The entire problem here is the people writing the checks are ".gov". Government contractors are there to cash checks first, if there's time left over, they may give you something useful. (It usually falls to sub or sub-sub contractors to get to where any real work is done.)
The sad thing is, anyone in the payroll office could walk to their local Office Max, and there on the shelf (for mac or windows) find software that can do much more than the 60 year old COBOL system they've been using. For a few $$$ even. The real work comes from getting all the records from the old system into the new system.
(been there, project abandoned instead of handling the conflicts in merging systems)
If its all encrypted its safe, but i agree it could be a bad day when they decide to ransom your data with higher prices down the road. It also sux when you are off-line and want a file.
I prefer not to have a monthly bill to access my stuff. ( sure, you could depreciate out your hard drives and come up with a "monthly equivalent", but still.. )
1. You're delusional. Encryption is NOT a magic spell that keeps anyone but you out. I don't care if it's 65536-bit, no. Cryptanalysis is at a level you could not possibly comprehend.
2. Booth was a coward that shot a great man in the back of the head while seated in a theatre. And like your sig says, I don't give a flying fornication what you think of that.
When caller ID first arrived on the scene it seemed like a godsend to many people: Now you could easily identify who was on the line and ignore unwanted calls, whether from telemarketers, an ex-boyfriend or an unfriendly collection agency.
But as often happens, unscrupulous individuals soon began manipulating the technology to defraud people by pretending to be someone else. Their scheme is called "caller ID spoofing" and disturbingly, it's perfectly legal in many cases.
Here's how caller ID spoofing works and what precautions you should take to avoid being victimized:
For a very low cost, businesses and individuals can use widely available caller ID spoofing software to generate calls which alter the telephone number and/or name that appear on the recipient's caller ID screen.
Police, private investigators and collection agencies have used legal spoofing services for many years. Others who might have a legitimate reason to hide their identity when making a call include domestic violence victims and doctors returning patient calls who don't wish to release their private telephone numbers.
Beyond that, the lines of legality begin to blur. The Truth in Caller ID Act of 2009 prohibits anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongfully obtain anything of value. Violators can be penalized up to $10,000 for each infraction. Unfortunately, such penalties haven't dissuaded many scammers.
One common caller ID scam involves spoofers pretending to represent a bank, government agency, insurer, credit card company or other organization with which you do business. They count on you being reassured after recognizing the company's name on your screen.
Related Articles: [spam URL stripped]
Under the pretext of warning about an urgent situation (breached account, late payment, pending insurance claim, missed jury duty summons, etc.), the spoofer will try to coax you into revealing personal or account information, supposedly to verify their records.
Often these are robocalls, where a recorded voice asks you to stay on the line to speak to a representative or call another number for more information. Do not. Probably thousands of other people are receiving the same message at the same time. If you suspect the call might possibly be genuine, contact the company yourself at the toll-free number found on your card, account statement or the company's website.
You should never reveal your full Social Security number, mother's maiden name, credit card number, passwords or other private information over the phone unless you initiated the call yourself. Someone possessing such information could use it to gain access to your existing accounts to withdraw or transfer money, raise credit limits or snoop around your recent activity, among other intrusions.
ID thieves also can use your personal information to open new credit accounts (e.g., credit cards, mortgage or car loan), create a new identity or even obtain a job fraudulently. Often, you won't even realize something's wrong until a collection agency — or the IRS — starts hounding you for unpaid bills or taxes.
Another common caller ID spoof involves hacking into someone's voice mail account. Many cellphone users never bother to set up passwords on their voice mailboxes (big mistake). And, since many voicemail systems grant access to callers phoning from their own number, a hacker could easily spoof your number and gain access to your messages. (You may recall this practice brought down the British tabloid News of the World in 2011.)
The increasing popularity of voice over Internet protocol (VoIP) phone services like Skype and Vonage also has increased caller ID spoofing activity. These services use computer addresses instead of actual phone numbers to connect via the Internet, so scammers can choose any available area code and phone number, making it even harder to determine who's who on your phone.
Join Discussion: [spam URL stripped]
Link to Original Source
yeah like being able to do a diff and check time stamps, maybe setup a cron job to do it automaticly wait that has been done form a shell by sysadmins for years
But a review of dozens of US federal government documents shows Washington has quietly funded senior Egyptian opposition figures who called for toppling of the country's now-deposed president Mohamed Morsi.
