Comment Re: unexpected outbreak of common sense (Score 1) 177
No, from what I've seen the SOS function does not rely user input. It's for non-crash emergencies.
No, from what I've seen the SOS function does not rely user input. It's for non-crash emergencies.
A random Slashdotter made a suggestion: once articles are recognized as duplicates, comments from both article should auto-magically cross-posted to the others.
So people can access all relevant discussion (and spam) in one place.
Once an article is recognized as a dupe, comments from both articles should appear in each other.
... all the more reason for former customers to get healthier food from home
Thank you!
I remember when Java came out in '96 it was this secure language that could do no wrong. The message to developers was that you could write everything in Java - a browser, an OS -- it'd be super secure.
Then a decade or two later, Java (JVM) vulnerabilities and security patches suddenly began trickling out. I thought, "that's strange"... only to see the trickle turn into a flood: alert after alert, patch after patch, Java browser plugins disabled etc. Java
Two questions:
1. Is there an underlying theme to the Java security issues? E.g, C++ code in https://access.redhat.com/secu...
2. Can Rust security blowup like Java?
Sorry for the delay.
Yes, a trustworthy ISP with good competition from other ISPs is a good place to manage this.
This does not require breaking HTTPS.
Here's the idea:
If the person's ISP does not support this scheme, they could use one of many virtual ISP that do, by VPN-tunnelling into them.
The ideas is built on plenty of previous precendent.
Precedents and previous work:
(1) Idea credit: Ariba cXML punchout carts. Like SAP OCI, these protocols return a quotation document to the originating user's system.
(2) Idea credit: Netgear routerlogin.net. Netgear Inc owns this domain. Netgear routers grab and reroute web requests to this address over to the local router's web-browser interface. That is, Netgear routers resolve the DNS lookup 'routerlogin.net' to the local router IP address (e.g. 192.168.1.1).
(3) Idea credit: Yahoo sign-in seal. This is a graphic pre-selected by the user to personalize their sign-in. It serves as a visual cue to help users confirm they are on the legitimate ISP page and not a phishing site.
And that would be the right thing too, if India Post refused point-blank to assist any bombing investigation citing privacy guarantees to customers. So no help investigating the postmark, no routing data, no helping locate a possible originating letter box. Who needs obtuse messengers like these?
So I hope ProtonMail can work out a sensible solution with the Government of India on this issue.
I had a think about this some years ago. One entity that can be a reasonable wallet provider for micropayments of this nature is the customer's ISP. They already bill the customer, provide a billing portal and can know where the user requests are coming from.
"Firefox Desktop is in very good shape?"
Then why does the number of Firefox users drop steadily (not marketshare, but absolute numbers) over the past 5 years according to Mozilla itself?
https://data.firefox.com/dashb...
True, it is possible Firefox product performance, features and codebase are all in very good shape. And that the usage drop is due to extraneous factors. However, quality and uptake are generally correlated.
IT 'needs' and IT manager 'wants' are different things. Unless you support highly available systems like those in hospitals, nuclear power, ATMs, etc., then IT is not a 24/7 process and its support is not a 24/7 role.
Most organisations and businesses have a cadence where after hours or on weekends, the core business shuts down or slows. IT support requirements reflects that cadence.
He's not claiming to be clever but he actually is: he's saving on cost. Besides his NAS could be replicating to another appliance buried in his backyard.
The terminology differs. Windows has the 'Administrator' user instead of the UNIX 'super user'.
Why call it sudo then? Call it 'ado'.
Yes you control data on-prem. And also have more control over compute.
An example: I used an application that ran multiple components in a cluster. It was very sensitive to the multi-second compute 'gaps' that occur when its hosting VMs were automatically moved around 'live' from one blade to another by VMWare's 'VMotion' feature. (Effectively, this pauses a VM, moves it to another blade, then presses 'Play'). Some application components lost cluster synchronisation
Back in the on-premise VMware days I could sit down with our storage/VM admin guy and explain out constraint. He made the concerned VMs sticky to a blade. That way the 'VMotion' hardware load balancing would leave the problematic VMs alone and not shuffle them around when compute load was oversubscribed. Once a year or so, VMWare compute had planned maintenance. But we had months of notice about that. We had control.
That's not a possibility with compute in Azure cloud. With it's 'Freeze' and 'LiveMigration' events, compute 'gaps' are unavoidable and effectively unpredictable.
Some of the coin goes to funding politicians who pass laws that make it more difficult to regulate Bitcoin mining. Like that community in Arkansas where residents cannot sleep due to 24/7 whining of a bitcoin data center.
In the name of protecting liberty, these politicians force hundreds or thousands of poorly governed communities to pass and enforce new regulations and local laws. These local laws are much easier for the bitcoin investors to oppose.
I've noticed several design suggestions in your code.