I've heard some of that near verbatim from senior management whenever a new security measure is introduced.
what land is this you live in?
No, seriously upper management has ALWAYS been the bane of anything IT related. Every boneheaded request, every response of "well, why can't I do that?" or "... it would just be easier for me that way..." always comes from senior management and no matter how many times you tell them why it has to be done a certain way, they just don't get it.
I caught a VP of one of my former employers surfing tumblr for pics of women that flash their tits in public and ONLY that. He was very consistent when looking for these pics. I got wind of it when I was given access to our Solera Deep See box right after being brought in. I monitored his activity for a week then checked his past activity and, sure enough, big tits flashed in public. Used a tool to capture his IE history: Big tits flashed in public.
I've seen execs that liked to search for wierd stuff, and they're all usually very specific on what they surf for.
Many of you have probably forgotten about this incident that drew attention to the FBI's ability to turn on a phone's features even while it's off. I would assume that the two (baseband processor and "roving bug") are connected.
the ED-209 was the mech that went crazy at the beginning of the movie. The one that looks like it was the model for some of the Mechwarrior mechs.
In 2020, I would expect nothing less than armed Mechs patrolling the streets. Not some American OCP ED-209 garbage either, no, only a sleek and shiny Gundam, Veritech, or some other type of mech will do.
I mean, Samsung is hardly the first company to release this sort of thing. Devices like the Z1 android watch have been around for some time from China for quite some time now and there's a glut of GSM based watch phones coming from there as well.
You change the mac address by either changing the device you're using or spoofing it. The purpose being to be able to access Hulu again.
Exactly what are you getting at here???
or, if your current router supports changing the MAC address do that and get a new IP. It really isn't that hard to get a new IP from your ISP without calling them up.
I don't get it. Using a video card to render without the video card? Since so many machines on the market have 2+ cores, why not write a software renderer that will sit on one of the extra cores?
A computer from 2000 would have trouble with opening the photos in a best of vacation album from a low bend camera for editing (8 megapixels is 22 mb/image).
In 1998, I ran a self built Cyrix 6x86MX PR200 based machine with a mind bending 48MB of RAM. With Win95b installed, I worked on extremely large (for the time) game backgrounds for a small startup company. I had no problems opening up files approaching or greatly exceeding the 8MP size of today's cameras. There was a lot of paging and whatnot, but it was still workable under Photoshop 4.0.
I have in service right now a Dell Optiplex GX200 w/933MHz P3 w/1GB PC800 RDRAM (built in 2000) Running Windows 7-32bit. It handles 9MP pictures nicely. thank you very much.
Recruiters are too lazy to determine whether a person who's last position as "Enterprise Data Architect" where listed skills are scoping, implementing, and managing DB2, MS SQL, and Oracle instances requested by internal clients has the skills necessary for their company's "Database Administrator" position.
I read this as "Do the work for HR/Recruiters, they're not intelligent enough to do it themselves".
You contradicted yourself.
Google has been revealing (via their own transparency reports) that governments want your searches, email, and whatnot that are stored on their servers. Twitter is telling people that the governments are doing the same. I don't think it'll really hit home until Facebook follows suit. Only then will people really "get it" that the government is mining the details of your online life to do whatever they want with it.
I said this before on here: Big Brother was made "cool" and the public welcomed it with open arms. In this case, FB, Twitter, and anything else on the internet along with your cellphones and now your televisions.
... delay the inevitable.
Every new security feature they can dream up can and will be bypassed with enough time.All they can do is build it hard enough that it takes more time to crack.