Re: Universal applications
Trouble was "suitable" was a moving target. And given the broad spectrum of hardware it was meant to run in, trying to set a hard-and-fast specification for "suitable" was a pipe dream.
4861 posts • joined 10 Jun 2009
Trouble was "suitable" was a moving target. And given the broad spectrum of hardware it was meant to run in, trying to set a hard-and-fast specification for "suitable" was a pipe dream.
Your CDs are fine. It's DVD playback that's broken due to the MPEG-2 license issue. It's like how Wiis don't play DVDs nor did the orignal Xbox without a dongle (the dongle had the license price attached). They're physically capable but legally incapable because they don't have their licenses paid for. And since many people don't use their PCs as DVD players (why wear then out when you can use dedicated players hooked up to the TV is the noted justification--many times PC DVD drives are used for ripping, not playing), it means like a decent amount of bucks a copy Microsoft has to pay for something that doesn't get used.
""Free" has at least two meanings. One is zero cost. The other translates into French as "libre" and means "at liberty" or "not confined" or "not restricted"."
By my reckoning, the first definition (the one further up the dictionary) is "free". The second one is what I normally call "unrestricted". I've learned early on that it's very important to be very concise and precise in one's oration else one gets easily misinterpreted.
"Microsoft free is not like Linux free."
Free is free is free? Am I able to get it at no cost to me? Yes, so it's free. End of.
Ever thought they may be realizing that an App Store model may be the better way to go, a la iPhone and Android? Besides, it gives them an incentive to keep people from jumping to a Linux distro (since they now have free to counter free combined with the advantage of familiarity and better compatibility).
Well, as long as they don't nag you and you can make the icon go away once you've made your decision, then it's just a friendly by-the-way, and I don't mind that.
That said, when I ran the update check, it noted the common Broadcom Bluetooth Adapter isn't on the compatibility list as of this time. Now a deal-breaker as the checker notes, but it still raises an eyebrow as to what other types of hardware aren't going to make the cut.
Some people are willing to go that far by using networks of PEOPLE (as in a spy network like an enemy state, a crime syndicate like the Mafia, or a terrorist group like Al-Queda). Which means odds are there's a LOCAL guy SOMEWHERE.
"Watch how fast the bastard backpeddles on wanting that backdoor installed & try not to laugh too hard at the smoke blowing, hand waving, "That'll never happen! We're the Government & we're Secure!" style bullshit starts to flow out their mouths."
They'll add, "If that were true, you can do it with physical keys, too. Why aren't we seeing a rash of break-ins into high-security sites courtesy of copied keys, hmm?" And any argument you put against it will be applied to the crypto argument. You need an argument that has no physical analogue.
"Honest question: How many times have you heard your .fav Shaman refer to it as "the books of the bible" (plural), as opposed to "the holy book" (singular)."
That's nothing new. People normally refer to anthologies (which the Bible essentially is) in the singular even today. Only when multiple specific books are referenced to we switch to the plural (such as in "The Gospels").
It could be either, as it's a corruption. It could be a corruption of "biblion" (singular) or "biblia" (plural), unless you can show the specific etymology that can rule out "biblion".
No, it's ONE. If not an exclamation point. The thing is, many religions deal in absolutes and make themselves as the only way for the universe to make sense.
But what if they're plague-like, meaning even if YOU ignore them, many others won't until you find yourself surrounded with unbelievable believers?
"Omnipotent being responsible for everything and we will see her when we die - no problem.
Same being created the whole world a couple of thousand years ago - nightmare."
Not really. See, God, BEING omnipotent, can make ANYTHING, including making something LOOK like something else. As well as create trials and ordeals to test us and forge us into better people when our times comes. That's their reasoning, at least. Even babies taken before they have a chance to think for themselves are seen as test for the parent(s). It appears to be all-encompassing and able to explain nigh everything, so it's hard to get an argument in.
But what if B argues from a different angle, say from the perspective of a gestalt, for example a quartet: greater than just the sum of four performers?
If you can rewrite the EFI firmware and bypass the signature check, you can install your own checks to make it nigh-impossible to remove, meaning you either go about with a pwned machine or consign it as a brick. As for checking the hardware, the thing about a low-level hack is that it's low enough to lie to the OS unless the OS itself can go straight to the metal.
The editions being priced as of now are enterprise versions not eligible for the free upgrade.
Pled not guilty then was convicted by jury. So no, crying crocodile tears now didn't help him and in fact hurt him because he now looks like the kid with his hand in the cookie jar trying to curry sympathy. If he really were sorry, he would've pled guilty from the start.
