They very much did.
They very much did.
The numbers I gave are the model outputs for the state as of yesterday off his subscriber based model talk page.
So no.
Of course these are the likelihood of a win and not polling differences. That’s why I said model output, not a poll aggregate.
An 8 point spread in a state for polling averages is incredibly large. For reference Ohio is as deeply spread red in polling averages as Nee Jersey is blue. You think New Jersey votes red this year in any reasonable reality? No.
For an even more crazy but accurate comparison: Alaska has the same mid point statistical odds of going red as Ohio, but its error bars are more than double Ohio. Meaning? There is an incredibly slim but massively more possible chance Alaska goes blue than Ohio.
Current model from Silver and the polls raw data averages say it’s not even close. Trump will win the state by a 97.6% to 2.4% spread.
Because so many of you cannot understand modeling vs polling averages… that is the likelihood of a win as a result of taking poll inputs through Silver’s model, reflecting overall chances of a win as a output.
It is NOT polling average percentages.
Most modern cancer drug treatment is sequenced to at least the specific proteins of the type of cancer it is.
Have breast cancer? Cool. We figure out which of the many variations so that we can give you medications for that exact type of breast cancer.
This sort of specific targeting has been increasing and increasing for the last 20 years. MRNA is the next step of that and is highly likely to be a means or become or for treatments in many other areas.
Aluminum oxynitride is transparent aluminum, but alpha aluminum oxide, which is also transparent, is called Corundum.
Sure it does, but that doesn’t make it bad.
Open source code is not the only solution to secure communication.
You can be extremely secure on closed source tools as well.
If they found specific issues with Signal aside from not being allowed to freely inspect their code base, I suspect we would be hearing about it. Instead I don’t see specific security failings just hat it didn’t make the measure for their security software audit.
As an example of something that is closed source and trusted:
The software used to load data and debug the F-35 fighter jet.
Pretty big problem for 16 countries if that isn’t secure… closed source. So much s you can’t even run tests against the device for loading data to the jet live. It’s a problem to sort out, but it’s an example of where highly important communication protocols are not open source and trusted by the governments of many countries.
If their particular standard here was open source, ok, but they didn’t do anything to assure the version they inspected would be the only version used. In fact every release from that basement pair of programmers could inadvertently have a flaw in it, which this committee would not be reviewing in the code base for its members of parliament.
Not being able to inspect their code vs no passing are different things.
Who is we and deep into what?
I simply responded to your statement that you couldn’t think of a way to express the position without sounding as if you were against another people.
It feels very very simple.
The actions of those who cause harm to innocent people are deplorable. Those who order such actions or commit them, should be held accountable. I don’t have to say any proper nouns or even make it specific to this conflict to express that.
“I don’t want the response to horrific things to be more horrific things inflicted on those who have no control of these events.”
That seems pretty cut and dry…
deleted by creator
Why is that wall needed? Can you expand on this more?
deleted by creator
deleted by creator
deleted by creator
Back when I had it, it was a free 2 TB of google cloud storage with the fiber account.
Yes. The free cloud storage doesn’t hurt either
His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.
Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.
While you can compromise the effectiveness of encryption by subverting it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access, these don’t break the algorithm used in a way that it makes it vulnerable to decrypting other data.
None of those mean an algorithm used like say the ole Two fish encryption is “broken”.
Blowfish Triple DES Twofish RC4 Etc. All are fine and not currently broken. All however cannot protect your data if some other attack vector companies you or your site’s security.
They just rolled out millions in new fiber lines in my area. I had them for internet since 2018, moved out of their area, and now I am in their area getting their service again.
You are incorrect about that stagnation. Google has breathed new life into fiber offerings.
All prisoners in the US, regardless of infraction, have DNA samples taken in many states.
That is not voluntary.
It was ruled constitutional by SCOTUS.
If you had that done, and you have family dumb enough to use 23andme, then you just got screwed, involuntarily, twice.
As much as this is the dream, she is not electable in American politics for president.