My landline does text-to-speech on any SMS sent to it, which works fine for the 2-factor schemes I've run across that use purely numeric codes. Have you tried sending an SMS to your land line to see what happens?
That's pretty much how Linux does it as well, for libraries that do backwards compatibility at all. You provide a file that tells the ELF linker which version of an exposed api method links to which internal implementation. The linker embeds the library version linked against into the executable and voila, your program can run against a newer version of the library with no expensive, bloated vm infrastructure required.
If you have committed a crime depends on where you are. Around here fuel oil is a hazardous waste and it is illegal to put it into the sewage system - it needs to be taken to a waste station.
This is bullshit. Even if they did have some dirt on every member of congress unless you only elect rapists and murderers there is no way that that kind of mass blackmail would work on the people holding the purse strings. The NSA continues to exist because they are useful. They provide information intelligence your leaders want, and this sort of mass surveillance means that they can provide information on anyone, even someone they didn't know would be interesting a day ago.
No, not at all. If you modify GPL software you don't have to contribute anything. If you distribute the changed software then you must make available the source code to the people you have distributed the binary to, and you must license it in a way that is compatible with the GPL. So if I take GCC,fix some bugs, and sell it I must give my customers the source code I have created. I must license it to them with terms that allow them to distribute it freely, so long as they continue to follow the GPL when they distribute it. I am under no obligation to give it away to the world for free, however I can not stop my customers from doing so.
Or just create a browser plugin that will read a QR and open a new tab to the link. No smartphone required. Of course, that kind of highlights why it's a dumb idea anyway.
A lawyer who represents himself has a fool for a client.
No different than an ISP, in fact in some countries BB falls under ISP regulations when it comes to data retention and discovery policies. The difference is the encryption between A BB and BES, where the key is generally only passed through an internal company network on generation, which should greatly reduce the risk of an MITM attack on the public key. Of course all of this assumes there are no intentional backdoors and that the security algorithm doesn't have any weaknesses, but in theory so long as that initial public key communication has to be across a secure network then the communication from the device from that point on should be very hard to crack.
Android is winning for the exact reasons that DOS won 20 years ago. It's cheap, easy to develop and distribute apps for (no mandatory app store), and runs on any hardware. It's not the best of the 4 smartphone os's by any measure, but the only actual competition is Windows Phone, which has a long way to go get before it makes real headway.
You missed those people who don't do private stuff online. I know this will surprise a lot of slashdot, but for normal people a lot of life is public. The most private thing I do online is banking, and I suspect those records can be accessed by the government in easier ways than reading and decrypting every bit of Internet traffic. As always, if you want to keep something private don't use communication mechanisms you don't control. Sneakernet is still the best private network.
Google wasn't the first search engine - not even close. Yahoo, Lycos, Altavista, and others already existed. JumpStation would have probably been crushed by Google just like all the others, even if it had found funding.
Statistically sub-prime mortgages make insane interest about 99% of the time. The other 1% caused a major financial mess that destroyed a few companies. It's reasonable to accept a certain level of risk, but it is extremely important to know what you are risking and to have plans in place to deal with the risked events when they happen.
We *are* eradicating the poorest countries. We're doing so by outsourcing industry to them, preventing them from being poor. A Country with sufficient food and energy is unlikely to attack its customers. So far it has worked in Germany, Japan, and Korea. Progress is being made in China, India, and Brazil. There may always be a few crazy areas like North Korea, but I don't think their primary problem is economics.
I wish that idiotic 'you are the product' meme would die. We have perfectly good words to describe our relationships with Facebook, twitter, slashdot, and all the other similar services on the Internet. Most of us are the audience. Some of us are also the content producers. We create content that drives people to the service that allows the provider to make a profit. Saying that a person is the product is just a bit of rhetoric designed to invoke an emotional argument, it doesn't actually say anything useful.
My first thought as well. I also know people who have STEM degrees, worked in the field for a year, and decided it wasn't for them. I know a lot that have moved up to management or project management, do they still qualify as STEM workers?