Comment Transient problem (Score 2) 21
I used my card 3 times around noon EST. In one case, it was declined. I tried it again, and it worked. No problems the other two times. (ApplePay linked to a Chase credit card.)
I used my card 3 times around noon EST. In one case, it was declined. I tried it again, and it worked. No problems the other two times. (ApplePay linked to a Chase credit card.)
And the cooling for that many chips doing AI? Would AI/cloud companies look to relocate to countries with the cheapest power sources? (And what would that do to efforts to control carbon emissions?)
And then Capitalism will be replaced by what, exactly? "The Dictatorship of the Proletariat?" (I'd rather fly on a 737 MAX than an Ilyushin any day....)
What the Reich piece fails to address are 2 core points: (1) why Boeing changed from its previous dominant position in aircraft safety. (2) And who owned the company back then. I'm not convinced by the argument that government ownership somehow makes Airbus "safe".
I observed the change in Boeing culture when I was on the government side of a major DoD project. And I learned about software safety from people who worked for "old Boeing" on projects like 777. The change in the procedures I learned about (e.g. Designated Engineering Representatives) that let Boeing do much more -unsupervised- self-certification is definitely part of the problem.
But at the end of the day, someone signed off on 737 MAX designs, including the incomplete hazard analysis. And someone signed off on the aircraft with the missing bolts. THOSE PEOPLE SHOULD BE CRIMINALLY CHARGED. And that is most certainly an appropriate role for government.
Is that Apple can pretty much cancel this, not just preventing future downloads, but I think they also have mechanisms to revoke existing downloads (developer certificate revokation, I think.) Now Apple should explain how this got through their curation, which is part of how they earn their fee.
A friend carefully monitors his network, and sees a fair amount of this security scanning. Of course, that sets off the alarms he's added to his systems, clogging up logfiles and generally chewing through both bandwidth and server. At some point, this moves beyond "fair use" into "unfair use," but I don't know where to draw this line. Seems to me that "responsible" security scanning should be infrequent and probably announced ahead of time. But I could see arguments the other way.
And of course, the only way to distinguish a 'security scan' from a 'vulnerabiity scan' is to look at the originator IP and draw conclusions from that, which we know is not really authoritative.
I'll grant you Idaho - Massachusetts, instead.
and they're full of old people asking "when we succeed will I still get my social security check?".
And of course there's the world famous "Keep Government Out of My Medicare" sign....
It's astonishing how little people understand our country. And there's a never ending supply of grifters willing to take advantage of that...
Well, we lived in Canada during the Quebec Separation Referendum of 1995 (https://en.wikipedia.org/wiki/Quebec_sovereignty_movement#History), and we saw similar ignorance during that event. Politicians were actively dishonest (on both sides), newspapers tended to be either pro- or anti- and talked only to their own side. It was hard to find credible factual analysis of the impacts if the referendum succeeded. (It was particularly galling for the premier of Quebec, who had a PhD in economics from London School of Economics, to spout blatant nonsense. https://en.wikipedia.org/wiki/...)
And from the little bit I saw across the pond, a similar dynamic seemed to be in effect during the Scottish referendum in 2014 (https://en.wikipedia.org/wiki/Scottish_independence_referendum_2014)
It's a bit hard for me to think of two states more different than Vermont and Tennessee
The Russians were very aware of/scared of EMP. The MIG-25's little vacuum tubes were in part a response to the EMP threat from a weapon like this one.
A person I know had a story once, I believe about Citi, where they had a phishing message and wanted to report it to the bank's fraud/security people. And the person they got to told them that to see whether an email is legit, look at the email and see if it has a citibank logo, because that's how you can tell it's legitimate.
If my fuzzy memory of years back is correct, and that was indeed Citi, then yeah, they should absolutely be on the hook for some amount of this fraud.
Well, a large proportion of the developers I worked with over the last 40 years preferred and still use the Mac. In part that's because when they need to, they can pop up terminal.app and do something with the familiar Unix toolset, such as setting up a quick tool stream using pipes.
So I'm sure it makes some people here happy to toss insults at Mac users as all computer-illiterate hipsters. And I'm sure there are a lot of those using Macs. But that's not the reason why I use it, or my developer friends use it.
p.s. I stumbled across my "POSIX Pioneer" certificate, signed by Jim Isaak, when looking for something else.
about "OpenAI" is its mouth.
(And yeah, I stole that line from someone who used it to describe another organization with "Open" in its name. But it worked then, and it works now.)
Google's market definition was set by the jury in trial court. Apple's was set by the judge and affirmed by the appeals court and implicitly by SCOTUS. So it's not clear to me how strong the Apple precedent is.
I was surprised the judge assigned the market definition to the jury in the Google case. I thought that would have been a 'ruling of law'.
Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.