Are these hippo sprint speeds, or real proper endurance speeds?
Are these hippo sprint speeds, or real proper endurance speeds?
Foreign nationals, let alone foreign governments, are not allowed to give money to political campaigns in the United States. Actually illegal. Bill Clinton got in trouble for it
If you can prove that an NFT scheme was foreign campaign money laundering in court, people can go to jail.
Most places in the US will have nothing about severance written down anywhere, but it’s very common to actually pay severance in a mass layoff situation (unless the whole business is going under).
Current IT best practice is that passwords should never expire on a set schedule, but they should expire if there is evidence they’ve been breached.
Presumably they’d still need to hire a session orchestra to record it. That might be a stumbling block.
They said England is no more, but that red X is also deleting Wales and Northern Ireland.
Medical devices are required to comply with 21 CFR 820 in the United States, which establishes quality management standards. This includes minimum standards for the software development lifecycle, including software verification and validation testing.
In the EU, broadly equivalent standards include ISO 13485 and IEC 62304.
If an OEM wants to do a software update, they at minimum need to perform and document a change impact analysis, verification testing, and regression testing. Bigger changes can involve a new FDA submission process.
If you go around hacking new software features into your medical device, you are almost certainly not doing all of that stuff. That doesn’t mean that your software changes are low quality–maybe, maybe not. But it would be completely unfair to hold your device to the standard that the FDA holds them to–that medical devices in the United States are safe and effective treatments for diseases.
This may be okay if you want to hack your own CPAP (usually a class II device) and never sell it to someone else. But I think we all need to acknowledge that there are some serious risks here.
The Linux software you can get as a regular user from your typical Linux distributions is absolutely not any more secure on average than your typical Windows software.
I say this as someone who writes application programs on both systems.
I think it’s really debatable whether the Linux kernel is really any more secure than the Windows NT kernel. Linux advocates have pushed the “many eyes, shallow bugs” line for a long time, but high profile lapses seem to really have put the lie to that.
If wasn’t full garbage collection in the spec. It was some infrastructure support in the spec that would make it easier to write garbage collectors in C++.
“Look, we’ve only got the one engineering set, so we’d better use it.”
Man, I remember reading about all this home automation stuff in Compute’s Gazette for the Commodore 64. It’s been around forever and a day.
And Roe v. Wade increased access to abortion about the same time, together with the leaded gas.
122.75 is assigned for air-to-air communications.
In some ways that’s good: you don’t want someone shouting about “YOU’RE ON GUARD”. On the other hand, in this situation you want to choose a frequency that your target is actually monitoring, and guard may fit that bill better.
According to the non canon Star Trek Technical Manual, the transporter physically disassembles your particles, moves them to the destination location, and reassembles them with quark level accuracy. So-called “Heisenberg compensators” are a key technology to allow this to occur.
The on screen canon is at least somewhat consistent with this, but maybe not entirely.
Another aspect to this is that Android is Linux, but it is not GNU / Linux. This is true both in the literal sense of not using GNU coreutils or glibc, and also in the broader sense.
What I mean by the “broader” sense:
To the application programmer Android / Linux looks like a completely different ball game.
Israel has already been fighting a war with Hezbollah that Hezbollah declared. These attacks were fairly specifically targeted at Hezbollah’s military equipment. They have been arguably successful at disrupting Hezbollah’s communications, and likely command and control systems. That by itself is a valid military objective.
To the extent that these attacks directly hurt Hezbollah personnel, and to the extent that they damaged Hezbollah’s morale: those too are valid military objectives.
So “war crime” gets thrown around here quite a bit just because there are high civilian casualties. The facts are twofold: Civilian casualties have always been a part of warfare; and there is no specific number or proportion that makes some act into a war crime. That’s just not how these kinds of laws are written.
I have not yet seen a strong argument for a specific war crime rooted in a specific basis in international law. A lot of people bring up protocols 1 and 2 to the Geneva conventions, but Israel and the US have not ratified those.
There are other conventions that regulate weapons of war, but I’m pretty sure none of them are going to address pager bombs directly. An argument there would have to be at least somewhat creative.
This reminds me of the backup landing gear extension pump in the King Air 200 and 350. It takes like 50 to 75 strokes to fully extend the landing gear.
Oklahoma seems to be flipped around to show her underground side?
Man, I finally agree with Clarence Thomas on something. Oh, well…
It used to be that 640K oughta be enough for anyone.