Also: Prof Hawking's view carries a lot of weight in the scientific community.. Not to diss Hawking, but that would be the "popular scientific" community mainly.
13136 posts • joined 3 Jun 2008
Until the user has to do something that ought to be a little more complicated, at which point it becomes a lot more complicated.
1) Make the mundane simple.
2) Make the demanding possible.
Windows used to stop at 1). To reach 2), difficulties and hits on your credit card increased exponentially.
Well, at least there is PowerShell now.
Commendable effort. Some stylistic errors and author nearly comes across as too retarded to be believable. Would troll with. 8/10.
The only thing that came with WIndows 95 was an icon to "Microsoft Network", which was meant shield the user FROM the Internet into an ill-defined Microsoft walled garden into which you had to dial via some local access point in partnership with some operator.
The night sky on Earth in its early years was very different, with our Moon glowing red with fire in the sky. Now scientists think they've worked out why.
As we don't have reliable eyewitness accounts about those times, the last "why" should be replaced by a "that".
The grammar would be atrocious but the direction of scientific enquiry would be right.
Sorry, dude. We are all at level 7+ here. And its infinite recursive gyrations. A City of Saints and Madmen, indeed.
More like a hatch someone forgot to close a couple of megayears ago.
lightweight transactions such as Paxos
Kudos for mentioning PAXOS but AFAIK PAXOS is just the general case of the 2-phase commit protocol (n-phase commit protocol?), the latter hidden under the "Distributed Transactions" designator. So not particularly lightweight .
In truth, I haven't understood PAXOS as far as I would like, Leslie Lamport's original paper was way confusing the last time I read it. I need to start again...
Centerum Censo, people should read: A Critique of ANSI SQL Isolation Levels. Transactions - An underrated area of interesting stuff.
JSON and XML are both fine on a 1G LAN.
Why is this even being discussed? Either you have data in your database that fit your problem, then they have to transit, 1Gbps LAN or not. Or you don't, in which case better head for the showers. If you absolutely want, you can compress them to some binary but still inspectable format after all.
JSON (for what purpose?) and XML are fine and in PostgreSQL and others, XML is just another column data type that you can operate on. Purposeless adherence to First Normal Form is just for people who want to suffer and who actually believe Strings are "atomic". We not only want set values, we want annotated tree values! (Why not graphs, actually?)
This gave them what they were looking for
They were looking for sado-masochism, fast?
> Not invested in anything myself
I am not sure whether you are aware that the economy now basically consists of people arranged in a circle gripping each other's overly leveraged balls.
Once somebody squezzes, it's gonna be fun.
Every cable measured TO THE INCH to the patch panels and crimped by hand. And often going through the centres of the racks so you couldn't actually insert anything more into the rack without de-patching EVERY CABLE and re-patching it. For one cabinet we had to pull an all-nighter just to rewire 24U. And we rewired EVERY cable in there.
Master troll is masterful!
As long as you don't pay by African Credit Card (aka. avtomat kalashnikova)
LOL u mad?
Wir zeigen Ihnen, "noch eine Sache", Arschloch
This sounds double ominous in german. Was that really necessary?
Paul, is that you?
I remember that comic. There was a hitman cleaning out all the observatories to hide the fact that the world's gonna end in a month or so.
Yup, yup. Makes sense. Politicians would do ANYTHING to win the next election.
Doing business under fascism is always a tad difficult. You have to wiggle your arse and hustle...
Should have, could have.
I remember that idea was rejected because there was Hurd going nowhere fast, microkernels were starting to go out of fashion (sometimes someone dowloaded the Mach manual), and Linus wanted to have something situated in a known technical domain at useful levels of functionality fast. Hence, monolithic kernel.
It's the same as the difference between honest diplomacy and wargasm lies being pumped out by Judith Miller types, now being produced courtesy of AP.
Why is it called Blue Termite?
Is it a play on the Blue Ant company from the later William Gibson novels? (Pattern recognition and later novels)?
...duly published in Nature.
...they are being fined for not being precog enough?
"Yes, Mr. Anderson. It seems your department's work has not been up to the usual standards lately .... give money plox!"
Does their insurance cover that sort of event?
And do they screen animals like Cheney, Hillary and "Inspector Surge" Petraeus?
Hannah and her sweets have probably put paid to that
I WILL SAY. The person who formulated this as if he/she were hailing from the low-power bulb end of the Gaussian would have been sent for a ten-year stint of hard labor to Australia in more enlightened times!
Hannah has 6 orange sweets and some yellow sweets.
Overall, she has n sweets.
The probability of her taking 2 orange sweets is 1/3.
Prove that: n^2-n-90=0
NO BUT JUST NO. UNDERSPECIFIED; MISTAKES "CONCLUDING" FOR "PROVING"...
the Fracker companies have stolen away in the night, leaving cleanup to the state or town
I have read about this on AlterNet!