Documents obtained by the Investigative Reporting Program at UC Berkeley show the US channeled funding through a State Department programme to promote democracy in the Middle East region. This programme vigorously supported activists and politicians who have fomented unrest in Egypt, after autocratic president Hosni Mubarak was ousted in a popular uprising in February 2011.
For details click the url
No it isn't. I can buy a 3TB hard drive that will last for at least the next five years for like $100. Dropbox charges $10/month for only 100GB of space, which works out to 1/30th the space at $600 for five years. With a hard drive, I always have access to my data, even if my internet connection goes out or I am in a location without a connection.
<cynicism>Hard drives are guaranteed to not fail for at least 5 years? News to me. Even ignoring premature failure, most warranties these days are 1-3 years.</cynicism>
On the other hand, assuming you've got local backups, I mostly agree with you.
Link to Original Source
Your argument about untyped code is a non-argument, it has never been an issue. It's a matter of programming style. With most styles of programming you'll never encounter a problem.
What it does do is create a performance ceiling, because untyped is hard to optimize for a VM.
But that is what asm.js is for now, for the performance critical code paths.
Sim Card Dual Sim Card Dual Standby
Service Provide Unlocked
Shell Material Plastic
CPU MTK6516 416MHZ
OS Android 2.2.1
Display Size 3.6" Resistive Touch Screen
Resolution 240*400 px
Screen Color 260K Colors
Ringtones Type Polyphonic/MP3
Audio File Format MP3/WAV/AMR/AWB
Video File Format 3GP/MPEG4
Image File Format JPEG/BMP/GIF/PNG/GIF
E-book Format TXT/CHM/DOC/HTM
FM Radio Yes,please plug the earphone first
Earphone Port 3.5mm port
Card Extend Support TF card , up to 8GB extended
Link to Original Source
Summary: The search giant continues its streak of puzzling decisions as its location service and maps functionality fall victim this time. Chris Duckett. By Chris Duckett for Null Pointer | July 11, 2013 -- 04:31 GMT (21:31 PDT). Follow @dobes. Google overnight...
Google Seeking Android Developer Input in New SurveyseWeek
New version of Google Maps arrives for Android, on the way for iOSnatmonitor.com
Google to 'retire' Latitude in favour of Google+ location sharingNDTV
Curbed National-NBCNews.com (blog)-PCWorld
all 228 news articles
Link to Original Source
Headlines & Global News
Headlines & Global News
A DNA analysis revealed that only the Alaskan Inuit sled dogs—Eskimo dog and Greenland dog—are purely Americans. The rest were from other countries. (Photo : Reuters). A DNA analysis revealed that only the Alaskan Inuit sled dogs—Eskimo dog and...
American Dog Breeds Hail From Pre-Columbian TimesNational Geographic
DNA traces the ancient roots of American dogs to AsiaNBCNews.com (blog)
Dogs With American Roots RevealedDiscovery News
all 9 news articles
Pests are harmful and destructive; you need to identify the pest that is destroying the house and other area. You will really not have an idea of where the pests are entering your house and you will also not notice the pest infestation that is taking place inside your house. You should right away think of pest control Louisville agency that will send employers or exterminators who will use the professional methods of driving away the pests out of the house. If you are a normal home owner, you
The digital games you buy on your PlayStation 4 will apparently travel with you, virtually, when you move from console to console. Sony R&D senior team leader Neil Brown detailed as much at Develop today. "You can visit your friend's house you can log into your account and play any game from your digital library," he said. Paired with the console's "Play As You Download" functionality, Brown promised that users will be able to instantly jump into their full library of digital games from any PS4 after signing in with their PSN ID. "This makes a digital library a practical option in the real world," he added.
PlayStation 4 games are planned for digital launch alongside physical, thus making an all-digital game library a more possible goal. Should you purchase a physical copy, you can take the Blu-ray with you from console to console; the game will automatically install on the console's HDD, though you'll still need its disc in the tray for the game to play.
Source: Official PlayStation Magazine UK
The fanatical Left will insist that anyone who upholds the fundamental meaning that marriage has always had, everywhere, until this generation, is a "homophobe" and therefore mentally ill.
Nailed it except for the part about marriage having some fundamental meaning, everywhere, until this generation. That is fiction unless it's about procreation, in which case it wasn't necessarily then and isn't now.
