Are these hippo sprint speeds, or real proper endurance speeds?
Are these hippo sprint speeds, or real proper endurance speeds?
Foreign nationals, let alone foreign governments, are not allowed to give money to political campaigns in the United States. Actually illegal. Bill Clinton got in trouble for it
If you can prove that an NFT scheme was foreign campaign money laundering in court, people can go to jail.
Most places in the US will have nothing about severance written down anywhere, but it’s very common to actually pay severance in a mass layoff situation (unless the whole business is going under).
Current IT best practice is that passwords should never expire on a set schedule, but they should expire if there is evidence they’ve been breached.
Medical devices are required to comply with 21 CFR 820 in the United States, which establishes quality management standards. This includes minimum standards for the software development lifecycle, including software verification and validation testing.
In the EU, broadly equivalent standards include ISO 13485 and IEC 62304.
If an OEM wants to do a software update, they at minimum need to perform and document a change impact analysis, verification testing, and regression testing. Bigger changes can involve a new FDA submission process.
If you go around hacking new software features into your medical device, you are almost certainly not doing all of that stuff. That doesn’t mean that your software changes are low quality–maybe, maybe not. But it would be completely unfair to hold your device to the standard that the FDA holds them to–that medical devices in the United States are safe and effective treatments for diseases.
This may be okay if you want to hack your own CPAP (usually a class II device) and never sell it to someone else. But I think we all need to acknowledge that there are some serious risks here.
The Linux software you can get as a regular user from your typical Linux distributions is absolutely not any more secure on average than your typical Windows software.
I say this as someone who writes application programs on both systems.
I think it’s really debatable whether the Linux kernel is really any more secure than the Windows NT kernel. Linux advocates have pushed the “many eyes, shallow bugs” line for a long time, but high profile lapses seem to really have put the lie to that.
If wasn’t full garbage collection in the spec. It was some infrastructure support in the spec that would make it easier to write garbage collectors in C++.
And Roe v. Wade increased access to abortion about the same time, together with the leaded gas.
122.75 is assigned for air-to-air communications.
In some ways that’s good: you don’t want someone shouting about “YOU’RE ON GUARD”. On the other hand, in this situation you want to choose a frequency that your target is actually monitoring, and guard may fit that bill better.
Another aspect to this is that Android is Linux, but it is not GNU / Linux. This is true both in the literal sense of not using GNU coreutils or glibc, and also in the broader sense.
What I mean by the “broader” sense:
To the application programmer Android / Linux looks like a completely different ball game.
I think Silver. Nate left FiveThirtyEight and now the site doesn’t even publish any kind of predictive model.
The President can do a lot of macro things that affect oil supply, like exercising some control over leases in public land, choosing to regulate or deregulate fracking, or invading a foreign country to obtain more oil.
In a more micro scale the President has fairly direct control over the Strategic Petroleum Reserve, and can decide when to release and when to replenish.
Israel has already been fighting a war with Hezbollah that Hezbollah declared. These attacks were fairly specifically targeted at Hezbollah’s military equipment. They have been arguably successful at disrupting Hezbollah’s communications, and likely command and control systems. That by itself is a valid military objective.
To the extent that these attacks directly hurt Hezbollah personnel, and to the extent that they damaged Hezbollah’s morale: those too are valid military objectives.
So “war crime” gets thrown around here quite a bit just because there are high civilian casualties. The facts are twofold: Civilian casualties have always been a part of warfare; and there is no specific number or proportion that makes some act into a war crime. That’s just not how these kinds of laws are written.
I have not yet seen a strong argument for a specific war crime rooted in a specific basis in international law. A lot of people bring up protocols 1 and 2 to the Geneva conventions, but Israel and the US have not ratified those.
There are other conventions that regulate weapons of war, but I’m pretty sure none of them are going to address pager bombs directly. An argument there would have to be at least somewhat creative.
Well, which one is it?
The US has a few thousand miles of land borders, and there are some neat places to visit along them.
I’m not at all sure where this gentleman went or why.
I thought they catch fire and burn down slowly.
Correct. Both the recent pager and radio attacks, and the 1996 cell phone attack, were performed by planting military explosives inside the devices in advance.
There is no magical way to hack the electronics to make a lithium battery straight up explode.
TPS is a lawful status in federal law. But it’s also not a regular immigration status that you’d get with an actual immigrant visa.
The idea is that TPS recipients are going to ship back out just as soon as Haiti (or wherever) gets its act together again. It’s not a very secure status and does not lead to green cards or naturalization.
Also, Israel already assassinated someone by exploding their cell phone way back in 1996.
When I started on Debian, there was only apt-get. (And dpkg if you manually pulled .debs from somewhere).
Then a little while later, there was aptitude, which was nice.
apt the command didn’t show up until 2014.
It used to be that 640K oughta be enough for anyone.