re.Re: William Donelson
That should have been '@William Donelson re.' or just 're.'
[Coat: the one with the copy of 'Pedants Style Guide' in the pocket.]
4853 posts • joined 10 Jun 2009
That should have been '@William Donelson re.' or just 're.'
[Coat: the one with the copy of 'Pedants Style Guide' in the pocket.]
" ... but the code didn't get hold of stuff like Social Security numbers, PINs or email addresses."
Why would anyone give this information to a high street retail outlet? After being 'hit' by spam e-mail and spam phone calls/txts some years ago, I now tell anyone who asks that I don't have a mobile phone and that I don't use e-mail. They seem surprised but they still sell me stuff.
From what I've seen of 'ordinary' laptops with two chunky hinges, there are four distinct and separate points of contact between the base and the screen unit. I've always assumed these were enough for power and video data/control and gave good insulation from each other as well as protection from dirt and grease ingress.
This 'watchstrap' hinge looks very complicated with many possible points of shorting and places where dirt and grease could get in to affect the signal paths. Does anyone know about the techniques for getting power and signals from base to screen and the actual design of this watchstrap hinge?
Well, they covered the robot snake with some kind of trouser, so .....
... I turn off the Wi-Fi with a little widget on the start screen. I do this because I don't want my battery draining as the phone pumps out Wi-Fi power looking for a connection. I also don't turn on mobile data unless I want to use it, for similar power saving reasons. It really does make a difference.
This is conflating two separate things. As I understand it, the remote kill switch is operated by the network and the user/owner has to contact the network and convince them of their identity to ask them to kill their stolen phone. The police only have to contact the network (probably via a special contact number) and tell them to kill a phone because they don't want the owner to be able to use it.
The remote wipe is under the control of the user and intended to protect private information from prying eyes. This is done via a website, with login process, run by the company that supplied the remote wipe app. Please correct me if I got any of that wrong.
The simplest ideas are often the best.
Also, "... It is like having your own personal roller coaster ..."
The thing about a roller coaster is that you're not in control of it and you do it for the thrills/terror. He seems to be talking in 'careless' mode.
It started off as ' ... fanning a patty' but it mutated very quickly in my mind so I'm confused now. How can this method be regarded as reliable?
Does this also mean that I can hack into US servers, because I'm a senior police officer in my own (self declared) small country? If there are any technical objections, I'll get the government (me) to enact laws to bypass them.
At $0.8 a share, I'm wondering how much it would cost to buy the company. Can anyone tell us?
Yesterday, I received no NSLs or FISA orders.
That's the title of a short and simple e-book that you could easily make for yourself and pass out to all your family and friends or maybe put it on some torrents. I'm sure it would cause amusement at Adobe when they look at what is 'trending'.
... I propose that government departments be put in sole charge of production, distribution and sales of alcoholic drinks, cigarettes and sugary foods.
" ... the G20 meeting to be held in Australia during November has placed multinational tax avoidance front and centre on its agenda."
This trans-international accounting dance has been known about for many years. Why have the pols only recently started to make disapproving noises?
Damn, I skipped a paragraph. Thank you.
(My attention was grabbed by the following entire paragraph in italics. It shouldn't be allowed.)
" ... for now you have to visit Estonia to apply for e-residency ..."
"Most Reg<.i> readers reside in nations where Estonia maintains a diplomatic outpost, ..."
If you have to visit Estonia, what does an Estonian diplomatic outpost have to do with the process?
Is it the middle ring that has the anti-gravity generators? It has a 'technical' look about it.
"Insiders are worse than hackers because there's no way to protect against them that's truly effective,"
It couldn't be truly effective if there were many rogue insiders working together, but surely there can be methods of 'dual authorisation' that would work. How many people in AT&T (and similar), on a day to day basis, actually need to access the sensitive information of customers? Not many I'd guess. How many customers a day do they need to access in this manner? Not many I'd guess.
Make all such data access a 'red flag' operation that is marked for oversight by a higher level manager in a different department. Have any mass access require a further password to be entered by a higher level manager in a different department. etc.
People would moan and complain, yes, but the answer to that is, "It's part of your job, so if you don't like it then go looking for another job."
If you wear 'fashion' glasses with those big chunky arms, you can tilt the phone slightly so the edge presses against the spectacles and keeps it away from your hair. (Not guarenteed if you have a bristly beard.)
Any such spectacles for use with an iPhone would have to be stylish and very expensive. This may be why Karl Lagerfeld has become involved with Apple (at the recent Paris launch).
It's possible to be a physiscist and not a physicist, both at the same time, so you don't need to pretend anything.
Have a look at the San Disk Ultra Plus and the Kingston SSD-Now V300 range on Dabs.com
I've used both with no problems.
(My desktop PC has vertical card cages and the two SSDs just hang in space, their weight supported by the SATA data and power cables. I don't see any need for mounting adaptors in a domestic PC.)
Unless you're a sales/marketing type, with lots of hi-def promotional videos to show to people, I can't think why you'd need 128GB of drive space on your laptop, or even desktop. I get by quite happily with 32GB SSDs on my two old laptops and my desktop.
" ... smart devices can broadcast URLs into the area around them. ...Any nearby display such as a phone or tablet can then see these URLs and offer them up to the user."
The possibilities for mischief (and worse) are endless.
