Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IP
Posts
3
Comments
882
Joined
2 yr. ago

  • Exactly. If they’re returned they won’t be allowed anywhere near other North Korean troops. They’ll likely be returned immediately to the DPRK and sent to a labor/prison camp so they can’t talk to anybody that might listen.

  • He’ll just manage to royally piss off every DC Police Officer who fought (and in many cases were injured , or worse) those self-proclaimed peaceful protestors that were anything but. The last thing he wants is a police force that would turn their back on him when he needs them most.

    The big question is whether or not somebody with enough influence in Trumps orbit managed to explain that clearly to him in third grade terms he can understand.

  • I recently traveled abroad. Flying back to the US I was one of about 10 passengers on my flight that was randomly selected for an extra search that I guess the TSA requires of flights coming into the USA. I couldn’t create my boarding pass in the airlines app ahead of time. I had to check in at the airport, and the airline employed explained that it was because of this random search. He had to print a physical boarding pass, and pointed out it had the code AAAA printed in big letters across the top. This lets everybody know I was one of the lucky random winners.

    At the gate, prior to boarding, they called up the names of all of us who had been chosen. They had a list, so they knew who we were. They confirmed our ID again & the boarding pass, then swabbed us down along with our carry-ons and put the swabs in an explosives detector.

    No idea why all that required a physical boarding pass, but it did. Until the TSA moves into the modern age they’re likely going to continue demanding paper boarding passes. And we all know how quickly government organizations upgrade the technology they use…

  • That applies to public spaces, yes, but not ALL spaces. I’m on the board of directors for a small non-profit organization that expanded their facility a few years ago. We had to prove for ADA compliance that one floor of our facility was restricted in its use and not for public access. If we had been required to make it publicly accessible then it would have required an elevator, which would have been so expensive that it would have put an end to that expansion project before it even started. The public spaces are all fully ADA compliant. Those private spaces are not.

    Also, like most building code requirements etc. the ADA only comes into effect with new construction or when the renovations to an existing property exceed a certain threshold (I forget the specifics). There are plenty of older buildings out there that aren’t fully ADA compliant.

    I know people who live on 3rd floor walkups that were likely built 100+ years ago with narrow curved stairs as the only way in or out. If you want to replace a delivery person with a robot in places like that then wheels won’t cut it.

  • Because the entire world is designed around the human body and the way it moves. It’s theoretically much easier to introduce a humanoid robot into an existing workspace than it is to retrofit all the doors, stairs, etc. to allow a wheeled robot to move around.

  • Spoofing is a whole hell of a lot easier said than done. Content delivery networks like Akamai, Cloudflare, etc. all know exactly how different versions of different browsers present themselves, and will catch the tiniest mistake.

    When a browser requests a web page it sends a series of headers, which identify both itself and the request it’s making. But virtually every browser sends a slightly different set of headers, and in different orders. So Akamai, for example can tell that you are using Chrome solely by what headers are in the request and the order they are in, even if you spoof your User-Agent string to look like Firefox.

    So to successfully spoof a connection you need to decide how you want to present yourself (do I really want them to think I’m using Opera when I’m using Firefox, or do I just want to randomize things to keep them guessing). In the first case you need to be very careful to ensure your browser sends requests that exactly matches how Opera sends them. One header, or even one character out of place can be enough for these companies to recognize you’re spoofing your connection.

  • AKA greed. Why license your content to Netflix when you can have your own streaming service and lock your viewers into your piddly little hoard of content?

    Just how many streaming providers are there today? That number likely changes almost daily at this point…

  • Any army that treats their troops as “cannon fodder” deserves not only all the casualties they rack up, but the long term social, political, and economic hardship that is pretty much a guaranteed result of such a policy.

    The constant rounding up & minimal training of “cannon fodder” is expensive both in the short and long term. Better to protect well trained resources and have them continue to gain experience by using more advanced weaponry that minimizes risk to them.