Forgot your password?
typodupeerror

Comment Re:Question (Score 1) 19

Yes you can. You have to boot into recovery mode and then change the security level. This is already something you have to do to load third-part (even signed) kexts, which are sometimes required for certain types of presumably poorly written (or not Apple-blessed) hardware drivers.

Apparently this is even still possible on the iPhone chipped MacBook Neo.

Comment Re:The fusion delusion strikes again (Score 2) 42

While it is an enormous problem, possibly the most significant, we know how to shield against radiation, but it's going to take mass in the form of hydrogen-rich molecules like water or polyethylene (as examples). To solve that problem we are either going to have to make launches a lot cheaper, or figure out how to do it all in orbit.

It's at the edge of our technological capacity to produce such a spacecraft now, so the barrier is economic. That's a massive barrier, but in theory we definitely could, if we put a significant percentage of GDP of the wealthiest nations towards the project, produce a spacecraft that keep astronauts alive and relatively protected from ionizing radiation both on the journey and while on Mars.

As to your general assholery, I guess everyone has to have an outlet, though why Slashdot is a bit mysterious.

Comment Re:Good. Now copyright terms (Score 1) 91

Dude, are you living under a rock?

These bands are creating new music. But the money that allows them to do so comes from their old music. I have bands in my collection that have been making music for 30 years.

And I'm pretty sure even small bands make good money nowadays from touring,

No they don't. They don't even make ok money. Tours are expensive and a lot of people, from road crew to venue security, take their cut before the musicians. The big guys, they make a killing on tours. But the small ones sometimes don't even break even.

In fact, a common wisdom in the industry is that touring is worth it not because the tour itself makes profits, but because it builds a fanbase and drives what is called "catalog discovery" - both old and new fans looking buying the albums with the songs they liked (and for the old fans, didn't know).

This study: https://www.giarts.org/article... says that 28% of income across all the musicians surveyed comes from tours. The share is larger for the rock/pop sector where it nears 40% but even that isn't easy money. And if you consider that only 20% of the rock/pop musicians make more than $50,000 a year, then it becomes a hollow statement.

Plus, it goes directly against your first statement - while on tour the band is not creating new music. So if you want to drive musicians more towards constantly creating (which most of them already do), then you can't make live performances the main income source.

Comment Re:Corporations now have constitutional rights. (Score 2) 61

This thing was never about "dangers to defense." The original contract was signed and had clear terms that humans would always have the final say. The DoD unilaterally wanted to change those terms and Anthropic said no. In reasonable times this might result in Anthropic simply losing the contract; plenty of other companies including OpenAI are perfectly happy to sign under the new terms. To declare them a supply chain risk as punishment was unprecedented and illegal apparently.

Anthropic was never a danger to defense. They fully allowed their technology to be used to kill people. There was no issue there.

The idea that the DoD wants to allow AI to kill people without any human intervention (and responsibility) is really disturbing. But given the way things are going, maybe if AI simply ran all the wars we'd all be better off. You've been declared a casualty. Report to the absorption chambers! Time to watch "A Taste of Armageddon" again.

Comment Re:Good! (Score 1) 46

Mostly just in the bulk, low barriers to entry, and pervasiveness(like a lot of things social media). The case of actors actually goes back a long way; state laws regarding compensation of child actors were spurred by the case of one who was popular in the 1920s and litigated with his parents over where the money wasn't in 1939. That case doesn't provide for takedowns; but it's also the case that filmmakers are normally looking for children to play characters; rather than to do 'candid' intense documentaries of them at home; so the degree of public exposure of private life is presumably deemed to be less; with the main issue being children who were...definitely...getting a solid education while on stage finding that all the money was gone when it became their problem.

Child-blogging, by contrast, seems to reward verisimilitude (if not necessarily truth) and invasiveness, relatively pervasive in-home mining for 'content', so presumably seems better served by removal-focused options; though there has definitely been talk about covering the economic angle in line with child actors.

I don't even know what the deal is with child beauty pageants, or how something you'd assume is a salacious bit of slander about what pedophile cabals are totally doing, somewhere, is actually a thing a slice of parents are into, way, way, into. Apparently that's a third rail to someone, though, as the only jurisdiction I'm aware of with significant restrictions on them is France.

Comment Re:The Horse is Already Gone (Score 1) 61

Unless quantum computing becomes cheap and comparatively widely available quite quickly after becoming viable passwords seem like they'll be a manageable problem. Nobody likes rotating them; but it's merely tedious to do and the passwords themselves are of zero interest unless they are still being accepted. If it does go from 'not possible' to 'so cheap we can just go through through in bulk' overnight that could ruin some people's days; but if there's any interval of 'nope, the fancy physics machine in the dilution refrigerator is currently booked by someone with a nation state intelligence budget' you can just rotate older credentials.