And the part about wanting equal rights is an aspect of "the fanatical Left", unless one is so far right that they can't see the centre anymore.
(I am an Android developer responsible for testing my company's product on dozens of different tablets.)
Link to Original Source
JUAL KALIGRAFI AYAT KURSI FOIL DENGAN BERBAGAI PILIHAN YANG MENARIK
-085646699700 – 3148DD41
Kaligrafi Ayat Kursi Foil sangat bagus sebagai hiasan dinding di kelas, kantor, kamar, ruang tamu, dan tempat berkumpul keluarga. Selain karena keunikan dan keindahannya, Kaligrafi Ayat Kursi Foil akan memberikan nuansa religi di dalam kelas, kantor, kamar, ruang tamu, dan tempat berkumpul keluarga. Di [spam URL stripped] kami khusus membuatnya untuk anda yang mengerti seni Kaligrafi Ayat Kursi Foil yang sangat cocok digunakan sebagai hiasan dinding sekaligus untuk menciptakan lingkungan kelas, kantor, kamar, ruang tamu, dan tempat berkumpul keluarga yang menyenangkan. Tertarik untuk segera memajang pajangan dinding Kaligrafi Ayat Kursi pinus fiber?? Segera kunjungi situs resmi kami di [spam URL stripped] dan hubungi agen resmi kami -085646699700 — 3148DD41.
Link to Original Source
The market decided long ago that fewer programmer hours was better than users waiting a few seconds everyday for their device to GC.
No, actually, that's not what happened. As the summary and the story itself (both of which went unread apparently,) point out, one of the most successful systems to emerge in the market recently, iOS, is not a GC environment.
Over here you may learn about iOS memory management. Without getting too far into that wall of text one discovers the following:
If you plan on writing code for iOS, you must use explicit memory management (the subject of this guide).
Ok, so your claim that GC is the only viable solution for contemporary application development is demonstrably false. Lets look some other assertions:
programmers are inherently bad at memory management. Memory will leak [if programmers must manage it].
First, the vast number of iOS applications not leaking shows that a non-GC system doesn't necessary have to leak. At least not badly enough to compromise the viability of the platform, which is the only meaningful criteria I can think of when it comes to the market.
Second, why assume programmers are inherently bad at a thing when that thing has traditionally been exposed via terrible, error prone, demonstrably awful mechanisms? It seems to me that among widely used tools we leaped from 'systems' languages with truly heinous MM primitives (C/C++) directly into pervasive GC systems. Aside from Objective C+ARC there just aren't enough good non-GC systems to make broad generalizations. Thus, you may be right about programmers, but you can't prove it, and I doubt it.
Finally, what proof is there that pervasive GC is better at not leaking than a good explicit MM system? Anyone with an Android system and a bunch of apps will quickly discover that pervasive GC does not eliminate leaks.
[some phone] comes with a whopping 2GB of RAM
Goggle Glass has 682mb of RAM. There is always a new platform into which we much fit our software and the new platform is usually resource constrained, so there will never be a day when questioning the cost of GCs is wrong. Maybe the wearable you eventually put on will have 8 GB of RAM. The computers you swallow or implant or sprinkle around the lawn probably won't. The fact the next generation of phones can piss away RAM to greedy GCs just isn't particularly informative.
There are a few alternatives that come to mind if you're like me and adhere to the philosophy that "data that doesn't exist on hard drives I can clone or shoot, either doesn't exist, or exists in the hands of my enemies"...
Where seamless sync isn't an issue, FTP/SFTP can work well. FreeNAS and NAS4Free do this with a great back end file system, but UnRAID, while not free, does do a pretty good job of performing a similar tasks if you have a hodgepodge of hard disks lying around. In all three cases, you're looking at a dedicated OS install.
OwnCloud is a good sync app and browser based file portal. The Android app for it is still very much in beta though and doesn't always sync everything you want it to.
Ajaxplorer is a great browser-based file manager, and they have a desktop sync client in beta. It's gotten a LOT prettier in this last release and has great user management tools, as well as a public folder system for collaborative efforts.
Both OwnCloud and Ajaxplorer run on a LAMP stack; the Turnkey Linux project and Bitnami both offer builds for both applications to make things relatively simple if you've got the hardware or a VM at your disposal.
Tonido will do desktop sync a la Dropbox with a point-and-grunt Windows installer; 2GB of sync is free, 100GB of sync is $29/year.
