In a certain day and age Brøderbund Print Shop - made stuff was *everywhere*.
In a certain day and age Brøderbund Print Shop - made stuff was *everywhere*.
>>A lot of your excess wind power during the summer comes at night when it's cool,"
>I gurddit depends where you live, but around here there's usually less wind at night,
Weirdly, I thought the same thing. As a small boat fisherman I can tell you that it's a lot calmer out on the lakes at night than during the day. At ground level it's absolutely true, it's less windy at night.
But up at the hub level of a wind turbine it seems it's not: it's more windy. For example here is a study on why wind noise from turbines is worse at night (spoilers: it's windier and there's less atmospheric disturbance at ground level, so it sounds noisier)..
Once the executive team figures out that IT security is really important they tend to fuck it all up with an endless parade of audits and consultants
Like any parade, it's all for show. These people swoop in, make IT teams fill out questionnaires, conduct interviews, write reports, make recommendations, but nothing real actually gets done. What IT needs are people willing to get their hands dirty and actually help out with these projects. IT winds up having more thrown on their plate without increases in staffing or budget.
Ditch your PricewaterhouseCoopers schmuks and hire someone to actually do the work.
Yes, and slashdot linked directly to Forbes earlier today. The warning looked suspicious, so I didn't fall for it.
I bid... 4, and I use (mostly) my real name. Guess I have to stop being a grouchy old cuss.
I work in software for a payroll processor and the "duplicate" SSN problem comes up all the time.
First off, we're not the employer and really don't care who you hire -- that's your problem. I think your contract with us requires that you perform verification of your employees, but we don't handle it. Give us an SSN, and we'll put it in the system.
Secondly, we *legitimately* see duplicate SSN's all the time in our database. Most common? Someone holds two jobs at once and we do payroll for both employers, for example.
Or, a worst case? Jane Smith works at ABC Company on January 1. She gets married on February 1, changes her name legally, moves, and gets a new job. Her old employer "lays off" Joan in case she comes back. February 2 she shows up in our database as Jane Doe at a new address, new job, new name but the same SSN. Both employers saw legitimate documentation and neither has knowledge or a duty to inform the other of any of this -- nor does the employee. We are bound not to disclose this to either client (confidentiality). What do we do? The quarterly filings contain completely different Janes, with the same SSN.
This is someone else's problem.
Now the State and Feds have this file that contains a "duplicate" SSN -- and they know it. What can they do, short term? They've got to swallow the file and take the withholding money. They're so far downstream from the problem, the best they can hope for is to send a notice to the employers asking "WTF" or kick Jane out for an audit when she files. The employers will both say she's fine. When she files -- a year later -- she claims both incomes, properly. Everything is okay for the IRS.
TLDR: SSN is a *terrible* indicator of uniqueness, and the IRS can't find your illegals for you.
Systems in Slashdot context I assumed would be understood as "software/hardware" systems.
Fantasy sports leagues are boring as hell. But I design financial systems, and I find cheating fascinating.
In a betting system (horses, sports, etc...) you have to base your bets on your own external information (scores, statistics, etc...) and possibly with some help from the betting system itself (300-to-1 odds indicate that this is a long shot).
However these guys had access to the betting information from other players -- in greater detail than the externally stated odds. The articles don't say how much they had access to. Let's say they had all of it. It'd be a reasonably cheat then to find the top few bettors based on past performance, and mimic their wagers. You might not win big, but you probably wouldn't do too badly. Crowd-sourcing the bets, from a very selective crowd.
Luck still plays a part, but this shaves some of the luck off based on information gleaned from data that others had no access to. It's insider.. something.
The quick thought is that systemd has a larger surface area for vulnerabilities than su and is therefore more likely to be a vector for attack -- this is almost always the *correct* assumption. The ball is in systemd's court to prove that despite having more code and more complexity, it is not as vulnerable.
As a kid my family had a Channel F and a boatload of cartridges for it -- plus 2 built-in games! The last one I remember getting was "Galactic Space Wars", and then the Atari 2600 showed up thus relegating the Channel F to the closet.
The graphics weren't great, and the games were something that a beginner could code up on an Atari 800 of the same era in BASIC. But they were fun enough. The Channel F did have a really unusual controller: the joystick could be moved about in a normal axis (up,down,left,right,diagonals) but also twisted, pulled up, or pushed down. The damned things broke a lot and were hard-wired into the console itself.
I didn't! Nowhere did I say the term was the authors exclusively. If you RTFA, you'll see the author uses the term twice for a specific reason. That is, where one speaker uses a more complex form of language relative to another speaker. To each the other's English is "broken" (his quotes, not mine). One is merely a subset or a simplification of the other. The author's point here being that "broken" is a two way street.
There are cases in English, and some of the more common verbs are irregular. However, to your point, if I didn't decline my pronouns properly and fumbled around my irregular verbs in English I'm still perfectly understood. (But, to use the article's term, "broken".)
English's main problem for non-English speakers seems to be the vast vocabulary and idioms, neither of which are needed for functional communication.
Back in the day (80's, 90's) when hard drives would refuse to spin up, a similar technique often worked. Take the drive and pop it into a very warm (but too hot) oven, or leave it on a car's dashboard on a hot summer's day. When it's hot enough that it's very uncomfortable to hold, but not hot enough to burn you... quickly drop it back into the system and spin it up. Then.. back up your data.
This'll cure stiction or lubricant problems with the platters.
One of the things that always mystified me growing up fishing here was the incredible uniformity of freshwater fish species across water bodies with very little geographic connection. New England is dotted with thousands of small ponds, and they all have more or less the same fish. Even tiny little ponds of a few acres with no major tributaries and only seasonal outlets will have bluegill, yellow perch, and probably a few black bass lurking somewhere and reportedly some pike or muskellenge. How did they get there? And why aren't fish like bluegill from different watersheds distinctive, the way the finches Darwin found in different Galapagos islands were different?
From Michigan here, lots of unconnected lakes and ponds here too.
It was always explained to me that they get there carried on the feet of waterfowl. Ducks and such land in the shallows and weeds, feet get covered in eggs. Ducks move on. Sometimes they're stocked by property owners or the DNR.
The fish *are* genetically diverse. Big fishing tournaments rely on this fact and do genetic testing on fish to make sure they came from the correct lake.
Does anyone else remember Jesux? It didn't claim to talk to God, but <rabbi_voice>it couldn't hurt<rabbi_voice>.
Just go with the flow control, roll with the crunches, and, when you get a prompt, type like hell.