This: https://m.youtube.com/watch?v=JebyNOvJmCM&pp=ygUfYmFsdGltb3JlIGJyaWdhZGUgY29sbGFwc2UgbGl2ZQ%3D%3D
Police audio from the incident: https://youtu.be/xzOvImnlHFc?si=INIeTXr7ThY5dAlw
The whole bridge just collapsed
This: https://m.youtube.com/watch?v=JebyNOvJmCM&pp=ygUfYmFsdGltb3JlIGJyaWdhZGUgY29sbGFwc2UgbGl2ZQ%3D%3D
Police audio from the incident: https://youtu.be/xzOvImnlHFc?si=INIeTXr7ThY5dAlw
The whole bridge just collapsed
Around 2 years ago, I got an email from a products team asking me for urgent help extending a program in time to make a sale.
I looked over the program and wrote back sonething along the lines of “this program was written almost a decade ago by an unsupervisered highschool intern. Why TF are we still using it?”.
Of course, I ended up helping them, because that highschool intern was me, and I ended up helping because no one else could figure out what highschool me was thinking.
Java did have a Security Manager that can be used to prevent this sort of thing. The original thinking was that the Java runtime would essentially be an OS, and you could have different applets running within the runtime. This required a permission system where you could confine the permissions of parts of a Java program without confining the entire thing; which led to the Java security manager.
Having said that, the Java Security Manager, while an interesting idea, has never been good. The only place it has ever seen significant use was in webapps, where it earned Java the reputation for being insecure. Nowadays, Java webapps are ancient history due to the success of Javascript.
The security manager was depreciated in Java 17, and I believe removed entirely in Java 21.
I just checked my State’s rules. [0] The maximum benefit is given by the “thrifty” food plan, which is cheaper than the USDA’s “low cost” food plan.
For a 20 year old woman, that is $242.30 a month. From there, you compute 30% of your net monthly income, and subtract it from your SNAP allotment.
If the result is too low, this provision kicks in:
Except during an initial month, all eligible one and two-person households will receive a minimum monthly allotment of $16, and all eligible households with three or more members which are entitled to $1, $3, or $5 allotments will receive allotments of $2, $4, or $6, respectively.
Truly a golden ticket. /s
[0] https://dhs.maryland.gov/supplemental-nutrition-assistance-program/food-supplement-program-manual/ (section 409)
https://www.fns.usda.gov/cnpp/usda-food-plans-cost-food-monthly-reports
There are still a lot of rather arbitrary decisions to make.
Is 4/pi inside or outside of the summation?
Is it (-1)^n+1 or (-1)^n with an additional negative sign in any of the other natural locations for it.
Is the e term outside of the fraction with a negative exponent, or part of the denominator.
Do you start with n=0 or n=1 (and adjust the terms inside the summation accordingly)
Did they expand (2n+1)^2?
No offense, but the extra stones just made it so he could go easy on you. When I started go, the new player challenge was to end a 9 stone handicap game against the resident 3-dan with a “positive” score. [0]
[0] most official scoring methods either ignore captured stones, or count them as positive points for the player who captured them. However, when scoring by hand, it is easier to count them as negative points for the person who lost them; so thats what we did.
The treaty itself does not have any enforcement mechanism; however the US does. US courts recognize ratified treaties as having equal weight to laws passed the normal way Ratifying the Treaty would immediately make it federal law. The US has a robust enough legal system that the courts would the (over years of building up case law) determine exactly what that means.
I think what happened here is that something went wrong and messed up the permissions of some of the users files. MS help suggested that he login as an administrator and reatore the intended permissions.
I don’t work with Windows boxes, but see a similar situation come up often enough on Linux boxes. Typically, the cause is that the user elevated to root (e.g. the administrator account) and did something that probably should have been done from their normal account. Now, root owns some user files and things are a big mess until you go back to root and restore the permissions.
It use to be that this type of thing was not an issue on single user machines, because the one user had full privileges. The industry has since settled on a model of a single user nachine where the user typically has limited privileges, but can elevate when needed. This protects against a lot of ways a user can accidentally destroy their system.
Having said that, my understanding of Windows is that in a typical single user setup, you can elevate a single program to admin privileges by right clicking and selecting “run as administrator”, so the advice to login as an administrator may not have been nessasary.