Forgot your password?
typodupeerror

Comment Re:Good! (Score 1) 45

Mostly just in the bulk, low barriers to entry, and pervasiveness(like a lot of things social media). The case of actors actually goes back a long way; state laws regarding compensation of child actors were spurred by the case of one who was popular in the 1920s and litigated with his parents over where the money wasn't in 1939. That case doesn't provide for takedowns; but it's also the case that filmmakers are normally looking for children to play characters; rather than to do 'candid' intense documentaries of them at home; so the degree of public exposure of private life is presumably deemed to be less; with the main issue being children who were...definitely...getting a solid education while on stage finding that all the money was gone when it became their problem.

Child-blogging, by contrast, seems to reward verisimilitude (if not necessarily truth) and invasiveness, relatively pervasive in-home mining for 'content', so presumably seems better served by removal-focused options; though there has definitely been talk about covering the economic angle in line with child actors.

I don't even know what the deal is with child beauty pageants, or how something you'd assume is a salacious bit of slander about what pedophile cabals are totally doing, somewhere, is actually a thing a slice of parents are into, way, way, into. Apparently that's a third rail to someone, though, as the only jurisdiction I'm aware of with significant restrictions on them is France.

Comment Re:The Horse is Already Gone (Score 1) 13

Unless quantum computing becomes cheap and comparatively widely available quite quickly after becoming viable passwords seem like they'll be a manageable problem. Nobody likes rotating them; but it's merely tedious to do and the passwords themselves are of zero interest unless they are still being accepted. If it does go from 'not possible' to 'so cheap we can just go through through in bulk' overnight that could ruin some people's days; but if there's any interval of 'nope, the fancy physics machine in the dilution refrigerator is currently booked by someone with a nation state intelligence budget' you can just rotate older credentials.

Now, if you were hoping that encryption was going to save any secrets that are interesting in and of themselves that got out in encrypted form; then you have a problem. Those can't be readily changed and will just be waiting.

Comment Re:Windows is crashing because? (Score 1) 89

The most recent crashes I've had were all due to external hardware. (usually a dock being unplugged) I haven't seen that recently though so maybe that was addressed.

I've also had issues in the past with not going to sleep / waking back up properly, but again haven't really seen that recently so maybe that too was addressed.

Pretty much 100% of my recent related issues have simply been "system's getting slow, and no my memory hasn't all leaked away, it just wants a restart", and so I DO restart it, and I get all my performance back. It's annoying, but not impactful. Not sure what's getting gummed up under the hood, I don't see anything getting logged or showing up in any monitoring tool.

I tend to push my machine pretty regularly though, and end up being coerced into rebooting about once a month.

I do a lot of photo manipulation, and I HAVE ran into a problem with Finder's QuickLook gradually getting slower after tens of thousands (yes really) of videos and images being quick-looked, but I can just kill the Finder's QuickLook process and it automatically bounces back fresh as a baby. So whatever "general slowness" issue I've been encountering after weeks of uptime could probably be fixed if I knew what needed to be bounced, but nothing is making itself obvious with high cpu time or memory use, so I just have to reboot to get it back.

A bit OT but I do find it a bit sad that windows has decided to do away with the traditional BSoD, not by making the OS more stable, but by hiding it when it happens. "Nothing to see here, everything's fine!" (NakedGun)

Comment Re: Mac Studio is a redesigned Mac Pro (Score 1) 84

maybe not? Look at cache for example, there's L1, L2, and L3, each getting bigger and slower. Just because L2 is slower doesn't mean it doesn't get used.

Or look at some of the older storage techniques like hybrid drives. (such as 1tb of spinning platters, with 32gb of ssd)

Modern SSDs are even doing that. Watch the IO speed when you write a large file, see how it's fast to a point and then gets slow? that's a write buffer getting filled up.

Maybe the same technique could be used with ram, basically on the same lines as the VM files that unix systems (including Mac OS) use?

So there's plenty of precedent for adding higher latency storage, simply because the big increase in capacity is worth a little added latency. Carefully managing what you use it for greatly reduces the impact of the latency.

Comment Re:Why is this even a critricism? (Score 1) 75

Legally speaking, threats fall under "assault". If I raise my fist to you and step up and punch you, I'll probably be charged with "assault and battery". Where "assault" is the "imminent, credible threat of physical violence" of raising my fist and approaching you, and "battery" is my actually hitting you, (and if I miss or you dodge, that trades n the Battery for a second Assault charge) It's an important distinction because the laws and consequences differ

A threat of physical violence must be credible to be assault. That usually places the bar at "a reasonable person would genuinely fear for their safety as a result of the words and actions".

"Remote threats" are handled a bit differently. They used to go through the US Mail and so were addressed with "mailing threatening communications" (part of 18 U.S. Code) although that requires a lot more investment and consideration. Get out pen and paper, think about what you're going to write, draft the threat, stuffit in an envelope, add a stamp, take it to a mail box. That involves lots of time to reconsider, plus the investment of time, paper, envelope, stamp, and finally time to go mail it. (all while reconsidering and being able to change your mind) Most threats never made it into the mailbox as tempers cooled and emotion gave way to reason. But if it made it all the way through that process, a reasonable person would more easily be able to conclude the threat was credible

Now, it's fifteen seconds of "furiously type a line or two of rage and click Send." And it's handled by the FCC now since it's using an interstate communications network. There's a separate "legal bar" for it to pass, but it's essentially the same thing. The laws are much more recently authored, and so require a bit more since courts now rely more on letter of the law than interpretation by a judge. They're looking for Intent (specifically, are you venting, intimidating, or announcing your intentions), does the message describe a credible threat to the victim, and is it specific about what's being threatened.

"I'm gonna dance a jig the day someone ends you!" - lacks intent
"if I get my hands on you l'm going to launch you into space and watch you suffocate!" - not credible
"you're going to regret the day you pissed me off!" - not specific

(Law Abiding Citizen demonstrates masterful avoidance of legal classifications by careful choice of words)

Although as mentioned above, power and money can press a thumb down on the scales of justice and get an investigation launched regardless of established legal standards.

Slashdot Top Deals

Digital circuits are made from analog parts. -- Don Vonada

Working...