Set up a slackware server (can even be on high-end workstation class hardware as long as you have a UPS powering it) running SVN Server and apache. There are plenty of good browser based CMS packages available. I like Drupal + Storm, but that's just me. If SQL Server is an absolute requirement, rather than MySQL, set up each developer's workstation with SQL Server Express. TortoiseSVN is a great Windows SVN client that may be easier to set up than git. Using github gives you the advantage of a decentralized repository, but doesn't come with any kind of project management. DynDNS will allow you to register your own box by name without having to pay for a static public IP address and public nameserver. Remember, though, that you don't necessarily have to host your project management and your code repository in the same place. That seems like where you're getting yourself confused.
I think if you polled most religious individuals in the U.S. with the compromise, allow the same legal contractual benefits and obligations to gay couples as to traditional married couples without the word "marriage", a majority of those individuals would accept the compromise. Offer the same compromise to the homosexual activist community, and it would be soundly rejected. This battle isn't about legal rights. If it were, I don't think there would have been any media attention or activism against Mr. Card or DC Comics. It's about the conformity, and any idea that violates the currently accepted conformity must be silenced. Perhaps we would all do well to reread Orwell's 1984 in light of our current cultural and political attitudes.
I am a math tutor, paid a tidy sum to correct the errors that most teachers make. Test yourself: start counting to 20. Now do it backwards. What number did you start with? Odds are that you started and ended with 1. This is the first mistake, that nearly every teacher makes all the way back in preschool and primary. You always start with 0. Zero means origin. Consider a full number line (1-dimensional) or 4-quadrant graph (2-dimensional). The center of the line or graph is marked zero (or 0,0 in a graph). Starting with 1 is fine as long as all you're doing is basic arithmetic. As soon as you get to fractions, everything falls apart. Consider, we think of 2+3=5; but really what we're doing is 0 +2 +3 = 5. Notice that the sign is attached to the number as opposed to being exclusively an operator. Having the correct starting place is critical to proper numeracy. The second error is even more fundamental. Most inability to perform arithmetic is psychological. If people learned a mantra, such as "If you can count, you can do math(s). Everything else is a shortcut," it would reinforce the notion that math is nothing more than a language to describe relationships. And all the other operations can be reduced to repeated counting. Once the basics are covered, the rest can fall into place much more easily.
theodp writes "Harvard Law School Prof Jonathan Zittrain explains in The Personal Computer is Dead why you should be afraid — very afraid — of the snowballing replicability of the App Store Model. 'If we allow ourselves to be lulled into satisfaction with walled gardens,' warns Zittrain, 'we'll miss out on innovations to which the gardeners object, and we'll set ourselves up for censorship of code and content that was previously impossible. We need some angry nerds.' Searchblog's John Battelle, who's also solidly in the tear-down-this-walled-garden camp, adds: 'I'm not a nerd, quite, but I'm sure angry.'"
Ditto the parent. NYC Server still sluggish. I've added a mirror: http://hickoryservices.com/sites/default/upload/hurricane_map_english.pdf
I am the poster of the above comment. I had no intention of posting anonymously, just forgot to log in before doing so.
An anonymous reader writes "TransGaming Cedega, the software forked from Wine that allows running Windows games under Linux, is being discontinued and replaced by GameTree Linux. This new software is also free. From the new website: 'TransGaming is pleased to announce the continued development of Cedega Technology under the GameTree Developer Program. This repositioning of the technology that powered the Cedega Gaming Service will allow the entire Linux community to gain free access going forward. Cedega is a cross-platform enablement technology that allows for Windows-native games to be executed on both the Linux desktop and embedded Linux platforms.'"
Someone else may have caught this and it got buried in the deeper replies, but I find the 4 2-digit numbers to be very interesting. 74.14E 35.74N is right in the mountains of Pakistan controlled Kashmir. The second part of the message with the names is simply a phonetic spelling of the first part of the message. Naimina has several possible references, #1 on my list of likelihoods would refer to the owner of a website design company of that name targeting the Turkish language. No guess what 93 882 is - probably a predetermined instruction code undecipherable outside the network.