This is off-topic but I'm wondering if anyone can give me some technical information:
If you take a good quality and well made semi-automatic pistol, it should be possible to make a 'carrier' for it that turns it into an 'automatic' sprayer of bullets. The standard ammunition clip could be replaced by a modified (longer/deeper) version that contains more than the standard six rounds and the pistol itself could be clamped into a carrier that looks like a rifle stock and performs the same function. The shoulder butt would contain a clockwork or battery poweed mechanism that pulled a mechanical 'finger' that hooked around the trigger of the pistol.
All the user would have to do is press a button and try to hold it on target as the 'finger' repeatedly pulled the pistol trigger. From a purely technical point of view, it seems to be an easy way of making an 'automatic' weapon out of an 'easily obtainable' pistol and does not involve any modification to the pistol itself.
Has anybody tried this? Is there any technical reason why it shouldn't be done?
I got that wrong. Since he did say, "on a voluntary basis", he is technically correct. The IWF 'ban list' has no force in law and so ISP blocking is voluntary on their part. They block because the government threatened to wrap them up in legal red tape if they didn't.
So, it's purest twisted weasel-logic bullshit.
"The proposals would have prevented network operators from blocking access, on a voluntary basis, to websites hosting illegal child sex abuse material."
That is the purest lying bullshit I've ever read. I'm sure I don't need to explain why.
,,, you make a 'good' parody then upload it to your YouTube channel, which has advertsing on it, then it gets lots of views and you make money from it?
“The Court is unable to find that the jury’s finding as to invalidity of claims 1 and 10 of the ’802 patent is supported by substantial evidence. Accordingly, the jury’s invalidity verdict cannot stand,”
Why do they bother with a jury? If there was a fault of process or procedure, or if a jury member was shown to have acted improperly, or new evidence was discovered, then sure. What the court/judge seems to be saying is that the jury were just 'wrong'. So why not just have Judge Rodney Gilstrap decide all cases on his own?
I had a look at 3 recently and it seems that tethering is limited to 4GB a month on the 'all you can eat' plan. I assume they 'detect' this by looking at the user_agent from your browser, which would make it easy to work around. As another 'workaround', you could run a torrent client on your phone then WiFi transfer the files to your home network, etc.
He's back on the WMD thing again, (Weapons of Minor Detection). The paedos can deploy them within 15 minutes.
An AND gate isn't a majority gate.You could think of it as a 'totality' or 'unanimous' gate.
.... (in Linux Mint 13), so does this mean I'm protected against all vulnerabilities due to Shellshock or could other applications use /bash (which is present with modification date 28th March 2013).?
" ... jonny ive's boryfriend .."
At those events, you've just got to put up with those sort of people for the sake of appearing polite. He probably chatted to someone interesting shortly after the picture was taken.
Tim Cook: "Feck!"
"A cryptographic hash function takes a block of input data and creates a smaller, unpredictable output."
Isn't the output totally predictable, if you know the hash function and the input data?
For me, for 18 months now, all versions have been Windows Shuttered. Ahhhh, Linux.
Well, since Adonis is the god of beauty and desire and is an annually renewed god, that would be appropriate. They should have vulcanised it.
I'm only 'white', so I wouldn't be able to test that.
I have a 'pop-out' top panel with my favourite applications on it and a pop-out side panel with my favourite folders, including network storage locations. I also have a fixed 'system panel' on the bottom, because I like to think I know what's going on all the time. This is the arrangement I've used since the old XP days (a pox on Windows 7!!) and I've no intention of changing it. Modern UIs, bah, humbug!
Does the cable jacket have stripes on it? That always helps.
I am the only one who finds that funny and surreal?
" ... incident management, performance analytics, configuration management, discovery, orchestration and change release management."
These are 'technology'? How?
There are things called heat exchangers and protective coatings. Great big steel ships seem to last a long time at sea for some reason. Grey water contains contaminants and pathogens and the supply may not be constant and thus require holding ponds. Is there even an existing supply of grey water available at Eemshaven?
'Grey water' is waste from baths, showers, basins, etc. Why don't they just use the sea, since Emmshaven is a port city (adjacent to the cold North Sea).
"When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it, and sends it to the terminal,"
Waiting for a suggested application that could only be thought up by an El Reg commentard. Any minute now.
"That means ovens with better voice-recognition when you speak to them ... "
This is what most people have needed all their lives.
My experience was not as deeply personal or sad, but:
One Friday evening, I drove home from work and (using my debit card) decided to fill the car up (£50), then went to the supermarket and bought £10 of groceries then stopped at the tobacco kiosk on the way out and tried to spend £10: - blocked, operator told to hold onto the card and call management.
I was told I had to accompany a supervisor to a phone where I was told by a bank representative that the card had a 'suspicious pattern of purchases' and was being held as a precaution (all this with me standing about 4 yards from busy checkout queues). They asked me to confirm what I had bought - I told them it was none of their business what I'd bought. I eventually persuaded them that I was who I was and had the right to have the card and use it. I managed to avoid swearing at them. After the call, the kiosk guy told me that he'd told them what I'd bought, because he had to.
I then phoned them from home to ask for an explanation. Apparently, I didn't use the card very often so my 'unexpected' use to make three rapidly consecutive purchases was suspicious and grounds for holding and questioning me, 'for my own protection'. I also managed to dig out from them that the fact that I'd bought cigarettes was held on file as part of the record of the holding enquiry. I told them that I'd use cash from that point on and I and do now (or use my credit card).