Unfortunately, the most annoying feature I want to remove most often is Windows(tm).
Which case is it, USA v. Shkreli Case "1:15-cr-00637" or "1:15-cr-00637-KAM"?
Any chance you would share the court records with us? It seems that the only "public records" I can find are behind a lawyer only pay wall
Unfortunately one needs either a PACER or PainSite.com login account just to check in on how you are doing.
Sorry, I'll keep with bitcoin than-you-very-much.
I'll just keep my old slow watch, thankyouverymuch. There already isn't enough time in the day to get everything done that I need to do.
Once I had the standard application pages so that it all groked correctly, and built my temporary DB on the other partition of the Mainframe, it took me only about 6 hours to write the program that DP was telling us was impossible to do. You should have seen the face of my managers face when I walked into his office carrying a very thick ream of printouts with the all the answers he needed that day. Once the DP manger got finished being chewed out by the president of the company, that same program, utilizing the Big-Iron mainframe and with a direct connection to the actual database, it took over 6 man-months to write the same in COBOL. DP offered me a job writing Cobol, and I said no, turned professional a couple of months later and never looked back. I decided solving problems was more fun than pushing parts through a factory.
One other capability for new machines is TCG Opal SED drive technology, if what you are after is speed in securely wiping data. First off the drive can be encrypted for data at rest so there is no fear of someone mounting and reading it in the first place. But when they can't even see the partition table it makes it quite hard to mount it in the first place. Then you can just flip a single bit in the drives key and instantly everything in that region is wiped to the equivalent of AES256. The only way to recover it is to set the password back before the drive is reinitialized for some other purpose. You can even set up multiple regions, write or read protect them individually, install a fake (shadow) partition table, or even lock any of them to a pcr in the hardware TPM so partitions are unusable or even non-visible unless the machine was booted exactly in your own prescribed manor. Need to hide your banking data from ransomware anyone?
Whom the gods would destroy, they first teach BASIC.