







It sounds like he’s more mad about the dog than the people in MN
Yeah, they switched production methods in the 90s to save on manufacturing costs.
Back in the 70s they were made from solid steel


The main reason it still exists is not a good one.
People are used to it happening and are scared of change.
It’s the fact that the easier options are bad choices.
It’s easier to sit around the house than it is to exercise. It’s easier to order pizza than it is to cook something. It’s easier to be ignorant than actually learn and change.
The easy choice should be the good one. Making a bad choice should take effort.


“Hegseth declare that all banana splits served to troops be gendered as male”
Yeah, I would absolutely take issue with the head of a government institution saying something like that. That is a bonkers thing to say as a public official and should invoke some kind of mental health check.
I’m aware Hegseth is just posturing for brownie points with this Scouts thing, but this kind of behavior should not be normalized. I still remember when Howard Dean lost his bid to be a presidential candidate because he got too excited during a speech.
tag urself im porno freaks


There should be no need for this to exist. The internet has been around for long enough without age verification that it doesn’t need to be added now.
That being said, this is the lesser of the two evils, I think. If your age data exists at the device-level and can send an authorization to a service that says “This user is an adult” without needing to send them any additional identification, that would be better than needing to trust some nebulous cloud service with identifiable information tying your personal identity to your online habits.
I’ve had an IT Career for about as long as you. I’ve had 2 memorable restore failures and got real lucky both times.
The first was a ransomware incident, and the onsite backup was not hit, but it was corrupt. Thankfully, the client had been using a 3-2-1 strategy, and the off-site one was fine.
The second was a situation where a failed update rendered a client’s RDS unbootable. This time, they didn’t have an on-site backup and the off-site one was corrupt. This time I happened to get immensely lucky in that there was no real data on that RDS, so I was able to spin up a fresh one, and install their LOB app and all was good.
We now test that all backups are stable every 6 months.
I really like the way that The Dresden Files handles it.
Magic tends to fuck with precision mechanics and electrical systems, which means that modern weapons are much more likely to jam when in the presence of magic auras.
As a result, the main character, who is a wizard tends to use a .44 revolver as his sidearm because anything more precise is going to be unreliable.


If the end user can arbitrarily sign code themselves that is bootable then it kind of defeats the purpose of secure boot.
The whole idea is that it makes it impossible to start if the chain of trust is broken.


I remember seeing a sketch some number of years ago about a time travler warning his past self about Betsy DeVos and the past version was shocked that things got bad enough that he knew who the secretary of education was.
I switched my work PC to Pop a couple months ago and seriously gave Cosmic a try.
I had issues with it remembering screen positions and monitor settings would get reset to default on every boot. I installed KDE last week and it was like changing to a comfortable pair of shoes. Everything magically started working exactly how it should.


The answer to every one of these questions ranges from “No” to “Are you insane? Absolutely fucking not.”


Canada.
It’s hard to say.
My parents had 3 kids, a house, and were well on the way to retirement at my age. However they lived unhealthier lifestyles both mentally and physically.
I have no kids, a house (although much smaller than the one my parents had and in a cheaper town), and have a long way to go before retirement. I generally have much less stress, I don’t drink anywhere near as much as they did, and I don’t smoke.


I typically get around this by adding the year.
so for this example, I would search “9 (2009)”
Authentication
Audit
Access
The ability for the correct people to access the information is just as important as the steps to secure it or review who accessed what and when.