Forgot your password?

Comment: Re: name and location tweeted... (Score 4, Informative) 591

Airports are NOT public places, particularly the Gates at airports.

They are called places of public accommodation just like restaurants. There is zero expectation of privacy for the employees in areas where there is customer access. Members of the public have access to them. Specifically... any members of the public who have paid a fee and obtained a ticket.

Comment: Re:STEM is the new liberal arts degree (Score 1) 162

by mysidia (#47524179) Attached to: For Half, Degrees In Computing, Math, Or Stats Lead To Other Jobs

and have used the calculus and statistics required for my CS degree precisely never. And honestly there are hardly any professions that need either of these disciplines.

It's not that everyone absolutely has to have the knowledge to get by: it's that it is useful.

You use it, or lose it.

Chances are, in one way or another --- what you learned in Calculus helped you.

Either that, or you never really learned calculus, or you just did the homework, and you forgot about it after the test: instead of exploring.

Things you learned there can make your job easier now, or they can help you accomplish some tasks faster or more accurately, and maybe even do some things you couldn't do otherwise, if you actually learned and retained them.

Don't tell me you write computer software and never had a need to numerically approximate a figure or categorize something probalistically, such as... is it Spam or Not spam? What's the best route to draw on the map to give your user some driving directions?

Which product is the most relevant to recommend to this customer?

Comment: Judge should accept privacy violation as damage (Score 2) 166

by mysidia (#47514285) Attached to: Privacy Lawsuit Against Google Rests On Battery Drain Claims

This would be like suing a hacker who formatted your company web server and the judge refusing to accept the argument that the damage was harm to reputation and loss of business, and instead only accepting the claim of increased electric bill and wear/tear on the hard drives.

Comment: Re:DON'T PANIC (Score 3, Funny) 95

by mysidia (#47504927) Attached to: Researcher Finds Hidden Data-Dumping Services In iOS

The only secure Android phone is what is running Cyanogenmod.

No... the only secure Android phone is the one you pulled the battery out on.

iPhone is trickier... since there's no removable battery: it is very hard to secure. Best bet is to wrap it in tin foil and let the battery drain down on its own, then when it reaches 0% it will be secure

Comment: The schools' major mistake (Score 1) 285

by mysidia (#47504751) Attached to: How One School District Handled Rolling Out 20,000 iPads

Is having the county itself provide internet connectivity. We already know that doesn't work.

Don't do that! School districts' should be provisioning their own upstream connectivity.

This is not the type of thing that the county should be handling.

The answer is simple..... put internet services out for bid and buy a big bandwidth contract for the school district.

Yes it's expensive..... it's where a majority of the cost of 20,000 iPads goes.

And it's not fair to be leeching off the local government's resources or forcing 100 school districts to share a limited pipe that cannot reliably meet the requirements.

Comment: Re:Ummm... (Score 1) 18

by mysidia (#47504607) Attached to: The Loophole Obscuring Facebook and Google's Transparency Reports

Yep. The Canadian enforcement bureau wants to see some information... so they make a request to the DOJ.

The DOJ then makes an order for Google to deliver that information to them.

The DOJ looks over the response, and saves a copy of all the juicy data for later reference, just to see if there's anything that might interest them in the future, then they bundle it up, attach it to an e-mail, and forward it unencrypted to their Canadian buddies..

Comment: Re:Local testing works? (Score 1) 774

by mysidia (#47504343) Attached to: States That Raised Minimum Wage See No Slow-Down In Job Growth

But what about when you can't prove date of hire?

I have no hatred towards the individuals. The point is to punish the employer, thus eliminating the market that is causing some businesses to effectively invite large numbers of illegals to come in and work for money under the table under illegal employment conditions.

Why not enfranchize the migrant population. Let's open the borders, and adjust benifits for non-citizens.

The illegals are only able to get work since they can work for such low wages. You could also eliminate the problem of illegals by exempting certain specified non-skilled jobs or completely untrained workers from minimum wage requirements.

The illegals can't be "enfranchized," because this would effectively disqualify them for the jobs that the market wants illegals for ---- which are jobs where they illegally pay undocumented workers below minimum wage. Above minimum wage, they are competing with legal residents for jobs, which causes problems, but most illegals do not have training or skills beyond the simplest of labor.

Give everyone who isn't a violent criminal and who wants it a path to citizenship. Get everyone on the tax rolls, and out of black markets.

