• 0 Posts
  • 441 Comments
Joined 2 years ago
cake
Cake day: August 26th, 2023

help-circle


  • Good. States shouldn’t be able to just go out on a whim and immediately go back in again like it’s a revolving door. The consequences should be severe for leaving. Otherwise voters in other member states will pull this shit as well, because they think they can just rejoin when the next pro EU government comes around. Also many voters in the UK voted for leave as a protest vote not because they actually wanted to leave. They didn’t understand the ramifications of their vote. Let the UK be the example of what a protest vote can cause.


  • Yeah this happened in Japan way earlier. Japan got mobile internet much sooner than the rest of the world it was called i-mode. Which was launched in 1999. The home computer boom never happened there like it did in the West. Since everyone just uses their mobile phone to go in the internet and Japanese PCs were expensive. And doing work after hours at home wasn’t a thing since you do that at the office where your boss can see you putting in the work. The only PCs that sold reasonably well were VAIOs since those were relatively compact.

    It’s also why computer literacy is very low in Japan, ask anyone who taught in Japan and they will tell you most Japanese high school students don’t know how to use a computer. Like the problems we are seeing now in the West with computer literacy among students they had for decades already.
















  • They can sue if they can prove that the code wasn’t reversed engineered in a clean room. Meaning nobody who wrote code looked at the original code. One person or group examines the software and writes the specifications and another group implements the specification without the teams interacting with each other. And usually a lawyer has to be involved and review the specification. The separation of teams is called the “Chinese Wall”

    And depending on interpretation of the law if the people writing code used a decompiler that can be seen as breaching the “Chinese Wall” since the implementation is then not based solely on the specification but based on the original code.