I’d be more concerned if it had flown away.
Not to worry. They’ll reappear a few months before the next election cycle.
The use of the game controller, Excel, etc. all goes to document a pattern of cutting corners. True, these corners are tiny compared to the issues of the overall design of the sub, but it demonstrates a long pattern of overall behavior.
This reminds me a bit of when I was a juror on a criminal trial. The prosecutor detailed a long string of seemingly small/inconsequential things that ultimately helped demonstrate a long pattern of behavior. That pattern definitely helped with our deliberations.
I think it’s hilarious somebody pointed out that he’s younger than Weird Al.
IANAL, but I believe these laws cover audio recording only. OP shouldn’t have an issue if they use something that records video only.
Think about it a second. I live in a two party consent state, but I see security & surveillance cameras everywhere. If two party consent was required for video then they wouldn’t be there.
It would be weird if he changed course this late in the game.
That’s an optional software upgrade. It’ll cost you $12.95 a month.
I admit I own a Tesla. Given all the recent erratic behavior:
- Not only will I not recommend Teslas to anybody who might ask about it, I will warn them to look at company & CEO behavior over the years, and actively discourage others from buying one.
- When the time comes, I will not be replacing my current car with another Tesla. I will still likely go with an EV, but by then there should be significantly more good (better) options available.
About the only way I’ll change either of these will be for Elon to step down and completely remove himself from any control over Tesla. But I don’t see that happening and I certainly won’t be holding my breath.
Put them both in soundproof booths and only turn on their microphones when it’s their turn to actually respond to a question.
I’m shocked that the data center required retinal scans but that the employee with access could then just hold the door and let him and others in.
I used to work at a data center with lots of security. To get into the area with the servers you had to go through a man trap. It was a room a little larger than a telephone booth with automatic doors on both sides. To open the first door you needed a physical card key. Once inside the door closed, then to open the inner door you needed to both enter a PIN and have your hand scanned in a biometric scanner. Only after all that could you get inside. The booth also weighed you, and if your weight was off by a certain amount after your last pass through then it wouldn’t let you in. That was to prevent somebody from piggybacking with you.
Many years ago I had to try to debug a memory manager written by a really talented software engineer, with an interesting take on naming things…
-
He referred to blocks of memory as “cookies”.
-
He had a temporary variable named “handy” because it was handy to have around.
-
He had a second temporary variable that referenced the first one that he called “son_of_handy”.
-
If corruption was detected in a block of memory then it would set the flag “shit_cookie_corrupt”.
-
If too many cookies were corrupt then the system would halt by calling the function “oh_shit_oh_shit_oh_shit”.
Simpsons did it!