Em Adespoton

  • 1 Post
  • 1.47K Comments
Joined 3 years ago
cake
Cake day: June 4th, 2023

help-circle








  • Think of them not as means of differentiating musical style for you, but as historical ways of explaining how a band or musical movement differed from the norm.

    Take a band like The Beach Boys. In the 70s, what they were doing was alternative rock — that is, they took the dance/music genre of classic rock and roll, and re-imagined how it would sound on a sandy beach at a surf party instead of in a dance hall.

    Enter the 80s, and their music became part of the cultural norm, so they were popular/“pop” music.

    And yet, as a band, they kept adding new techniques and writing new music right into the 2000s, often drifting back out of popular culture while doing so.

    The point of this is, see what the subgenre tells you about the musicians; it isn’t really a useful way to clearly divide musical works themselves into subcategories.



  • Defendant crashed its website, slowed it, and damaged the servers, and Defendant admitted to the same by way of default,” the ruling said.

    OK, so if I set up a lawsuit against OCLC in my country where they don’t reside, and they fail to show up to contest the charges, I get to claim they admitted guilt by default?

    Also, since the claim is they used bots that behaved like legitimate search engine bots, are they also suing Google?

    I can see why they might not want AA putting undue stress on their servers, but that doesn’t seem to be what they’re suing over.








  • Have you looked at the files? They were obviously generated in a Chinese-affiliated development environment, and the interface is designed for Chinese speakers. Which is exactly what they said. They very pointedly DIDN’T say that the malware was written by the Chinese government or one of their affiliates.

    It’s also not in the same style as the stuff generated by the various Chinese APT groups, so is likely by some third party with Chinese connections. It’s a very methodical and thorough collection, but it wasn’t discovered via an attack — the researchers stumbled across the test environment. And that’s not something that’s likely to be the case with state actor-related groups.