the road.
A cell phone that can switch between cellular and WiFi networks can significantly reduce telecommunications costs at the corporate office. With WiFi hotspots popping up at hotels, cafes, and corporate LANs across the globe, mobile workers can stay in touch with office and family both on and off the job. With the addition of a VoIP service provider, cheaper VoIP calls can be made from any WiFi network at the push of a button.
Imagine if you will, a future where one phone, with one phone number, can seamlessly traverse cellular networks, WiFi networks, cable and PSTN landlines. Where roaming and switching between disparate networks occur without interruption or loss of call quality. Fixed Mobile Convergence (FMS) is the buzzword of the decade, and the IP Multimedia Subsystem (IMS) architecture is the standard that promises to get us there.
The goal of IMS is to provide all the services and applications that the Internet provides, both current, and as of yet unimagined. IP based services such as VoIP, Push to talk cellular (POC), videoconferencing, text messaging, community services, presence information and file sharing are just some of the possibilities. Designed to work with any fixed, mobile or wireless packet switched network, backwards compatibility for the legacy circuit switched phone system is provided through the use of gateways.
Although still in its infancy, IMS is already being implemented by AT&T as the platform in its newly acquired Cingular cellular network. Interest in investing in a new infrastructure by mobile and fixed operators has been up and down, as they weigh the costs and benefits of the new technology.
As the technology of VoIP over WiFi networks continues to develop, businesses of all sizes can reap the benefits of increased mobility, productivity, and significant cost savings. Standards committees are constantly working on ways to increase security and quality of service, and as fixed mobile convergence gains acceptance in the telecommunications industry, more choices in the services offered and the IP applications available to businesses are sure to follow.
What will also be interesting to watch, is how these very bandwidth intensive applications will be priced by the carrier networks, and how it will affect the neutrality of the Internet."