• 0 Posts
Joined 7 months ago
Cake day: December 26th, 2023

  • He didn’t “collapse” or “fall”. He reached for his ear (where he was hit) and had a general “WTF is going on” face, then after a few seconds, ducked behind the podium as secret service yelled at him to get down.

    He seemed able to walk away on his own, although it is hard to tell exactly since his human shields might have been supporting him. As he was leaving, he was well enough to project an image of good spirits and raise a fist, seemingly getting into a bit of a fight with his secret service, who seemed to want him to stay small and hidden behind them.

  • It was a political rally. Those are always done with flags. It was a political rally, there were a bunch of cameras running. Many of which were taking dozens if pictures every second; there wasn’t even anything to release there, the media was the ones taking the video. Of course the most striking image would be the one to catch on, and from watching a video of it, that seems like the obvious moment to take.

    It was some fast thinking and good political instinct (although bad survival instinct) to make a photo perfect pose while getting escorted out by secret service.

  • I think what happened here is that something went wrong and messed up the permissions of some of the users files. MS help suggested that he login as an administrator and reatore the intended permissions.

    I don’t work with Windows boxes, but see a similar situation come up often enough on Linux boxes. Typically, the cause is that the user elevated to root (e.g. the administrator account) and did something that probably should have been done from their normal account. Now, root owns some user files and things are a big mess until you go back to root and restore the permissions.

    It use to be that this type of thing was not an issue on single user machines, because the one user had full privileges. The industry has since settled on a model of a single user nachine where the user typically has limited privileges, but can elevate when needed. This protects against a lot of ways a user can accidentally destroy their system.

    Having said that, my understanding of Windows is that in a typical single user setup, you can elevate a single program to admin privileges by right clicking and selecting “run as administrator”, so the advice to login as an administrator may not have been nessasary.

  • I’m not sure that means much either way. The zent has significant leeway to do whatever they want. Even if no underage marriage has ever happened, the Zent can still approve it, because the Zent’s word is law.

    In this particular case, I think there is a strong argument that could squash any icky feelings from nobles not close to Rozemyne: “when the divine avatar of Mestionora went to meet with the gods, they altered the flow of time and matured her into an adult”.

    This has the benefit of being almost entirely true. And anyone with a functioning intelligence network should be able to pick up on the implausibly fast growthspirt she underwent shortly before bestowing the G-book on the Zent.

    Plus they should also be aware of the pragmatics of “well, there is not much we can do about her being an underage aub; she did conquer the duchy and repell foreign invaders. So I guess she needs a spouse to help with archducal duties. Maybe give her a few winters off of snow shoveling though”

  • Except in this case, it is directly relevant to the legal issue at hand. When deciding a free speach case, the first part of the analysis is if the restriction is content neutral or not.

    A content neutral rule is held to the standard of intermintent scrutiny, and is frequently upheld. A content based rule is held to the standard of strict scrutiny and almost always struck drown.

    If the rule against signs on the overpass were enforced uniformly, then the white supremesists would not have a legal leg to stand on. But, at least based on the article, the rule is not being enforced uniformly at all; and is only being brought up now due to the content of the speech. That puts it squarly in the realm of strict scrutiny; giving the government a very uphill battle in court.


    Kavanaugh writing for the majority:

    The question in this case is whether §666 also makes it a crime for state and local officials to accept gratuities—for example, gift cards, lunches, plaques, books, framed photos, or the like—that may be given as a token of appreciation after the official act. The answer is no.

    The official act was a $1.1 million contract. The “token of appreciation” was a $13,000 check. At trial it was argued that the payment was for consulting services, but presumably the jury did not believe that.


    Presidential immunity: TRUMP v. UNITED STATES

    At least with respect to the President’s exercise of his core constitutional powers, this immunity must be absolute. As for his remaining official actions, he is also entitled to immunity. At the current stage of proceedings in this case, however, we need not and do not decide whether that immunity must be absolute, or instead whether a presumptive immunity is sufficient

    The court takes a very broad view of core constitutional conduct

    In dividing official from unofficial conduct, courts may not inquire into the President’s motives

    Trump is therefore absolutely immune from prosecution for the alleged conduct involving his discussions with Justice Department officials.

    But it nevertheless contends that a jury could “consider” evidence concerning the President’s official acts “for limited and specified purposes,” and that such evidence would “be admissible to prove … " The Government’s position is untenable in light of the separation of powers principles we have outlined.

    Like everyone else, the President is subject to prosecution in his unofficial capacity. But unlike anyone else, the President is a branch of government, and the Constitution vests in him sweeping powers and duties.


  • For vaccines, we shouldn’t even be dispensing them at cost. Vaccinations are the second most cost effective public health intervention ever, beaten only by clean drinking water.

    In purely financial terms, the cost of vaccinations are lower than the average cost to the US tax payer of someone getting sick. The public service of people not getting sick is a nice bonus. As is reducing the chances of this becoming another Covid style economic catastrophe (plus, again, the public service of protecting your citizens)

  • Regardless of justice, this type of lawsuit isn’t in the interest of any reasonable world order.

    They are suing sovereign countries for assisting in an attack on Israel. In a US federal court. With no treaties backing the suit; just a law passed unilaterally by the US.

    That is not the way international law works at all. By the logic, Peru could pass a law allowing it’s citizens to sue the US because they have family that took a vacation in mexico where they were shot by a US gun.

    This should be viewed in context of the US’s refusal to join the ICC, and the “Hague Invasion Act” (American Service-Members’ Protection Act) that authotizes unbounded military force against the ICC if it acts against anyone working for the US or a US ally. As well as a bill passed in the house attempting to sanction the ICC for its move against Israeli leadership.

    The entire theory behind being able to have such a lawsuit in a US federal court is US imperialism.

  • In addition to the raw compute power, the HP laptop comes with a:

    • monitor
    • keyboard/trackpad
    • charger
    • windows 11
    • active cooling system
    • enclosure

    I’ve been looking for a lapdock [0], and the absolute low-end of the market goes for over $200, which is already more expensive than the hp laptop despite spending no money on any actual compute components.

    Granted, this is because lapdocks are a fairly niche product that are almost always either a luxury purchase (individual users) or a rounding error (datacenter users)

    [0] Keyboard/monitor combo in a laptop form factor, but without a built in computer. It is intended to be used as an interface to an external computer (typically a smartphone or rackmounted server).