Comment Good. This was legalizing coercive control (Score 0, Troll) 178
Legalising addictive drugs is like legalizing coercive control and wife beating.
Subsitute "she should have walked away" with "they should have had self control".
Legalising addictive drugs is like legalizing coercive control and wife beating.
Subsitute "she should have walked away" with "they should have had self control".
Does "AI PC" stand for "Advanced Intel" PC? Can it run an Cortana-like LLM?
"Don't send that John
Eat Mor Chikin
That, or just relabel it Soylent-Meat
My work uses RHEL but I work with infra only obliquely. Will be interesting to know what you find better these days and why.
Thanks for the comments! Very useful to know what others find works best for them.
Wow, OBS is a big thing to not support directly. I wonder what architectural decisions caused this problem with screen recorders and screen savers.
Linux users no longer install Fedora workstation by default.
No, from what I've seen the SOS function does not rely user input. It's for non-crash emergencies.
A random Slashdotter made a suggestion: once articles are recognized as duplicates, comments from both article should auto-magically cross-posted to the others.
So people can access all relevant discussion (and spam) in one place.
Once an article is recognized as a dupe, comments from both articles should appear in each other.
... all the more reason for former customers to get healthier food from home
Thank you!
I remember when Java came out in '96 it was this secure language that could do no wrong. The message to developers was that you could write everything in Java - a browser, an OS -- it'd be super secure.
Then a decade or two later, Java (JVM) vulnerabilities and security patches suddenly began trickling out. I thought, "that's strange"... only to see the trickle turn into a flood: alert after alert, patch after patch, Java browser plugins disabled etc. Java
Two questions:
1. Is there an underlying theme to the Java security issues? E.g, C++ code in https://access.redhat.com/secu...
2. Can Rust security blowup like Java?
Sorry for the delay.
Yes, a trustworthy ISP with good competition from other ISPs is a good place to manage this.
This does not require breaking HTTPS.
Here's the idea:
If the person's ISP does not support this scheme, they could use one of many virtual ISP that do, by VPN-tunnelling into them.
The ideas is built on plenty of previous precendent.
Precedents and previous work:
(1) Idea credit: Ariba cXML punchout carts. Like SAP OCI, these protocols return a quotation document to the originating user's system.
(2) Idea credit: Netgear routerlogin.net. Netgear Inc owns this domain. Netgear routers grab and reroute web requests to this address over to the local router's web-browser interface. That is, Netgear routers resolve the DNS lookup 'routerlogin.net' to the local router IP address (e.g. 192.168.1.1).
(3) Idea credit: Yahoo sign-in seal. This is a graphic pre-selected by the user to personalize their sign-in. It serves as a visual cue to help users confirm they are on the legitimate ISP page and not a phishing site.
And that would be the right thing too, if India Post refused point-blank to assist any bombing investigation citing privacy guarantees to customers. So no help investigating the postmark, no routing data, no helping locate a possible originating letter box. Who needs obtuse messengers like these?
So I hope ProtonMail can work out a sensible solution with the Government of India on this issue.
To invent, you need a good imagination and a pile of junk. -- Thomas Edison