Comment Re:PC analogy (Score 1) 278
Should they have to right to only allow 'official' games to played and prevent it running homegrown games or for third party independent developers to sells games to run on it?
Should they have to right to only allow 'official' games to played and prevent it running homegrown games or for third party independent developers to sells games to run on it?
Number portability should be for moving between providers while retaining the same number (to save having to give the new number to all contacts).
When I have moved a number to a new (PAYG) handset (keeping the same provider), the process required me to quote the IMEI of both handsets as well as answering security questions. For a contract phone (which one would assume is what a business owner would have), surely the only time the number should need moving a new handset is when the handset is changed as part of the contract - in which case it should not be possible to move the number simply by making a phone call.
Well, in that case, the companies can't bitch about people pirating their media overseas if those people can't legally purchase that media.
They can bitch as much as they like, but what they must not do is count those overseas downloads as lost revenue and must not include them in their claims of the loss due to piracy.
You are implying that there is corruption going on, while there is a more plausible, legal forces that explains why the business get the political ear.
Big Business hires a lot of people who pay a lot of taxes. If they are not happy in your City/State/Country they have the resources to leave and leave a lot of people without jobs and unable to pay for taxes.
I do not know about the USA, but in the UK although big business employs lots of people, the majority of people are employed by small/medium sized companies. While individually each of these does not contribute as much as the large corporations, taken together the small/medium companies contribute more to the economy than big business.
So what you do is calibrate the model on past data, then test it by generating some predictions and seeing if the predictions are accurate. Better still, use a number of different parameters all of which calibrate the model and then before actually using the model, wait and see which set of parameters generates the most accurate predictions. Only then use the model for actually predicting future events.
Maybe we need to wait for Hari Seldon to invent psychohistory (and for WikiPedia to morph into the Encyclopedia Galactica).
As facebook has members/users worldwide, why just restrict to influencing US politics?
Allowing the user to intentionally add keys but preventing malware from doing so should not be too difficult for MB manufactures. Have a hardware jumper with 3 positions, 1) Do not enforce secure boot, 2) Enforce secure boot, 3) Only allow new keys to be added but do not allow the system to do anything else including booting.
And all of the Dell servers whose BIOS would not allow you to configure the SATA drives in AHCI mode, forcing the use of the legacy PATA emulation mode, even though the Intel ICHn chipset supports AHCI.
That is a case of caveat emptor. The prospective purchaser of a certificate could use the 'quality' of the audit as one of the criteria used to choose the vendor.
But as trademarks are market specific, unless the company is a media company (such as Disney) then porn will not be within the scope of its trademark so they should have no rights over the
Linux is free and Windows has to be paid for. So using this same argument, Linux should be the dominant PC Operating System, but it is not - Windows is. Therefore being free cannot be the only reason an OS is the dominant one.
Why not? A Facebook or other social media account name is just as good an identifier for the data as is using a 'real' name (whatever it is that makes a name 'real'). They can gather a lot of saleable information about the account holder both by activity on the site and by their use of links such as 'like'. It is just as easy for advertisers to send targeted adverts to a pseudonymous account as to one using a 'real' name.
So why not just tackle the pirate situation rather than action, political or military, on land? Send in the NATO navies, plus maybe also invite the Russian, Japanese and Chinese navies for good measure and take action to protect the international shipping. Do as used to happen in the days of sail, arrest the pirates, confiscate their vessels and maybe even pay prize money to the navy crews who capture a pirate vessel.
If you have a safe with a combination lock, can the authorities legally require you to either tell them the combination or unlock the safe? The passphrase to allow access to an encrypted drive is equivalent to the combination of a safe, so the same rules should apply.
All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin