So if ISPs are once again Title II common carriers, how can they enforce the TikTok ban? 🤔
What’s worrying about this report is that it’s coming from Google itself.
Google just bought Mandiant, one of the leading cybersecurity and threat intelligence firms. Therefore, Google is one of the leading cybersecurity and threat intelligence firms.
It’s now expected that Google would release this kind of report, seeing as they sell this as an enterprise service.
Mandiant has previously released this type of report regularly; for instance, they were the firm that disclosed the SolarWinds hack.
Don’t bother with the cert if it’s not your job, but at least look into CCNA Routing and Switching. There are tons of courses available, both in person and online, as well as numerous YouTube videos on the subject.
See if your local library or community college has an adult education center that provides a course. At some point, you will need to learn subnetting, which is just math, but practice makes perfect, and your life is easier if you have it committed to memory.
Proper written work is still one of the most effective ways to do this.
Why do you think they all opposed right to repair?
And specifically, right to open repair? They’ll happily send you a $600 TPM-locked biometric sensor, because they would control the market and ROI, but won’t let you buy a $90 alternative from someone else.
antitrust law does not regard as illegal the mere possession of monopoly power where it is the product of superior skill, foresight, or industry
United States v. Grinnell Corp. (1966).
A market share of ninety percent "is enough to constitute a monopoly; it is doubtful whether sixty or sixty-four percent would be enough; and certainly thirty-three per cent is not.
United States v. Aluminum Co. of America (1945)
Reddit is not a “big corporation”.
How big is big? They’re working on a 6.5 billion dollar valuation. Sure, that’s not S&P 500, but that’s not your mom and pop coffee shop.
https://www.cnbc.com/2024/03/01/reddit-seeking-a-valuation-of-up-to-6point5-billion-in-ipo.html
This is a full funding plan, for the rest of the fiscal year, for six out of the twelve required funding bills.
Not cheaper. More likely there is budget available for National Guard resources and things like anti-terror, disaster relief, etc., as opposed to next to nothing for infrastructure improvements and staffing.
So let’s say I ask a talented human artist the same thing.
Doesn’t this prove that a human, at some level, is storing the data of the Joker movie screenshot somewhere inside of their memory?
I mean, yea? Income less operating expenses is profit, so if you can lower operating costs, without compromising the service, your bar to profitability is by definition lower. This is why it is called “right sizing”.
Fta:
"I want to be clear that we still have more than enough resources," said Clancy. "We are still a reasonably sized organisation. We're still going to be able to service your needs. We're still going to be able to improve the product.
The biggest mistake users will make is thinking their data is safe JUST because they have a NAS or a RAID. It’s common parlance in Systems Administration that RAID is NOT backup.
To wit— not truly understanding RAID and how it relates to capacity, parity, and especially the time required to rebuild in failed disk situation. It is a crucial mistake to use RAID 5 with greater than 2TB disks, and even that is pushing it, but RAID 5 is at least in the zeitgeist.
There are also some outside concerns such as Drive batch dates and knowing to pre-purchase spare disks well in advance that may hamper recovery.
Possible? Yes. Likely? Not at all.
To perform a zero knowledge proof, you’d have to have structured data to support the claim, which most whistleblowers would not have. If a whistleblower already had the hard evidence in hand, e.g., serial numbers and timestamps, they could have just provided those anonymously, and someone could follow up. The problem is, you can’t always get a copy of the hard evidence without revealing your intent to the employer, or at least, other employees.
Presumably most whistleblowers are making unsubstantiated claims that something happened, or maybe with light evidence. Based on who they are, a journalist or investigator may then elect to follow up and dig up the hard evidence to support the claim. This requires revealing your name and position/relationship to at least one person. Rarely, they would be willing to put themselves out there to provide an affidavit under oath, which itself is not enough to pursue criminal charges (though it could help build a case around intent or willful neglect, or help support a warrant or discovery).
It’s illegal, but not unheard of, to try to force journalists to reveal their sources, but the same protections are not universally in place if you reported a finding to a company’s internal affairs, for example. But unlike attorney-client privilege, or shield law protections, the risk in signing an affidavit is, as we’ve seen in recent US trials, that records will not stay sealed, and your name will be revealed to the defense and/or public.