I take issue with your assertion that the document on which all other US law depends and from which all US public offices are granted their authority does not matter. It must. We ought to insist it does. Especially while it is being violated.
- Posts
- 0
- Comments
- 112
- Joined
- 2 yr. ago
- Posts
- 0
- Comments
- 112
- Joined
- 2 yr. ago
Neither of those facts preclude the application of the 14th. The barrier is whether or not someone holding public office, having taken an oath to uphold the Constitution, breaks that oath via insurrection against the same. It does not matter that Trump was not punished. The acquittal does not erase the reality of the past: it is a dismissal of immediate consequences. Nothing more.
The fact that Congress acknowledged the reality of January 6th is more than enough for the 14th to apply.
Nope. I read it. The language of the 14th doesn't require an impeachment or other formal conviction to apply. The fact that Trump was successfully impeached for inciting an insurrection is enough. The Senate's failure to execute its duty does not erase reality.
At this time, on this topic, I am not concerned with what makes for interesting conservation. I am interested in bringing attention to the ongoing Constitutional crisis of Trump's tentative second term.
It's not too late. The 14th amendment Section 3 specifically prohibits an insurrectionist from holding public office unless a special Congressional vote is held and passes with a 2/3rds majority.
Section 3. No person shall be a Senator or Representative in Congress, or elector of President and Vice President, or hold any office, civil or military, under the United States, or under any State, who, having previously taken an oath, as a member of Congress, or as an officer of the United States, or as a member of any State legislature, or as an executive or judicial officer of any State, to support the Constitution of the United States, shall have engaged in insurrection or rebellion against the same, or given aid or comfort to the enemies thereof. But Congress may, by a vote of two-thirds of each House, remove such disability.
All US citizens should call their representatives and demand they uphold their sworn Constitutional duty to refuse the certification of Donald Trump's victory as he is disqualified from holding office.
This is not speculation. Donald Trump was successfully impeached for inciting insurrection. The US is in the middle of a Constitutional crisis which Congress must resolve.
Finding your reps is easy. Go here:
https://www.congress.gov/members/find-your-member
Either let the site use your location or enter your home address. It'll pull all the info you need in one click.
This is excellent! Thanks for taking the time to share. It bothered me that the quality of the Guide to Housecat Colors and Patterns is too poor to read who the original artist is. I spent some time finding Joumana Medlej (https://majnouna.com/), the original artist, who has an extensive catalogue of work documented on their website.
I cannot find the housecat colors image in higher quality on Joumana's site. My speculation is it's included in the Artist's Guide to Cats eBook on gumroad. I noticed the previews on cerdarseed, searched that site, and found a much higher quality version. While it's fully readable in that small viewport the site owner is trying to prevent folks from downloading the image directly.
It seems they're loading the image from cerdarseed.com/tuts/catcol#.jpg (where # represent numbers 1-8) and stitching it together on the loaded page. I think that's an interesting technical choice worth noting.
It's clear you're arguing from ignorance as your argument is patently absurd.
The judgement is partisan, inconsistent with established case law, and relies on (at best) specious distinctions between "information service" and "telecommunication service". Griffin creates a distinction without a difference to manufacture the perception of judicial leverage where none exists.
It's like arguing the DEA has no purview over cannabis because the Reorganization Plan No. 2 of 1973 refers to "marihuana". It's clear what the intention of the law is even if the language is imprecise. To argue that ISPs provide some new class of service that's legally distinct from all other telecom service and therefore immune to regulation is an argument made out of ignorance, stupidity, corruption, or some combination of the three.
The features would break if they were built in.
You can't know that and I can't imagine it would be true. If the plugins many folks find essential were incorporated into GNOME itself then they'd be updated where necessary as a matter of course in developing a new release.
GNOME has clear philosophy and they work for themselves, not for you so they decide what features they care to invest time and what features they don’t care about.
You're not wrong! This is an arrogant and common take produced in poor taste though. A holdover from the elitism that continues to plague so many projects. Design philosophy leads UX decision making and the proper first goal for any good and functional design is user accessibility. This is not limited to accomodations we deem worthy of our attention.
Good artists set ego aside to better serve their art. Engineers must set pet peeves aside to better serve their projects. If what they find irksome gets in the way of their ability to build functionally better bridges, homes, and software then it isn't reality which has failed to live up to the Engineer's standards. This is where GNOME, and many other projects, fall short. Defenders standing stalwart on the technical correctness of a volunteer's lack of obligation to those whose needs they ostensibly labor for does not induce rightness. It exposes the masturbatory nature of the facade.
Engineers have every right to bake in options catering to their pet peeves (even making them the defaults). That's not the issue. When those opinions disallow addressing the accessibility needs of those who like and use what they've built there is no justification other than naked pride. This is foolish.
Having a standardised method for plugins is in my opinion good enough, nobody forces you to use extensions. And if you don’t want extensions to break, then wait till the extensions are ready prior updating GNOME.
I agree! Having a standardized method for plugins is good, however; the argument which follows misses the point. GNOME lucked into a good pole position as one of the default GNU/Linux DEs and has enjoyed the benefit of that exposure. Continuing to ignore obvious failures in method elsewhere while enshrining chosen paradigms of tool use as sacrosanct alienates users for whom those paradigms are neither resonant nor useful.
No one will force Engineers to use accessibility features they don't need. Not needing them doesn't justify refusing the build them. Not building them as able is an abdication of social responsibility. If an engineer does not believe they have any social responsibility then they shouldn't participate in projects whose published design philosophy includes language such as:
Their walk isn't matching their talk in a few areas and it is right and good to call them to task for it.
Post statement: This is coming from someone who drives Linux daily, mostly from the console, and prefers GNOME to KDE. All of the above is meant without vitriol or ire and sent in the spirit of progress and solidarity.
Not at all. American Conservatives are just being pragmatic! With American public schools defunded and turned into war zones they weed out the weak kids without having to lift a finger. The ones who survive are already desensitized, comfortable wearing body armor, and conditioned to willingly die for the State like all good children should be.
Whichever species, if any, rise to sapience after the age of mammals comes to its close.
Hey. ADHD diagnosed person here. Only diagnosed this year after a lifetime of feeling like a lazy former gifted kid. This looks a lot like my over-analysis spiral from a few years ago. My psychiatrist broke it down like this:
ADHD, like most things, is a spectrum. If your brain and body have trouble regulating norepinephrine then you're probably on that spectrum. There's no stolen valor here... Only treatment options based on diagnostics (educated guesswork). You meet the diagnostic criteria and I am confident that treatment is your best path forward to mitigate and control the reasons you scheduled time here in the first place.
</paraphrased_dr_words>
Some days my symptoms do not get in the way and I could easily pass for neurotypical. On "bad brain" days I feel like I'm losing my mind. Neuro-divergence is complex and life is weird. A diagnosis isn't about having direct answers: it's about narrowing down which mitigations, meditations, and medications we want to trial to increase our control over and quality of our lives.
If you accept that ADHD diagnosis, start treating it, and the treatment improves your life, that's a huge win. If it doesn't? Also a win. You've eliminated an option via experimentation and you know more about yourself. Time to try the next option. The important bit is being receptive to the attempt at making your life better.
I find it more likely because it's pathetic.
Would you elaborate on this concern? I'm not sure I understand but I'd like to.
I don't know what tools they use but if Windows is an issue then the artist could use Linux.
How? What mechanisms, conditions, etc, are we manipulating which produce such a significant effect? After a bit of searching I found this write up:
https://thor3d.ca/wp/the-effects-of-print-orientation-on-strength/
Is this what we're referring to? To summarize (if I've understood this properly): Printing at 45 degrees ensures none of the print's three axes are aligned with the printer's least accurate axis of movement.
There's some good advice in the comments already and I think you're on the right track. I'd like to add a few suggestions and outline how I think about the problem.
Ask if the vendor has installation administrator guides, whitepaper, training material, etc. If yes: ask that they send it to you. You may also be able to find these on the vendor's website, customer portal, or a public knowledgebase / PDF repo.
I would want to know three things.
- How do users authenticate through the application?
- What are all of the ways users may access the application (local only, remote desktop, LAN only, full server/client model)?
- Does the vendor have any prescribed solutions for defining who has access to the application, at what privilege level, with access to what features?
i.e. What parts of the user access, authenticate, authorize pipeline do application admins or system admins have control over and how can we exercise that control?
Based on some context I assume that the app is reading from Active Directory using RADIUS or LDAP for user auth and that people are physically logging into the machine.
If this is the only method of authentication then I would gate the application with a second account for each employee who requires access for business reasons defined in their job description (or as close as you can get to that level of justification - some orgs never get there). You can then control who has access to the machine via group policy. Once logged in the user can launch the application with their second account (which would have the required admin access) via "Run as..." or whatever other methods you'd prefer. No local admins logging in directly and yet an application which users can launch as admin. Goal achieved.
This paradigm lets us attempt balancing security concerns with user pain. The technically literate and daringly curious will either already know or soon discover they can leverage this privilege to install software and make some changes to the system. The additional friction, logging, and 1:1 nature of the account structure makes abusing this privilege less attractive and more easily auditable if someone does choose the fool's path.
I can imagine more complex set ups within these constraints but they require more work for the same or worse result.
Ideally you run the app with a service account and user permissions are defined via Security Groups whose level of access is tied to application features instead of system privs. There are other reasonable schemes. This one is box standard and a decent default sans other pressures.
If other methods of auth are available (like local, social, cloud, etc) then you'll have more decent options. I would define the security objectives for application access, define the user access objectives from the Organization's perspective, and then plot each solution against those two axes (napkin graphs - nothing serious). Whichever of the top three is the least administratively burdensome is then selected as my first choice for implementation with the other two as alternatives.
An aside: unless there is only one reasonable choice most folks find one option insufficient, two options difficult to decide between, and four options as having one option too many - whenever possible, if another party's buy-in is desired, present either three options or three variations on one option. This succeeds even when the differences are superficial, especially when the subject is technical, and 2x if the project lead is ignorant of the particulars. People like participating.
I'd then propose these options to my team/direct report/client, decide on a path forward together, and plan the rest from there. There's more to consider (again dependent on org maturity) but this is enough to get the project oriented and off the ground.
Regarding FOSS alternatives: you're likely locked in with the vendor's proprietary software for monitoring the cameras. There are exceptions but most commercial security system companies don't consider interoperability when designing their service offerings. It might be worth investigating but I'd be surprised if you find any third party solutions for monitoring the vendor's cameras which doesn't require either a forklift replacement of hardware, flashing all of the existing hardware, or getting hacky with the gear/software.
I hope this helps! <3
Your statement is too vague to convey an actionable suggestion. I'm intrigued by the thought you seem to be hinting at. Would you expand on this, include a recommended method, and reason about why it's an alternative to violence?
Not necessarily. You're correct that we cannot account for intention. Neither can we assert whether we are simulated. Even if we can prove this reality is simulated we cannot be sure if we are part of the simulation or inserted into it (a la The Matrix) from our current position.
One can never be sure if there are pirates around... I do spot One Piece of clothing in this picture which hints at an answer!
Make a container out of isomalt. Shatter it. Eat the pieces. Laugh in god's face.
I do. Thanks. You're still focused on the wrong thing here.
Section 3 of the 14th Amendment does not require any specific test which defines "insurrection". The impeachment is a useful anchor for establishing an agreement that an insurrection did occur and that Trump was, at the very least, an active participant in that insurrection.
The Insurrection Bar to Office: Section 3 of the Fourteenth Amendment (crsreports.congress.gov) provides an well crafted and neutral review of this. Its closing sentence is particularly relevant to our back and forth:
Republican strategy has long revolved around the targeted devolution of norms. They hide in the cracks between definitions which assume good faith participation in the labor of mutually consensual governance and shield themselves in perpetual faux-victimhood. If Congress does not pursue the execution of Section 3 it is nothing less than an abdication of their duty to their Oath of Office.
Your last paragraph is a result of misunderstandings and assumptions on your part.