Well, Compassionate Release was how Al Capone finally got out of Alcatraz. Then again, he WAS terminally at the time, out of his mind, and barely lasted a year afterward.
Whatever happened to MNG and ANG? Why are we sticking around with a patent-encumbered format that only supports 256 colors?
"I'm not saying get rid of it, or censor it, just that humanity needs better education on this topic."
And if people don't WANT to learn? That trying to drag them kicking and screaming will bring their buddies and start a riot?
But can it be done at the same power levels? That's always been the 6-billion-human question. Because last I checked, very few are going to volunteer to be culled just because the cleanest tech available only provides 10% the power of today.
But the age-old trust issue has a caveat. You have to trust someone at some point. If you go into full DTA mode, you've basically isolated yourself.
Furthermore, that phrase "And there was evening and there was morning, the first day." reinforces the Hebrew tradition that days don't start at sunup but sundown since night came before day.
I've been trying to find a specific episode of a TV show. It's no longer on the air. It's not on disc. It's not available through any download sites, black or gray. No torrents, no P2P sources. The ONLY sources I've found CHARGE for the privilege, and they're ALL DRM'd. So far, I've resisted the temptation and have simply gone without for now because I won't take it with strings attached, but it highlights the fact that, for some people, it really is a Take It Or Leave It proposition.
And if none exists (trust me, I speak from experience)?
So what happens when you try to block an ad and find that blocks the actual content as well?
"Yes, that may be the way to get attention. But for many of us that attention simply results in hate for whatever-it-is they're plugging. That one hit out of a million isn't worthwhile if the other potential or actual 99 customers are sufficiently pissed off to decide they'll never touch whatever-it-is again in their lives. It's actually to the benefit of the vendors of whatever-it-is that the ads get blocked."
They'd consider YOU nonconvertible and safe to ignore. The ONE they snag is more than enough for them, even if they never hear from you again. That's how advertising works. Millions of ignores just to get that ONE hit that makes it all worthwhile. And to draw on P. T. Barnum, there WILL be that ONE somewhere.
The Admen will just find ways to get around AdBlock. Even without paying for the whitelist treatment, they'll probably start using ad-blocker-blockers that deny you access if you have it or anything like it like NoScript on. And before you say, "I'll just go somewhere else," suppose the site has exclusive content you need or ALL the sites with the stuff do the same thing, forcing you into a Take It or Leave It situation (submit to the nauseating ads or go without that important file you need like an obscure driver)?
It's an interesting thought, yes, but the capacities are just too small to be practical at this point. BluRay has fallen behind the times which is why I'm eyeing Archival Disc with some anticipation. Not only are the disc sizes closer to what's needed for large consumer backups in the terabyte range, but they're designed for "cold" storage.
What about reuse issues? Can't a tape be used a few times before it has to be replaced?
"The technique works with silicon as well, but does not seem to provide any the environmental advantage."
There's no need to use the technique with silicon. Silicon's ridiculously abundant and non-contaminating, so it's a case of "If it ain't broke..."
Semiconductor manufacture is what's known as a "high initial, low incremental" industry in terms of costs. Much like a related article here about VFX firms. Once you actually plunk down and build the plant, going from a million to a billion is a trifle.
"Tradition? I do realize back in like the 1950s, soap companies sponsored them. But, that's really not relevant now. I'd say at present, one show is not a genre. I don't know about UK, but in the US, General Hospital has been the one and only soap opera left for close to 10 years."
If that were true, the Soap Opera Digest would be LONG out of business. Truth is, soaps are still out there, and they remain soaps, as most are done by PGP (Proctor & Gamble Productions, as in the big soap conglomerate). There remain four soaps still running. You listed ABC's General Hospital already, NBC has Days of Our Lives, and CBS still has The Young & The Restless and The Bold and the Beautiful.
You can extend this line of thinking to utility companies as well, which is why you see a tendency toward natural monopolies there. Utilities have the same situation: high capital cost, low marginal cost. Plus they have the NIMBY issue: people will tolerate the necessary evil of ONE utility, but once more crop up their infrastructure can become an eyesore.
The router's IP can be determined simply by doing some kind of internal ping on the client. The rules of DHCP and so on usually mean the weak-link client is on the same subnet as the router. And since the router's usually the hub of the home network (and therefore almost always device .1), Bob's your uncle.
Then I think the attack bypasses the authentication done on the device, making passwords useless.
Please inform us if this is not the case, as I've been unable to obtain particulars on this attack (or even if the CSRF is applied against the device's web-facing side directly, meaning no user intervention required).