Looking for an inexpensive server to put it on? I had a great purchase experience from the guys over at ServerWorlds; it's possible to get a properly spec'd IBM x3550 from them for less than $500 using backplanes that will use off-the-shelf SATA drives in a RAID-1, and it'll fully support ESXi if you want. eBay is also a fountain of such things.
If home internet is too slow and/or untrustworthy to the point where you trust a colo provider instead, GoRack (the only colo center I could Google that gives actual pricing information) seems to be willing to power and shuffle data to your server for some $50/month or less. Clearly Dropbox has the edge here as far as availability and uptime as opposed to a single x3550 (along with the convenience of not having to manage your server), but if you load up the server with a pair of 2TB drives, the only offering Dropbox has that can compete with that is the business package that costs some $800/year.
Depending on your level of expertise, what you've got at your disposal, who you trust, and what you can spend, there are more than a few options besides dropbox.
Because TCP doesn't handle multiple streams. Opening many TCP connections makes its congestion control mechanism ineffective.
In my opinion this is a good compromise between the two other options. It would expose vulnerabilities while keeping consequences for criminal hacking.
As I said: "white hat hackers" are one of the primary reasons we have security holes in the first place; their activities create the economic incentives for companies to release software with security holes in the first place.
This is your opinion. Again, you see the world as black or white which leads you to the prosecute everyone/prosecute no one extremes.There are actually three three options;
You just don't seem to grasp that, although "white hat hackers" helping fix security holes has a short term benefit, it is one of the primary reasons those security holes exist in the first place. Why should a company bother spend lots of money to make my software secure if it can just release it and pay a fraction of what I would pay for quality control to cheap "white hat hackers", and at the same time be shielded from public humiliation by law?
The only way to get companies to pay more attention to security is to raise the risk and the cost of releasing insecure software. Banning "black hat hacking" and allowing "white hat hacking" decreases risk and decreases costs of releasing insecure software, and that is exactly the wrong public policy.
I'm sorry if that argument is too subtle for your simplistic black-and-white world view.
Have you heard? Was that sleigh alarms jingling? Wait! I hear Christmas alarms ringing! Ienc the growing season, not only for shopping, however for relaxing onboard San Francisco's traditional holiday tours. Sing along during a motorized-hand made cable vehicle, slide onboard a snazzy, pre-nineteen thirties touring vehicle, or hop onto an english double decker evening bus tour.san francisco sightseeing tours.
It also has multiple streams so different requests and responses can happen concurrently and out of order.
I agree. Apple's handling of their switch from GCC to LLVM is a good example where they kept both for a while is a good example of how distributions could have handled this better.
Some distributions btw didn't switch.For example Knoppix went from KDE 3 to LXDE. On the other hand distributions like Fedora, Arch, Mandriva forks or Gentoo did the right thing in following the "latest and greatest". Their users expect that. Ubuntu was really the tricky case and they sort of did their own thing with Unity.
As far as Wayland... that's going to be very dicey. Wayland has an X11 built in so there is no good reason not to switch to Wayland. The big issue is going to be going with Wayland only compiled applications. I suspect for the Linux world that's going to happen mainly on applications where performance matters. But Gnome given their focus on touch (where latency really really matters) are going to have to be among those. So it wouldn't shock me if Gnome 4 or Gnome 5 is Wayland only.
A decade ago, one of the main decisions online businesses had to take was whether to start a blog or a website. This all changed with the advent of the SEO. Indeed, now it is not uncommon to see a website with its own blog and even a forum, says http://blogcreationexperts.com/. They use the static websites for the basic information like product prices, contact details, etc. The blogs on the other hand are great for handling all the other aspects including niche SEO, obtaining statistics in consumer demands through blog commenting, advertising new products or limited promotions. Thus, it is not that surprising for blogs and websites to now walk hand in hand online.
and execlent quality press brake machines now in india.100% service back up.100% quality guiranteed.
You shouldn't have several concurrent TCP connections to the same host. Most browsers won't open more than two.
Fast Open is an experimental draft with security flaws and packet duplication problems.
Fast Start hasn't taken off since it was demonstrated 15 years ago.
CRIME also applied to plain old HTTPS. That's been fixed. HTTP 2.0 has different header compression than SPDY that is explicitly designed to counter this attack.
Link to Original Source