> The committee’s 520-page report, released on 2 December, offers no new direct evidence of a lab leak, but summarizes a circumstantial case, including that the Wuhan Institute of Virology (WIV) used NIAID money to conduct “gain-of-function” studies that modified distantly related coronaviruses.
> Democrats on the panel released their own report challenging many of their colleagues’ conclusions about COVID-19 origins. They conclude, for example, that the viruses studied at WIV with EcoHealth funding were too distantly related to SARS-CoV-2 to cause the pandemic.
In other words, it's the same partisan politics we've seen since 2020, with very little science sprinkled on top.
I believe we grossly fumbled investigating the origin of the virus, but unfortunately this report does little to present new, conclusive evidence.
There's a good chance tonight's Advent of Code will require dynamic programming. The difficulty is starting to ramp up, and there's a good chance you won't be able to solve the remaining parts 2 without some clever use of DP and memoization, graphs, etc.
Thanks for raising awareness on this. I think I may have a retail box with Warp 3 in Portuguese (Brazil). I had an ISV at the time, and used to join the OS/2 meetups organized by IBM, where they regularly distributed copies to power users.
I'll try to find it next week and see if it's helpful for the folks in OS/2 museum.
edit: it seems they're looking for Warp 4; I don't think I ever saw that version. I only used 2.0/2.1 and Warp 3.
> The IG found that the search was based on a tip by an airline employee who passed on the names of passengers who had purchased flights 48 hours before departure. That employee was being paid by the DEA a percentage of the cash seized, the IG found, and had received tens of thousands of dollars over several years. That arrangement is problematic, investigators concluded.
How come this is not a fireable offense in any company? This person is leaking a customer's PII to a third party (DEA, in this case). It doesn't really matter if it's to a government official, unless there was a warrant and the airline's Legal council involved.
Am I missing anything? This feels outrageous that airlines are letting this happen. Is there a law that allows employees to break any company's policies under the guise of "suspicion of a crime being committed, even without a warrant"?
And it's even worse that the "profits" are being shared with said employee, and this is not seen as bribery and corruption.
Presumably the airline is unaware of the practice by employees. How would they know? Not like the the employee or DEA is going to make them aware and confidential informants aren’t named in court documents.
Actually a great side hustle for similarly situated employees who don’t mind fucking over other humans. I wonder how common it is? Big enough where people with these jobs discuss it in a forum on the net somewhere?
There are likely hundreds of employees with access to this information within the company, and thousands of third party employees.
I work as an analyst for a marketing company that fulfills gift/award points/miles for people who have opted into the loyalty programs for all the major airlines, hotel chains, fuel reward affiliates. We have data granular to the minute in a continuous feed.
I can only imagine that there are numerous opportunities for exfiltration along this chain. Personally, I make enough to never consider breaching protocol, but there are a dozen contacts in my sphere that are temps or contractors that deliver the data to us, I could imagine that the DEA offering double or more than their base salary with little danger of discovery would be tempting.
*I think that by becoming an informant you would be dissuaded from public discourse or lose your anonymity, so there’s probably aren’t any serious forums dedicated to the practice.
Broadcom licensing site is a disaster. The usability is terrible; took me an hour going in circles, but eventually I was able to find where to click. It was something completely unintuitive. But it works. Maybe. Sometimes.
If you haven't watched the BBS Documentary [1], you absolutely should. It's a truly special documentary, made by hackers for hackers.
For someone like me who grew up in that era, in a small town in a remote country, having access to BBSes was life-changing. It gave me a window to the world that I otherwise wouldn't have had.
Julia Evans - https://jvns.ca/
Fabien Sanglard - https://fabiensanglard.net/
Rachel - http://rachelbythebay.com/w/
Bruce Eckel - https://bruceeckel.substack.com/ (old blog @ https://www.bruceeckel.com/)
Blobs in Games - https://simblob.blogspot.com/
Astrid dot tech - https://astrid.tech/
Brendan Gregg - https://www.brendangregg.com/blog/
Stargirl Flowers - https://blog.thea.codes/