The Tesla is not a car you buy because you can't afford gas. It is a car you try to afford because it is the best car overall: http://www.businessweek.com/ne...
Until relatively recently, these re-directions would adversely affect a debian/ubuntu linux system update procedure. A cron job would apt-get update and pull in new index files. Since the transport was not encrypted, the index files would not be what the apt system were expecting. It would store the content of the redirected web page instead of the proper index files into a cache and then apt-get update would be forever broken until you manually figured out how to delete the corrupted files someplace in
ISP's and WiFi Access points that do this redirection are the reason why HTTPS everywhere is a good idea.
Additional thought: I wonder if the police would be requesting their own members to be anonymous on the internet?
But that would be authentication between the client and AP.. How would 802.1x on WIFI work when rcmp.gc.ca is the server that has to authenticate the client?
Thanks! That would be a fun experiment to see how much businesses would be affected. Can you even put 802.1x in the wireless access points and cell phones?
They need to submit their request to the International Internet Board of Governors!
I think the fish accidentally a word there with its mouthful of teeth!
(reposted as my account since i accidentally was AC)
The scariest taxi ride I ever had was in the Seattle area, heading back to the Airport after the C++ conference. The taxicab was a Prius which was broken and dirty inside - you could see the airbag. The car's signal lights did not work. The driver was weaving in and out of traffic and just about killed a couple on a motorbike, causing a big road rage incident. The taxi driver was angry that we didn't tip him. If we had tipped him a normal amount, then the total cost of the trip would have been the same as the Uber ride that we took from the Airport to the same hotel.
As a consumer I want the choice to choose a safe, reliable, and trustable source. For me that is Uber.
A more interesting side to this story is how people were able to figure out which airport she was flying to just by googling her name: https://www.twitter.com/Zac_R/status/414249210641653761/photo/1?screen_name=Zac_R
I'm not sure how that was possible by google - but it sure is a creepy thing.
The person who made that tweet ( @Zac_R ) was apparently able to talk to Justine's father before she landed, and took the pictures of her at the airport:
But were they offered that amount in cash? Or restricted shares of some sort which would not be able to be liquidated for a long time in which the value of those shares can plummet?
I thought our Canadian Intelligence was busy guarding our Maple Syrup Reserve.
I personally prefer the ISC license: http://opensource.org/licenses/ISC
Specifically because it does not have the advertising clause - i.e. I do NOT want 3rd parties to be using my company name in their advertising.
Two weeks ago I did an experiment - uber from the airport to my hotel cost $60 including the automatic tip. Taxi from the hotel to the airport was $50!not including tip. The Ã¼ber ride was great, the driver was nice, the car was clean, the trip was safe. On the taxi ride the Prius was falling apart, you could see the airbag peeking out from the hole in the dash, the signal lights did not work, the driver was shifty and allots killed a couple on a Harley by cutting them off on the freeway since the taxi driver was not looking and couldn't signal. The taxi ride was scary. The consensus amongst my group was that uber wins and I don't want to take a creepy taxi unless uber really is not available. This happened in Seattle, three weeks ago.
In this example, X and Y are each providing a different subnet address. Your device just moved to a different network and now has a different IP address. This is not a design error but an appropriate design. Multipath TCP is a standard that allows your device to have uninterrupted mobility.
I still don't understand why apple is exposed to patent lawsuit when their system is based on proprietary extensions to standards.... The existing standards can be used to implement FaceTime point to point - so are these patents really encompassing NAT traversal of UDP??