Probably this. I'm extremely left leaning but even I know vice is absolute dogshit. I used to work in the tar sands with my brother's, and once a year we have a tradition of watching the Vice tar sands "documentary" to laugh at how wildly inaccurate and ill-informed it is.
This was an absolutely fascinating read, the paper isn't too dense for a layman to read and understand. Finished reading the paper and it definitely makes space travel seem more within our grasp.
The reality is, all of then knows difference between participation tropey and winning. Maybe trophies smooth over feeling bad for not being winner, maybe not, I dunno. Obsessing over them is ridiculous on its own sake.
Top schools are more competitive then ever. High schoolers need to adjust their whole life to have a chance to get in. Competitions are harder then ever.
Kids spend way more time in organized activities to get every bit of performance out of them - the only exception is likely football which is suspect of destroying their brains.
On average, kids have little time to just play around without working on something.
The Facebook app already know where you are. If both you and the other person have the Fb app, then I'm sure this feature could be implemented relatively easily.
I've taken to using Blendle to only pay for WSJ articles that I read. Saves me the money of a full subscription, and makes sure quality journalism is funded. Here's the link in case you want to read it, and support journalism: https://blendle.com/i/the-wall-street-journal/industrial-esp...
Neat service, thanks for posting. For others like my self unfamiliar, it seems to be a site for reading paid articles a la carte.
Onboarding was super easy (just an email address) and they give you a gift balance good for a couple articles ($2.50 in my case). Articles themselves seem a little on the high side (this one was $0.49, which seems to be the norm), but I'll probably continue to use this over other tricks to read WSJ content that crops up here, at least until my credits get used up.
Thank you for the link. This is a cool service. I think that we make a game of trying to get around the paywall. The WSJ should have the right to get paid for their work if that is their model. The existence of that story and everything around it was not free. It is okay for sites to have a paywall and it is okay for a user to say, well it is not worth it to me to pay and move on. If the stuff on the WSJ is good enough then they will make a business of it and if not they will change or die. This ideal that everything on the internet is free is pretty harmful long term as it devalues the work of those that produce the content.
One question, is there a simply way to navigate to the Blendle copy of an article that's paywalled? Do you have to just go to Blendle and search the article title, or is there an easier way?
You can try searching for the headline, but it's not foolproof as some times an article has multiple headlines. If nothing shows up just search for whatever proper noun the story is about (in this case I had to search for the CEO's name). I wish they had a browser extension or something to do this automatically, but I guess newspapers don't want to cannibalize their paywall.
For future reference, here is a procedure for finding an alternative source for stories such as this.
1. Go to the submitted link. It will give you the first paragraph or so.
2. Pick something distinctive from that and copy it. I picked "Samuel Straface".
3. Google for that, and filter that by last 24 hours.
There will usually be another source in the results. Sometimes it is a separate article covering the same underlying story. Sometimes it will be another paper or magazine reprinting the submitted story, which is the case here:
to any WSJ article to bypass the paywall. You have to click "Follow Link" to continue. You don't need to be logged into Facebook (or even have an account) for it to work.
Forgive the naive question, but would 2FA completely mitigate this attack, assuming that the org trying to access a key vault did not have access to the 2FA device?
No. This article describes an attack where the user has already gained access to the encrypted database, which assumes they have already subverted 2FA.
Not really, the databases are designed to be effectively public information. The security comes from the encryption, not OS-level file permission controls!
Funny you should say that. Here in the UK we're three episodes into a Handmaid's Tale TV adaptation. It's surprisingly good and you're right, it's excellent TV, even if I found the book itself quite a struggle back in college.
This happened in the past, a lot of people bought the track 'Ding Dong the Witch is Dead' from the Wizard of Oz movie in the week Margaret Thatcher died, BBC refused to play it despite it hitting number one.
It does raise interesting discussion points about the role of places like the Beeb in censoring what is essentially a list of the 'most popular' tracks in a given week.
Luckily this specific case is a little more clear-cut, stations can just invoke impartiality rules due to the General Election being so close and get around having to play the track.
IIRC they played a sample of it but not the entire thing. And they didn't conceal that it was number one in the charts, so I think describing the incident as "censorship" is going a bit far.
IME the BBC always goes easy on whoever is in power (or, near the time of an election, the presumptive winner)... this is quite natural since ultimately the government is in control of the organization.
To extend your last point, David Cameron has been down on record as saying "I can't wait to privatise it".
It was said tongue in cheek as a response to unfavourable coverage. Job security obviously isn't a joke to BBC employees so there is always going to be a "don't bite the hand that feeds" rationale to reporting.
That said, I think some of Laura Kuennsberg's reporting has been so blatantly biased I'm surprised she's got away with it. In fact, she has had at least one ruling against her regarding impartiality, with a slap on the wrist outcome:
They say there's no evidence of bias or intent but it means as much as KFC saying "we uphold the highest standards of hygiene and all our staff are heavily trained as such" in response to an employee pissing in the milkshake.
"The Big Top 40 show on Capital FM and Heart opted not to play the song"
But in this case it's not the BBC refusing to play it... is it? I'm not too familiar with British radio stations, so those might well be BBC's subsidiaries.
Anyway, "this is quite natural" - I don't think the criticism was that it's unnatural, just ethically suspect.
Capital and Heart are privately owned and operated stations. The BBC Charts usually air on Radio 1 I think on Friday, so we will have to see if they opt to play it then, though I strongly suspect they will not.
I worked somewhere where the behaviour described in OP's post happened. It was just lighthearted. We worked in desk 'bays', so someone sat next to the unlocked PC would have visuals on what the prankster was doing on the machine. Harmless emails like 'I'm buying the whole office donuts at lunch' were sent. It was very rare for any employee to leave their machines unlocked twice with this unofficial procedure in place.
At University we had a question around this type of 'transfer'. I can't remember how it went exactly but we were to calculate the bandwidth of a jumbo plane carrying x amount of hard drives with y capacity to z destination. Given that the flight takes so many hours, what is the total transfer speed of data in seconds?
I saw a few students nearly have a breakdown over that one.
Yes, to those who had studied it was fairly obvious what the solution was, but the phrasing was such that to those who were just trying to wing it failed miserably.
Yes - the first year of University was designed as a catch-up to those who hadn't previously had exposure to this sort of thing and weed out the coasters.
I must stress this was a single question on a single first-year exam. Not representative of the whole course in the slightest.