Did you read the part of the linked to article that says that a similar request was refused and the court agreed that these records are not releasable though a FOIA request back in 2013? Yea, didn't think so...
And that proves there's nothing to hide because...?
It is standard practice for bureaucratic offices to deny requests which are not made through proper means. Citing that the request was made through improper means does not entail that there is something to hide, merely that the bureaucrats are either lazy or just not prone to sharing information unless required to by law.
The belief that "there is something to hide" is not supported by the events and is a projection of a mind prone to paranoia. That's not to say that there isn't something to hide, but merely that inferring such from the events is not a sound inference.
I use NONE of these tools as a web developer.
Unless your education was complete crap, you still learned what you were supposed to learn which was a skill with certain KINDS of tools, allowing you to move on and use better tools than what they used in your classes. At worst you learned what not to do and what tools not to use, which is still very valuable knowledge.
Why is all the stuff broke? Why does all the stuff have holes in it? Why isn't there any stuff that isn't broke? ARM processors from now on. All this stuff is broke.
To a computer there is no difference between "good instructions" and "bad instructions". Any ability to update or improve existing code is also a vector for getting infected by malicious code. You can either allow updates and risk infection, or you can hard code the firmware and disallow updates, but then you're stuck with whatever the firmware is at the outset.
It's not broke. It's just upgradable. Unless you have solid protocols to control who can upgrade and what upgrades are applied, you are at risk of getting a malicious "upgrade". Even with good protocols, an attacker can mimic the appearance of an authorized upgrader and fake the certification of the upgrade to get a malicious payload installed.
Nature is riddled with this kind of phenomenon. Undesirable mate X tries to present itself as desirable mate Y to inject its dna into the replicator.
Looking forward to playing a 110 Murloc Demon Hunter. Especially since I unlocked all my Heirlooms.
They have a new crafting skill specializing in tomato farming!?!
That thought came to my mind a while ago. Eventually, our whole brain replace itself but we never cease to be, well, ourselves. Even though it's a generally accepted concept in
It's a complex but very fun concept to play with, but it's also quite terrifying sometime.
So you are not a static object. You are an evolving pattern. Is there really much to make a big deal about?
This gets modded to 0?
It starts out at 0 for being posted by an AC. Likely no one has modded it one way or another.
People apparently stay at work so long that they need a dedicated toothbrush.
That or they just like to brush after every meal, trust their fellow bathroom users not to scrub the toilets with their brush, and can afford to keep duplicates of their hygiene utilities at the place they spend around half their waking hours.