There is a general rule of law in the United States based on the concept of a "reasonable adult". Each of the first ten amendments of the American Constitution (and their analogues elsewhere) comes with the unwritten assumption that a reasonable adult will use these freedoms for the betterment of the community. The right to bear arms does not grant me the right to murder my neighbor because I don't like the car he drives. The right to peacefully assemble and protest the actions of government does not grant me the right to riot and destroy the property of others. In this case, the right to free speech does not grant the right to make false accusations. Despite a more liberal interpretation of law in recent years, slander and libel are still criminal acts, not protected by the first amendment. Would a reasonable adult consider J.L.'s parody to hold any truth? Probably not. Would a reasonable adult consider J.S.'s fake profile to hold any truth? Considering the forum on which it was placed, I would have to say yes, as there have been numerous instances of principals and teachers creating just such a profile. Therefore, the issue isn't whether schools have a right to police students' activities outside of school; but rather if actions taken in the world of cyberspace can or should be held to the same standards as those taken in print or public discourse.
MrKevvy writes "The Canadian Human Rights Tribunal has found that federal hate-speech legislation violates the Canadian Charter of Rights and Freedoms, the equivalent of the US Constitution's Bill of Rights. This decision exonerates Marc Lemire, webmaster of FreedomSite.org, but may have farther-reaching consequences and serve as precedent for future complaints of hate-speech."
theodp writes "If you're brilliant, work really hard, and earn a world-class doctorate from a US university, IBM has a job for you at one of its US research sites — as a 'complementary worker' (as this 1996 piece defined the then-emerging term). But be prepared to ship out to India or China after you've soaked up knowledge for 13 months as a 'long-term supplemental worker.' Newsweek sketches some of the bigger picture, reporting that IBM, HP, Accenture, and others are finding it profitable to detach from the United States (even patenting the process). 'IBM is one of the multinationals that propelled America to the apex of its power, and it is now emblematic of the process of creative destruction pushing America to a new, less dominant, and less comfortable position.'"
puroresu writes "Scientific American reports on the efforts of Selmer Bringsjord and his team at the Rensselaer Polytechnic Institute, who have been attempting to develop an AI possessed of an interesting character trait: pure evil. From the article, 'He and his research team began developing their computer representation of evil by posing a series of questions beginning with the basics: name, age, sex, etc., and progressing to inquiries about this fictional person's beliefs and motivations. This exercise resulted in "E," a computer character first created in 2005 to meet the criteria of Bringsjord's working definition of evil. Whereas the original E was simply a program designed to respond to questions in a manner consistent with Bringsjord's definition, the researchers have since given E a physical identity: It's a relatively young, white man with short black hair and dark stubble on his face.'"
zokuga writes "The US government recently approved an $18 million contract for Smartronix to build a website where taxpayers could easily track billions in federal stimulus money, as part of President Obama's promise to make government more transparent through the Internet. However, the contract, which was released only through repeated Freedom of Information Act requests, is itself heavily blacked out. ProPublica reports: 'After weeks of prodding by ProPublica and other organizations, the Government Services Agency released copies of the contract and related documents that are so heavily blacked out they are virtually worthless. In all, 25 pages of a 59-page technical proposal — the main document in the package — were redacted completely. Of the remaining pages, 14 had half or more of their content blacked out.' Sections that were heavily or entirely redacted dealt with subjects such as site navigation, user experience, and everything in the pricing table. The entire contract, in all its blacked-out glory, is here."
The Walking Dude writes "The International Commission on Nuclear Non-proliferation and Disarmament (ICNND) has released an unclassified report exploring the possibility of cyber terrorists launching nuclear weapons. Ominous exploits include unreliable early warning sensors, unsecure nuclear weapons storage, transportation blunders, breaches in the chain of command, and the use of Windows on nuclear submarines. A traditional large-scale terrorist attack, such as the 2008 Mumbai attacks, could be combined with computer network operations in an attempt to start a nuclear war. Amidst the confusion of the traditional attack, communications could be disrupted, false declarations of war could be issued on both sides, and early warning sensors could be spoofed. Adding to this is the short time frame in which a retaliatory nuclear response must be decided upon, in some cases as little as 15 minutes. The amount of firepower that could be unleashed in these 15 minutes would be equivalent to approximately 100,000 Hiroshima bombs."