This is sooo easy to solve. Why don't you, who claim no issues with a quad copter, let someone else drop one on one of your family members that you care about. Around 8 years old - or 80- would be good. No need for all this maths n stuff. Let me know how that works out.
Linus - My observation is that folks who're blindingly successful have a degree of asshole-ness to them. Jobs, Gates, Musk, Torvalds. Probably the US founding fathers, and Einstein and Edison. All the right degree of 'f em, I know what needs to be done.' Is that a correct assessment of you? do you have an external face, and one that is the more real you, or are you an asshole through and through?
I'm not slightly a DNA expert, so this is a question for those who may be. But doesn't the DNA in the seeds degrade ? Does storing them in a vault protect them from stuff that makes them degrade? if not too expensive, the concept is interesting. tho, with our nascent ability to inject DNA into another cel, wouldn't we be better off storing both the seed, and a copy of the dna for that seed, stored digitally (or carved in stone).
I'm not slightly self-righteous. (so I'll pass on that dildo). However I am selfish. So I'm entirely down with you smoking, drinking, praying & driving, all to excess. Just don't endanger me. Or ask me to subsidize your cancer treatment , or pay for your car wreck.
You're brilliant! So poison the well by grabbing pics of folks that you know - but might not like, or pics of public figures. Put 'them' in gay bars, kkk ralies, with hot girls, etc. Watch hijinks ensue. Wait. Someone here has to have done this already.
I would have been more impressed if he said "we're considering ways to limit lawlessness without compromising the premise of protection of citizens in dangerous parts of the world" "Tor can be used for good and for evil. How do you go about attempting to design the features of Tor to maximize one and minimize the other? Lewman: The Tor network is designed to provide protection online for ordinary citizens, victims of abuse, and individuals in dangerous parts of the world share information over public networks without compromising their anonymity. Most of the people that use Tor have legitimate uses for wanting privacy such as activists or reporters that need to keep their locations private. Criminals can already do bad things and there are certainly lots of options available to them for breaking the laws."
great point. However, bullies don't bully just one. If they went to the suspected source, then they'd have broader evidence. If the parent of the suspected bully was to allow, as they'd not want their kid to bully, that'd be 'ok.' I say this all noting that this is way over the line of where school can mandate a kid do something. But also noting that - like it or not - you've effectively 'lost' the powers that be at the school. Your ability to ask for a teacher, take the kid out of school early, etc, is shot. That's called 'life.'
In other news, nerds flock to progressive insurance and claim safe driving styles resulting in the lowest possible insurance rates. Progressive in press release say 'we hypothesize it's because nerds don't party or stay out late'
Thanks for taking the time to post this. I'm glad your post was modded up. I have a casual, uneducated interest in things in space, and snippets like this are interesting to me. (unlike a lot of
/. posts, I'm not being sarcastic)
guess it's implicit that nerds care about freedoms, given all the blathering about DMCA, and wiretapping, and wikileaks and what's his name in russia and all. Just another 'stuff that matters' , which, IMO, belongs on huffpo, not here.
my gut tells me that there's lots of us out there who miss our bberry keyboard
... whilst still loving the apps that android gives us. I'd pay more than what I do for my samsung for a well made, slide up, vertical keyboard and bberry battery life.
if you're replying to me (not sure from the
- my point was that wiretap warrants are issued all the time - a quick google sez there were ~ 22K issued - so why was this one of interest? I was actually wondering what made this /. worthy. An AC posted that it dice acting just like huffpo, finding the buzzwords (wiki leaks) which'd appeal to the /. audience
----- My second point was, that like another poster, this one seems to be done the 'right' way - it's on the books for who did it, why, and can be challenged. Wiretaps, performed legally, *are* part of the law enforcement process.
Seriously. Is it cuz the tap is for wiki leaks? If this is 'just' a warrant, why is this
The thought that a few, decently intelligent , disgruntled *individuals* , coupled with the 'destructive' nature of the attacks I think scares the crap out of govvies. Call it cyber-vandalism, -terrorism, or -war, the act of public destruction and 'outing' is what has made this attack a 'game changer.' State funded threat actors have been spying for years. They've mostly - the stuxnets aside - have stopped short of destruction that they're all capable of, and 'just' xfilled credit cards, or secret formulas. Think what the Target attackers could have wrought by bricking the POS terminals. So if you're a govvie, it's natural to presume that a whacky - but funded - state threat actor is behind this, as the thought of a handful of individuals is just too scary. Do any
/. ers know what security product stuff that Sony deployed (which missed all of this )? I'd love to know their host based AV and HIPS, and their network FW, IPS, 'APT ' detectors/protectors.
Mandiants managed defense does this as well. As did the Incident Response actions that any responders do when they try to understand *what* was xfilled. So, get over it. IBM is just limiting liability.