Comment Re:As a former Oracle dev (Score 3, Insightful) 367
If that's the way they work, they should not be selling mission-critical software that is exposed to the internet.
If that's the way they work, they should not be selling mission-critical software that is exposed to the internet.
Well I'm not sure, but my guess is that several of the test objectives did not get checked off.
> Responding to criticism, Bay thoughtfully explained that fans need to "chill."
Fans need to ignore Michael Bay and his movies entirely. I've never seen one of Bay's movies, he has never "ruined" anything for me, and I am perfectly content.
I wouldn't join with the same profile that I used personally.
Exactly. My work email address is different from my personal one, and likewise for social networks. The profile set up by my employer is used for work purposes only - it's got nothing to do with my personal life.
Examination of the example in the article suggests a heuristic algorithm that should provide near-optimal solutions and is suitable for real-time execution on neural wetware.
1. Start by mowing around the outside border.
2. Proceed going around, from the outside in.
3. When you reach a strip <= 3 mowers wide, clear it with short back-and-forths.
Proof of an upper bound on excess mowing vis-a-vis the optimal solution is left as an exercise for the reader.
TI's lawyers will be after him for DMCA violation because he's bypassed their physical copyright protection mechanism.
RTFA
But it's all the way in Australia!
Facebook has repeatedly changed their policies to publish various data that they had said was private or friends-only. But hey, no problem, they didn't charge money when they screwed people over so it's OK!
Uh, no, it's not OK.
The article says Pan-STARRS can "identify any potential threats to Earth", but it can only find asteroids and comets that are about to hit us. They don't claim to be able to spot other threats, such as:
Stupid gadget blogs, over-hyping stuff as usual.
Microsoft was informed about this vulnerability on 12-Jun-2009, and they confirmed receipt of my report on 22-Jun-2009. Regrettably, no official patch is currently available. As an effective and easy to deploy workaround is available, I have concluded that it is in the best interest of users to go ahead with the publication of this document without an official patch.
from Tavis Ormandy's disclosure
So the bug was found six months ago, but Microsoft only decided it was serious enough to fix after it was publicized. Seems like another case of "responsible disclosure" being used to cover up a vulnerability, instead of fixing it (or publishing a workaround) before the bad guys find out about it.
Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman