That means the British Indian Ocean Territory will cease to exist, along with the .io domain and countless websites.
What will happen is that the International Standard for Organization (ISO) will remove the country code “IO.” IANA (Internet Assigned Numbers Authority) which creates and assigns top-level domains, uses this code to determine which top-level country domains should exist. Once ‘IO’ is removed, IANA will start the process of retiring .io, which involves stopping new registrations and the expiration of existing ‘.io domains.‘
I don’t get this: shouldn’t Mauritius gain ownership of .io? Russia has .su, and it’s been over 30 years since the Soviets existed.
[edit] also, since there’s .whateveryouwant these days, why not just make .io a non-country TLD? That’s how it’s used anyway.
I feel your pain. I have maintainer roles for a few projects where things could be slowed down by a week or more if I didn’t have direct commit access. And I do use that access to make things run faster and smoother, and am able to step in and just get something fixed up and committed while everyone else is asleep. But. For security critical code paths, I’ve come to realize that much like Debian, sometimes slow and secure IS better, even if it doesn’t feel like it in the moment (like when you’re trying to commit and deploy a critical security patch already being exploited in the wild, and NOBODY is around to do the review, or there’s something upstream that needs to be fixed before your job can go out).
They haven’t been removed from the community though — just the maintainers list. Now they need someone else’s review to commit code to the kernel.
Personally, I think even maintainers should be required to have that — you can be the committer for pre-reviewed code from others, but not just be able to check anything you want in, no matter your reputation (even if you’re Linus). That way a security breach is less likely to cause havoc.
Actually, it may. The US has some odd laws where US companies have to enforce US restrictions globally. However, it wasn’t my understanding that Kaspersky was on any of the lists that would have resulted in this. Possibly it boils down to a Google ToS violation?
I’m sure we’ll be hearing more details this week.
I’m confused: Kaspersky just finished transferring its endpoint security software in these regions to a different company’s product via a software update. Kaspersky has sent messages out to customers saying that they are leaving this marketplace.
Given this context, I can see no reason why Google would leave their Android product available when they’re not technically allowed to sell it and Kaspersky has said that they won’t be selling it into these markets going forward. It does, of course, prevent Kaspersky from pulling another bait and switch and “updating” mobile devices to a third party product. That would be the reason for locking out the developer accounts.
I think they just left out “…in the lab.”
The research is great, the article is horrible in many ways; it was obviously written by someone who didn’t understand what they were writing about.
Even leading with a high power laser array image when the article is about heating plastic with a low power non-visible radiation….
Yeah; just set your article to 2x speed :D
I kid; all this video is going to vanish one day, and the text will remain.
And for most things, text is a highly superior format. Sometimes you need a few images or a video clip to supplement it, but I like to ingest information while my ears are otherwise occupied. I keep my phone and computer muted most of the time. I often watch videos with closed captioning enabled on 2x just to scrub through and find the 10 seconds of actual information in the 15 minute video.
You know those “do not lick the flagpole” signs?
They’re not there because the building owners think YOU will lick the flagpole. They’re there because someone else already HAS licked the flagpole.
MS adds these things because there is legal consequence to them allowing certain groups to use their software. So they explicitly call out that those groups cannot legally use their software.
That way if an Iranian arms dealing pedophile is caught using their software, Microsoft doesn’t get sanctioned by the US government.
Yes, at the point where the only thing hindering free software from running on a device is the policies of the organization SELLING the device, it should be the policies that change, not the ability of software to remain free.
I choose iOS because of the walls, but I also sideload software. That sideloading is limited in the number of products I can sideload at a time, and it requires a sync connection with a computer. I kinda sorta agree with Apple’s restricting of sideloaded software to a limited number of apps, but the computer/XCode requirement could easily be solved in other ways.
The goal is to make it difficult to trick someone into installing a malicious payload; Apple should allow individuals to self-sign software and run it in a sandbox— just like they do with Progressive Web Apps.
I mean, if I can download and run a PWA of a Palm emulator from a web page, why can’t I do the exact same thing with the same levels of protection with a native app? Only thing stopping me is an Apple App Store policy.
Depends.
Calligra has a great interface.
I’m unsure however how it does with importing/exporting documents, and how well it works with OpenDocument formats.
LibreOffice can edit my ClarisWorks documents from 35 years ago and can also open and edit my OpenOffice documents and display them exactly as they were 19 years ago.
The new bit is essentially that a bunch of vendors have been using test keys in production hardware, mostly enterprise hardware, and nobody has implemented key clustering or rotation like the original design spec recommended.
Beyond that, the older news is the legitimate production key compromise, stored online behind a four character password. But this one’s not as big an issue as most of the implicated hardware is already EOL and no longer in use.
If recommendations are being provided to me as a service and the algorithm that goes into it is relatively transparent, I have no issues.
If advertising is based on the value an advertiser sees in the product being advertised, I have no problem.
If I’m the product being sold or an ad distribution network is involved, I’ve got a problem.
Wouldn’t their patch embeddings return different results depending on the visual boundaries? They don’t appear to use overlap redundancy; this means it’s going to be significantly less resource intensive, but the chance of losing significant signals in the image to text translation surely must be inversely high?
Makes sense, as actual AI research is based in applied mathematics and data/signal modelling. And the Chinese education system has trained students in those areas ruthlessly over the past 40 years.
So combine large population base with education system focused on the core competencies required for AI studies, and you’re going to get a majority of the talent coming from that system.
I spent multiple years learning a skillset which put me into an employment position. Of those jobs I had as an employee 20 years ago, almost all of them were mostly done by machine learning systems a decade later. But that was OK, because I kept on learning and moving ahead of the trend, leaving the learned,boring stuff to automation while I learned new things to give my company a competitive advantage.
I don’t think I could ever work a career where the job I was hired for was my employment until I left.
One of the first things MS did after buying Mojang was to slap Azure AD on it for account management; and it’s been a number of years now since they switched to that being the only way to authenticate to Minecraft.
This has definitely been the frog boiling strategy at Microsoft for a decade or so. It’s likely a big part of why Windows 11 exits, too.
I can see it from both sides. My gmail accounts (regular and throwaway) were roughly my fourth generation email addresses. I got my first email address in 1990. It was tied directly to an educational institution. When I switched institutions, I switched email addresses, and around that time got an ISP email address as well. Non-educational emails went to my ISP address and anything educational related went to my new edu address; everyone in edu circles knew to switch addresses because my .plan file associated with my old account advised them it was closed and what my new one was.
Eventually, I realized that neither my ISP nor edu institution would be with me forever, so I switched everything over to an email redirect service with Yahoo and Hotmail throwaway addresses for stuff that needed an account that was neither professional nor personal.
Then along came Google, Yahoo imploded, Hotmail got bought by Microsoft, and my email redirect service went out of business as the dot com bubble burst.
Oh, and I changed jobs which required moving which meant switching ISPs.
So GMail was a lifeline because I set all my other accounts to both forward to gmail AND set autoresponders informing the sender of my new address.
Of course, that happened 19 years ago. Back then, there were no SMS authentications, no real life accounts tied irrevocably to an email address. My eBay and PayPal accounts just needed an address update, and pretty much everyone else hadn’t got to the point where email address was even an option on a registration form.
That said, I recently did some email address shuffling, and all the accounts that really matter got switched relatively painlessly; I have a password manager, and part of changing addresses involves going through every entry in my password manager (which is already helpfully divided into personal, professional and throwaway) to update addresses as appropriate.
Everyone else gets the same autorespond and redirect treatment for a year. After that, anyone I’ve missed will have to locate me via someone else.
Of course, I’ve also maintained a PGP key since 1993 that has my chain of email addresses associated with it, so anyone who knows my key can just look up my current email address. It’s really the only thing I use that key for anymore. But there’s a very limited set of people that would even think to look me up by PGP, or even save a copy of my public key and remember the key exchange I use.
Google previously proposed putting restrictions on the functionality of this API for security reasons, potentially impacting the effectiveness of ad-blockers across all Chromium-based browsers including Chrome and Microsoft Edge.
Think antitrust may have had something to do with their change of heart?
The laughability of preventing content filtering for security reasons should have been so obvious that not even Google could argue that one with a straight face.
That’s the official dev board. You can build a router with that, but most people don’t build their routers up from components.
GL-iNet definitely predates it though.