How can "the fracker companies" steal away? Don't they have a mailbox address? Maybe they are linked to the Bush family?
"My own personal computers, being highly secured and reliable, coupled with my knowledge of how to use them, would make me personally the equivillent of a nuclear power in a nuclear war."
This is basically the slightly more egocentric "Inna woods with AK-47 and Heintz Beans stash" equivalent of the US-centric zombocalypse.
who pretended Java was realtime
Learn2BasicComputerScience. I hope your not in the "industry" and posting from you stuudent account?
I don't think anyone pretended "Java" (the JVM) was realtime, though there ARE realtime reduced JVMs. Anyway, what has that to do with anything?
into chips with standards-based offerings
The one which RAMBUS gets the IEEE to standarize on whereupon PATENT SUBMARINES surface menacingly?
Man, I remember the article in "The Economist" about RAMBUS. Still have it probably on my HD. There were also a number of articles by El Reg's Andrew Orlowski back from 200, when he wrote about other things than crying artists.
Welcome to the Internet. The ride never ends here!
Hi Lenny, how's life behind the Great Firewall?
Lighten up and remember:
Bhopal Chernobyl Mayak that reality does not go away if one sits on it.
Most of the media would have been dragged away, yipee-ka-yay style, over Fukushima...
"Defence comes back to proper output encoding, and input validation."
Amen brother and"; DELETE FROM TABLE COMMENTS WHERE USER LIKE '%'
What did you expect? If you read between the lines and divide by the frequency of Foucault's Pendulum you will find that the Freemasons didn't ACTUALLY code fake malware in the Bermuda Triangle (because they are masons, not coders) but instead got them from relics found in a Mayan temple left by ancient astronauts, the location of which is shopped out on Google Maps.
We will now tune back to the discussion of several planes of Malaysian Airlines victims of P.U.T.I.N. and/or the hegemonistic faction of Reticulans.
I'm no mathematician, I've not calculated the number of possible collisions, or the size of the file.
There would not be many collisions. That's the point of a hash.
The number of file versions is not going to get particularly astronomical even if Microsoft is involved. For whitelisting, it sounds like a sure proposal.
Size of the file is irrelevant. Actually I would chunk it and hash the chunks.
But the important point is that these files have internal structure. DLLs are not big blob. Hash the various parts or have more interesting ways of checking. Pretty sure this must be done anway.
Yup, makes absolutely no sense for me either.
Google have also called out snakeoil vendors
Errmmm...... yeah. Oh well.
Rather certain some TLAs of "the West" (and possibly some of "the P.U.T.I.N.") would be happy with Kaspersky a smoking ruin. There would be less discoveries of weaponized software that one couldn't smooth-talk away by a short visit of Agent Smith.
In other news, why is General Odierno now talking up "a sustained war with Russia" on russian soil?
The Entrepreneurial State
Not that shit again. I'm using that book as
toilet paperrecycled it properly.
A state is ANYTHING but "entrepreneurial" BY ITS VERY NATURE OF THE PEOPLE WHO ARE MAKING UP THE DISCOMBOBULATED ORGANISATION.
It couldn't detect an opportunity if it bit it in the arse. Nepotism, colonization, vainglorious shit and the current thing à la mode are of course acceptable.
Yeah, it's "entrepreneurial" under the condition that infinite money can be allocated from the actually entrepreneurial side of the economy. And from time to time that side is killed off in a war or two.
She says big companies are unwilling to spend massive amounts of money in investment, but are happy to ride on the backs of government research and reap the rewards.
That dumb bitch should maybe check out how actual investment takes places.
R100 vs. R101
I can't find these EU forms? Where do I get them??
I can't imagine who would NOT want to walk away from Verisign. Getting it in a contract that you MUST sure would be relaxing.
It is claimed Kaspersky engineers took harmless Windows operating system files, manipulated them to appear as though they contained malware, and uploaded them to VirusTotal. The aim was to deceive non-Kaspersky antivirus engines into treating those system files as dangerous
I fail to see how this is possible. If you "manipulate Windows operating system files", they no longer ARE Windows operating files. And how does this deceive other antivirus engines? Does one mark certain strings in those files and tell the other engines "if you see those strings, quarantine the file"? And they do it? In the age of polymorphic virus, no less?
If you start getting false positives on OS files, then you have a big problem, and it has nothing to do with someone poisoning your well. It's more along the lines of being lazy or not having the right conduit to Microsoft.
There is no technical reason or excuse for the end of domain names to be limited.
Please read the recent articles on El Reg about the moronocalypse.
Are you the wife of $DEAR_DEPARTED, rebel leader of the somalian insurgent group of upper mallfuck, with 40'000'000 (FORTY MILLION US DOLLAR) in an undisclosed storage box?
The chance of the above happening are at Kim Dotcom levels.