Now, if you were hoping that encryption was going to save any secrets that are interesting in and of themselves that got out in encrypted form; then you have a problem. Those can't be readily changed and will just be waiting.

Comment Re:When I lived in Canada.... (Score 2) 61

The parliamentary system has one thing going for it. The prime minister must also be elected as a lawmaker, so he has skin in the legislative game, and can't just say off the wall garbage. He has to appease his party, including back benchers, and any coalition participants. And like you say, he or she is vulnerable to a non-confidence vote.

In all democratic countries democracy really tends to break down at the lowest and most important levels. The things that impact peoples' daily lives the most originate in local government, and voters have the most apathy at this level.

Comment Re:Windows is crashing because? (Score 1) 174

The most recent crashes I've had were all due to external hardware. (usually a dock being unplugged) I haven't seen that recently though so maybe that was addressed.

I've also had issues in the past with not going to sleep / waking back up properly, but again haven't really seen that recently so maybe that too was addressed.

Pretty much 100% of my recent related issues have simply been "system's getting slow, and no my memory hasn't all leaked away, it just wants a restart", and so I DO restart it, and I get all my performance back. It's annoying, but not impactful. Not sure what's getting gummed up under the hood, I don't see anything getting logged or showing up in any monitoring tool.

I tend to push my machine pretty regularly though, and end up being coerced into rebooting about once a month.

I do a lot of photo manipulation, and I HAVE ran into a problem with Finder's QuickLook gradually getting slower after tens of thousands (yes really) of videos and images being quick-looked, but I can just kill the Finder's QuickLook process and it automatically bounces back fresh as a baby. So whatever "general slowness" issue I've been encountering after weeks of uptime could probably be fixed if I knew what needed to be bounced, but nothing is making itself obvious with high cpu time or memory use, so I just have to reboot to get it back.

A bit OT but I do find it a bit sad that windows has decided to do away with the traditional BSoD, not by making the OS more stable, but by hiding it when it happens. "Nothing to see here, everything's fine!" (NakedGun)

Comment Re: Mac Studio is a redesigned Mac Pro (Score 1) 90

maybe not? Look at cache for example, there's L1, L2, and L3, each getting bigger and slower. Just because L2 is slower doesn't mean it doesn't get used.

Or look at some of the older storage techniques like hybrid drives. (such as 1tb of spinning platters, with 32gb of ssd)

Modern SSDs are even doing that. Watch the IO speed when you write a large file, see how it's fast to a point and then gets slow? that's a write buffer getting filled up.

Maybe the same technique could be used with ram, basically on the same lines as the VM files that unix systems (including Mac OS) use?

So there's plenty of precedent for adding higher latency storage, simply because the big increase in capacity is worth a little added latency. Carefully managing what you use it for greatly reduces the impact of the latency.

Comment Re:Why is this even a critricism? (Score 1) 84

Legally speaking, threats fall under "assault". If I raise my fist to you and step up and punch you, I'll probably be charged with "assault and battery". Where "assault" is the "imminent, credible threat of physical violence" of raising my fist and approaching you, and "battery" is my actually hitting you, (and if I miss or you dodge, that trades n the Battery for a second Assault charge) It's an important distinction because the laws and consequences differ

A threat of physical violence must be credible to be assault. That usually places the bar at "a reasonable person would genuinely fear for their safety as a result of the words and actions".

"Remote threats" are handled a bit differently. They used to go through the US Mail and so were addressed with "mailing threatening communications" (part of 18 U.S. Code) although that requires a lot more investment and consideration. Get out pen and paper, think about what you're going to write, draft the threat, stuffit in an envelope, add a stamp, take it to a mail box. That involves lots of time to reconsider, plus the investment of time, paper, envelope, stamp, and finally time to go mail it. (all while reconsidering and being able to change your mind) Most threats never made it into the mailbox as tempers cooled and emotion gave way to reason. But if it made it all the way through that process, a reasonable person would more easily be able to conclude the threat was credible

Now, it's fifteen seconds of "furiously type a line or two of rage and click Send." And it's handled by the FCC now since it's using an interstate communications network. There's a separate "legal bar" for it to pass, but it's essentially the same thing. The laws are much more recently authored, and so require a bit more since courts now rely more on letter of the law than interpretation by a judge. They're looking for Intent (specifically, are you venting, intimidating, or announcing your intentions), does the message describe a credible threat to the victim, and is it specific about what's being threatened.

"I'm gonna dance a jig the day someone ends you!" - lacks intent
"if I get my hands on you l'm going to launch you into space and watch you suffocate!" - not credible
"you're going to regret the day you pissed me off!" - not specific

(Law Abiding Citizen demonstrates masterful avoidance of legal classifications by careful choice of words)

Although as mentioned above, power and money can press a thumb down on the scales of justice and get an investigation launched regardless of established legal standards.

Slashdot Top Deals

It is better to travel hopefully than to fly Continental.

Working...