The IMPLEMENTATION of the function can be copyrighted. It tells a user, this is the name of the function, and in order to call the function, this is what the function name is, what parameters it takes, and what the possible return value may be.ĭicumentation about the function tells the user what the function is intended to provide. Oracle thought they bought some magic secret sauce (header files), that they thought they could monetize. Oracle argued that the APIs were copyrighted, even though they were originally developed by SUN. (normally, but I do not want to distract) Oracle took over Java from Sun Microsystems. Looking at your first question, let’s go back in history a bit. “So is not the programming language, not the implementation, but the language itself, the user interface between the user (programmer) and the compiler? How did this case even make it to the supreme court?” People’s privacy and security are now jeopardized/compromised by corporations that they never wanted anything to do with. We see disasters like: ExXperian, ASScension health, the list is endless. In spite of the M$ ‘reputation’ for security, we see setting up a M$ online account as just another in many locations which are a potential security breach to expose personal info.Īs Contra and 1&1~=Umm pointed out: total surveillance So, they are in a complete panic when it crashes. I try to warn people “it’s not ‘if’, it’s ‘when’ the computer will brick.” But, most people who come to me for help after a crash haven’t listened and so they don’t know about proactive precautions to create a win restore disk or disk image. And, a few days ago one of our techs downloaded a ‘fresh’ win10 iso from the M$ site and it had most of the updates incorporated, which reduced the ‘wait for all the updates’ hassle during.re-installation. Novem2:45 our clinic has noted that the restore points we set on ‘victims’ computers’ ‘disappear’ after a couple of months. New features will be added once possible and once I have more time. That being said, the system now has almost everything I can think of, and that I can deliver. (Flask should scale at least to Dunbar’s number) (also, Python3.8 will bring along Final etc) * More extensive Linux/BSD support (many per-distro issues) * Reducing APT-dependencies (as they don’t have pinned hashes) Work in progress updates that will take a long time VM-isolated programs is enforced by the hypervisor * Qubes-based version where unidirectionality between That drop when sent over data diode (very complex issue) * Packet replay command to allow replaying ciphertexts * Encrypted container for received files (requires GUI) (allows preventing people who know the OnionĪddress from checking if the user is online) * Basic/stealth authorization for v3 Onion Services * Post-quantum E2EE between Relay Computers * Post-quantum key exchange with reasonably short keys * Ed448 signatures (PGP lacks it, minisign too and * Faster, C-based Reed-Solomon with python bindings That being said, I’ve been looking into upcoming features.īlocked due to missing implementation/library To the best of my knowledge, both actions should have ACID properties. This action is now also atomic, in that the master password is only updated once every database has a replacing temp file the integrity of which has been checked.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |