“The resources are so many now, they are so vast – and they replace themselves and render themselves obsolete so quickly, that nobody has the has the time to do anything but just dabble for a moment in the current resource de jour before it’s gone and they are busy scrambling to learn just the merest proficiency of the next one.” – Mark Ferrari, Terrible Toybox
January 7, 2017 by wetwebworkComments Off on No connection, surely?
“The NHS in England is already facing its worst ever financial challenge, following an unprecedented squeeze on funding for health and social care. At the end of the last financial year, health care providers reported a £2.5bn deficit, as 65% struggled to balance their books. … “Leading economists are almost unanimous in concluding that leaving the EU will have a negative effect on the UK economy, which in turn will impact on public spending. This report concludes that it is difficult to see how the NHS can escape the consequences. “The NHS budget could be £2.8bn lower than currently planned in 2019/20, if the government aims to balance the books overall. In the longer term, the NHS funding shortfall could be at least £19bn by 2030/31– equivalent to £365m a week – assuming the UK is able to join the European Economic Area. If this is not the case, the shortfall will potentially be as high as £28bn – which is £540m a week.” – NHS finances outside the EU
Right after the Paris attacks, politicians started blaming encryption, even though evidence suggested they communicated by unencrypted SMS. Even months later, the press was ridiculously using the total lack of evidence of any encryption… as evidence of encryption. Then with the Brussels attacks from a few weeks ago politicians like Rep. Adam Schiff immediately tried to blame encryption insisting that “we can be sure that terrorists will continue to use what they perceive to be the most secure means to plot their attacks.”
Of course, now it’s being reported that a laptop seized from one of the suicide bombers in Brussels shows little attempt to actually hide plans of attacks. In fact, it showed that attack plans were kept in an unencrypted folder titled “Target.” And the only attempt to “hide” it was that the computer had been thrown in the trash. – techdirt.com