The only people who would then be prosecuted are those researching and exposing how easy it is re-identify data. How do I know that?
323 posts • joined 14 Aug 2020
The Register speaks to one of the designers behind the latest Lego Ideas marvel: A clockwork solar system
AI caramba, those neural networks are power-hungry: Counting the environmental cost of artificial intelligence
Apple to let reader apps steer users towards out-of-App-Store purchasing following Japanese watchdog probe
What is your greatest weakness? The definitive list of the many kinds of interviewer you will meet in Hell
I became familiar with big-O in the 80's, and I hadn't heard of "order of" so I was curious and looked on Wikipedia.
> In the 1970s the big O was popularized in computer science by Donald Knuth, ...
> ... The big-O originally stands for "order of" ("Ordnung", Bachmann 1894),
So just how old are you? :) No really - I think like all language there are dialects.
Called Firewall for a reason.
I had some regular work it at various semiconductor manufacturers in Japan, Taiwan, and Korea, and without exception the machinery would be connected only in isolated networks - e.g., only machines of the the same supplier. Supplier personnel going in the factory gates had to have laptops and discs scanned for viruses, and the disc usage in Mb was recorded, and then checked again on the way out to make sure it was nearly the same. While the limited connectivity was useful, the gate checks were more of a formal show.
I wonder if Japan's Renesas chip plant was isolated as it should have been?
A "new condition" old phone, a "refurbished" old phone, or a "used" old phone?
Nowadays you can't change the battery easily yourself, and it will cost ~100 currency units to replace it, so I wouldn't consider a "used" old phone unless "repairing" was an enjoyable experience for me.
This year I bought a "new condition" old phone - Motorola 2020 g8, which is only old because the 2021 model is already out. A 5000 mAh battery and only 157 currency units.
Actually bought it to use instead of a Garmin cycle computer, the cheapest of which is around 200 to 300 currency units.
The problem for Toshiba OBN and the Ministry of Economy, Trade and Industry (METI) is that Toshiba accepted the investment money in the first place.
From another perspective, Toshiba's problem was getting involved buying Westinghouse and its modern design AP1000 nuclear program in the US, which after over a decade and billions in investment in half finished plants went belly up in 2017 without a single reactor running - pushing Toshiba over the edge at the same time. Other than the decision to invest in Westinghouse, none of that was Toshiba's fault or under their control. China picked up the pieces and now of course have 4 AP1000's running online, and have begun on the AP1400's.
> I wouldn't want to be seen by her.
That's the bottom line isn't it. There is a real danger she will not follow the rules because she thinks she knows better. Just like the pharmacy employee who took vaccines out of the fridge so they would spoil overnight - putting them back the next morning. Nabbed!
Anyway, if she can't take vaccines she shouldn't be a nurse - wrong job - it's a health risk to others.
Photographer seeks $12m in copyright damages over claims Capcom ripped off her snaps in Resident Evil 4 art
I have zero background knowledge about this, but I am curious about how Epic prices it's games on different platforms. I can see on the website www+epicgames+com/store/en-US/ that the game "Red Dead Redemption 2" currently costs $40.19. The site FAQ says "The Epic Games Store is a curated digital storefront for PC and Mac".
I am curious - before being banned, did Epic set the Android/iOS price to cover the extra charge = $57.41? Or do they for some reason keep the price the same on all platforms?
Another question - why does the fact that iOS and Google both charge 30% not bring about a claim of price fixing? (Of course it needs to be proven.) The fact that there is no competition seems to be the root of the problem.
Seagate finds sets of two heads are cheaper than one in its new and very fast MACH.2 dual-actuator hard disks
Apple sued in nightmare case involving teen wrongly accused of shoplifting, driver's permit used by impostor, and unreliable facial-rec tech
Who gave dusty Soviet-era spacecraft that unwanted lick of paint? It was an idiot, with a spraycan, in Baikonur
Re: Soviet tech..
Concorde flew to both Washington DC and NY, among many international destinations. However, even when all other routes had been shut down due to unprofitibility and noise, the NY route was the last remaining. ["Concorde", britannica (dot) com].
The reason the US abandoned govt sponsorship of the SST is because it was recognized and acknowledged early that it would be an economic failure. In the meantime Boeing developed and sold a lot of 747's, making a huge profit.
There were complaints about the Concorde's noise because it was noisy. The SST had the additional feature of being too noisy inside the aircraft - not good for luxury appeal.
Re: Ummm, no.
"Only if you want to be the guy cleaning out the cum stains, the puke, the blood, the needles, and the litter."
It is urban areas where some already get by without cars where automated driving (when realized) will really take off. And I think the majority of in-city usage will be van/minibus vehicles carrying multiple passengers on overlapping routes (ride-share), for economic reasons. High passenger/day capacity means that more can be invested in sensors and on-board computing - those costs will always be a bottleneck.
It will also make economic sense for those vehicles to be designed with clean-ability in mind - seats that can be wiped down, no crevices for food to fall into and rot, etc.
BTW - I'm animal and proud of it. What are you?
Why Python's pip search isn't working: We speak to infrastructure director about ongoing traffic overload
Surely it's >meant< to be for human search - the search box at pypi (dot) org serves that purpose adequately.
One possible reason it is not getting cleaned up from whatever automated scripts are using it is because it is non-essential usage which was coded to not abort on error. So the failure just takes a few ms more which nobody notices.
One server-side approach to fix it would be to not reply at all, so the client would hang until timeout. More likely to get someones attention.
Also, rewrite the pip program to remove the "search" command - although that wouldn't help with older versions which will be around for a long time.
"... how to get 5G rolling in India, with access to street furniture as sites for small cells identified as an issue that needs to be better understood ...."
Two way to interpret this. I like the one where a furniture is put out on the street (sidewalks) under small cells, so that the necessary crowds for 5G to be economical will relax on the furniture and use their 5G.
The Microsoft Authenticator extension in the Chrome store wasn't actually made by Microsoft. Oops, Google
“One of our conclusions is that not everything on Twitter is a good candidate for an algorithm, and in this case, how to crop an image is a decision best made by people.”
Just imagine all the hours wasted as user trieds to figure out where the UI for controlling the cropping was, and all the frustration that caused as it wasn't there. Needlessly.
I was using "google auth (with the time based numbers)" on my main cell phone as 2FA to log in to Google on my desktop. But I didn't feel safe with that because I mount my phone on my bicycle and use is as sports GPS/ANT+ recorder without screen lock. So I moved "google auth" to another obsolete phone without a SIM card and on which I leave Wifi switched off always - it became a dedicate stay-at-home un-connect auth device.
Google response to that was to force me to use my main phone as an per-login-optional 2FA device. When I try to log in online, there is always an option to use my phone as a 2FA device, and that option is the default. I can select each time to use my offline "auth" phone, but if my phone ever got into the wrong hands the bad guy could use the phone as 2FA.
I use complex passwords, so it's not the end of the world, but it is a pretty stupid way to hobble their own 2FA.