That sounds more like they are excluding most corporate internal systems, (which would also happen to cover the systems run by government.)
I do a lot of code. That means I often deal with three or four programs at the same time, and perhaps 10 loaded throughout the day and I want to see them all. So I have two monitors that are each 27" and 4k.
This means I can see a web browser sized to a full 1080 size, next to a database query, and still see the code that I’m working on, and keep an eye on any new emails or text chats. Without needing to Alt-tab to switch windows. It’s like spreading your work over a dining room table, instead of those little desks you got in high school.
Most apps don’t need to be larger than 1080. But some can be taller to see more code (maybe 160 lines, for example) without scrolling too much. And I hardly ever deal with just one window at a time.
Some of that may not be subjective, even if it is a personal difference. Some need glasses, some don’t get glasses because they just barely need them, and others have problems glasses can’t fix, especially as we age. Some eyes are just different, and that’s physical differences, not just a difference of preference.
The problem is “unsafe websites” is actually a very broad category. Even popular, reputable websites have accidentally hosted malware in the advertisements, some of which can infect without a click.
The guy that invented time zones was solving a problem where each little town had their own time standard. I don’t think that was sustainable.
That wouldn’t stop them from pursuing something in a US court if the other party is in the US. But even here, I doubt their argument would hold water in an actual trial, considering existing precedent.
It’s an open source project repository. It can be compared to the process descriptions in the patent. But patents and copyright don’t cover APIs, as decided in Oracle vs Google in 2021.
I’m saying this usage of reverse engineering is probably safe, but if you reverse engineered a way to process data that happened to match a patent, it doesn’t matter that you never saw the patent or original code, it can still be infringement.
Reverse engineering is legal, but if you still arrive at a solution covered by a patent, then that solution is illegal. But this shouldn’t be covered by a patent.
I really miss home and end on my laptop keyboard. (Hate needing to use the Fn+Home key each time.)
Many more recent cars will do this automatically at high throttle conditions, such as acceleration to pass.
You can set up a command line to start VLC using the OS’s built in task scheduler.
Probably a serial number for the stamp. In the US, you can even pay online and print your own stamp, and it uses the barcode to track when you use it, so it can’t be used twice.
Should be better since they usually don’t have an uplink capability. But be real careful of any model that has Internet for any reason.
The rights in the fourth amendment are generally a limit on the government, not what a third party does when it has a TOS/contract with you allowing it to do things.
2001 A Space Odyssey had a tablet they used to watch TV.
To be fair, customer support is often the way hackers bypass these protections.
The SMS vulnerability is not because of your apps. It’s because of the LTE protocol itself. It can be intercepted or redirected without touching your phone.
Then how about this one: a large container ship carries 24,000 TEU which is about 12,000 40 foot containers.
Because bits are not expensive anymore, and if we used 64 bits, we might run out faster than the time needed to convert to a new standard. (After all, IPv4 is still around 26 years after IPv6 was drafted.) Also see the other notes about how networks get segmented in non-optimal ways. It’s a good thing to not have to worry about address space when designing your network.