I believe that's the case already --- there is a path to legal residency and citizenship available, which many immigrants take: the illegals are just getting an unfair shortcut by ignoring the processes established and required to become a legal resident.

Comment: Re:Warrants are supposed to be narrow (Score 2) 150

by mysidia (#47502823) Attached to: New York Judge OKs Warrant To Search Entire Gmail Account

but they'd certainly have enough evidence for a search, and they could keep a record of any potential weapons seen in the house in case forensics can later get them a better description of the weapon used.

They wouldn't have probable cause to visit every apartment in the building and cease every blunt object in the house from every tenant and take it to the lab for analysis. And from the public there is a simple answer to this illegal search behavior.... Jury nullification. If this person comes before a jury charged with a crime, and I find out about this illegal search; I will almost certainly reach a finding of not guilty, regardless of the facts of the case.

Not a single citizen is required to tolerate an illegal unconstitutional search or assist in a law enforcement action tainted by such misbehavior of police and judges.

However, with a service such as Google there is a simple answer. Order them to preserve and not delete any e-mail for the user within the potential time frame

Then when they have enough evidence to specify the thing to be searched or the particular objects to be seized, without first conducting an illegal search, they will be able to get a legitimate warrant and inspect the preserved materials.

Comment: Re:rfc1925.11 proves true, yet again (Score 1) 83

by mysidia (#47502483) Attached to: MIT May Have Just Solved All Your Data Center Network Lag Issues

To be honest, I've see this, but only when migrating VMs off host for host Maintenance, or a boot Storm on our VDI.

Maintenance mode migrations are pretty common; especially when rolling out security updates. Ever place two hosts in maintenance mode simultaneously and have a few backup jobs kick off during the process?

Comment: Re:Local testing works? (Score 1) 774

by mysidia (#47497819) Attached to: States That Raised Minimum Wage See No Slow-Down In Job Growth

My state has a law that any employee can demand to be paid in legal tender

An employer does not have to own or directly provide the legal tender themselves under any circumstances; an employer may deliver to the employee a cheque payable in full for legal tender, from their bank or other financial service provider, which is standard practice in every industry, essentially.

And the direct payment of cash as wages is a bit suspicious, but I only suggest fraud should be assumed if it has already been shown that the employer hired undocumented workers and an investigation of their documentation and private interviews of their employees suggest the possibility of deception by the employer; for example, a large amount of revenue generating activity being completed requiring labor, with little ability to produce sufficient paycheck stubs and show tax witholdings to adequately account for work completed.

Comment: Re:Time to get rid of Tor (Score 1) 122

by mysidia (#47497013) Attached to: Critroni Crypto Ransomware Seen Using Tor for Command and Control

Tor has value, BUT it has no proper place running behind the firewall on the corporate intranet or in the home within the developed world -- it is a huge security risk, and it makes sense to block tor completely.

Tor has value for some people living in tyrannical regimes where free speech has been outlawed and internet users have a jealous government to worry about who may object to what they post or read, and may threaten them or their families based on it.

However.... these users also need some sort of VPN or anonymized onramp to get onto Tor, or else they may be busted for the crime of using Tor.

Comment: Re:For those that don't know: (Score 3, Informative) 112

by mysidia (#47495959) Attached to: Domain Registry of America Suspended By ICANN

Is that not disclosed in their Terms of Service or is it more like, "big boobs on TV so I didn't bother to read the agreement"?

Hi. Compliance with the accredited registrar policy is not optional; it is part of a signed agreement between the registrar and ICANN. ICANN posted an advisory clearly alerting registrars to their obligations: 1. Registrars are prohibited from denying a domain name transfer request based on non-payment of fees for pending or future registration periods during the Auto-Renew Grace Period; and 2. A registrant change to Whois information is not a valid basis for denying a transfer request.

GoDaddy adopted practices that were directly contrary to the ICANN policy.

It doesn't matter if GoDaddy disclosed it in the terms of service, the ICANN terms have priority: the practice was a violation of policies that accredited registrars have promised to adhere to, before being allowed to be accredited registrars, and before being able to maintain that status and any access to the registry database or the ability to be in the business of transferring or creating domain registrations.

"Summit meetings tend to be like panda matings. The expectations are always high, and the results usually disappointing." -- Robert Orben