"If IoT can only work with a hardware portal to the Internet, then it is those things that can handle the security. The router could very well be configured so as to 1) not allow general interaction from the Internet or the local network to the IoT thingies, and 2) handle updates from the Internet to a given IoTmabob, on condition that said update is properly signed and comes from the proper domain (no use BitTorrenting an update here)."
Because, given the wireless nature of it all, what's to stop an interloper: someone inserting THEIR router into your network, masquerading as yours, and hijacking your devices? How do you reconcile this problem while at the same time making it easy enough for Joe Computer-Illiterate to use?
"Add to that the fact that the accelerometer won't tell you very much about direction: it can tell whether someone is walking or running but not in which direction."
Most phone accelerometers are TRI-AXIAL, meaning they can measure acceleration in a space. Most commonly, it's used to determine the phone's orientation by triangulation for g. They CAN know direction.
But since there are perfectly legitimate reasons for background location tracking (navigation, geologging, et al), you'll just raise a culture of "Click OK to get the hell out of my way." Put mildly, the average person doesn't want to know all the gritty details. They just want their app and that's that. Sure, they complain when they get pwned, but they also complain when they have to jump through too many hoops (which is the only practical way to safeguard against being pwned without your knowledge). Sounds to me like you can't win.
"with FTTP VoIP your reliant on the 8-16 hour UPS to keep the Fiber working for the phone"
I would think that the time you need to use the phone after a power failure is immediately after the event. The backup battery is intended to handle temporary outages of the old "line fell" or "rat chewed the wires": maybe worse-case a blown transformer. I know one of the first things I do is call the power company to either report the problem or learn how long it'll probably take to get back on. If I'm going to call anyone, it's going to be right after. Beyond this and you're probably going into disaster territory. Based on experience (I live in a hurricane zone), I can say that if your power isn't back on (or due back) within 12 hours, there are other problems. If you can't even REACH the power company (because the phone is cut off upstream), you might as well hunker down; you're in for a wait, in which case the phone isn't going to be of much use to you anyway. In any event, if an emergency arises during such a disaster (like a flooding that can warrant evacuation), the order will likely come from a truck in the street rather than the phone.
"some Primarily mobile masts have a backup generator or backup batteries"
SOME, but not many. So the cell phone isn't likely to be of much help in a major outage, either, unless you're willing to roam to find a working tower.
Aluminum tends to be reserved for power cabling. I think one of the issues is the signal-to-weight ratio. Aluminum has more resistance than copper (by about 1/3), but for high-voltage applications the losses are acceptable vis-a-vis the cost of the metal since copper's three times as heavy. Copper snakes more easily so is better for low-voltage applications where you may have to go through narrow conduits. It's also useful in heat-sensitive applications since aluminum's increased resistance means more heat to dissipate. In the open air, where neither of these typically apply, aluminum wins out.
But what's to stop a black version of said agencies already existing and still doing the stuff you describe, only with no real way to keep them in check because its very existence is top secret?
I've thought about it but it gets a touch pricey when the bits start adding up, especially if you want both redundancy and a way to store offsite. My current regimen is to use two similarly-sized USB hard drives but only keep one of them running at a time except periodically when I sync changes between them, at which point I rotate them. Any other time, one of the drives is stored in a fire-resistant safe elsewhere. This combined with some parity archives seems to cover the optimal number of scenarios: the PARs can help treat bit rot and the odd corrupted file, a second drive, not from the same batch, normally kept offline but occasionally synced and rotated, should help cover one of them just up and dying (if it does, I should be able to replace it and sync against the good drive), and with the second drive in a separate location, I'm decently covered against theft and disaster.
And how to keep the missus or someone else from uncovering it...
Except these demented sickos exists and the truth is stranger than fiction. IOW, this isn't Oceania or the Sprawl. This is Earth, it's real, and it's even worse than those two envisioned. Let's play along, shall we?
"What is it about your "site full of people" that is worth protecting?"
Suppose you're a bank or a medical site? BY LAW, they have LOTS of stuff worth protecting BUT still need to be readily accessible by your clients. So you're facing two extremes. When NOT IN USE, the data has to be tighter than Fort Knox, but once IN USE, it has to be wide open. But then these dual requirements come with them their share of inconveniences (that the clients then bitch about). Trying to prove who you are can be problematic: thus the problem of passwords and bad memories, for which there are few effective alternatives. Meanwhile, once you're in, it's hard to keep the information under wraps anymore which poses liability issues. And yet people want no less than perfection and bitch when it doesn't happen, such as with these data breaches.
"So get over yourself, guy who sells condiments to restaurant chains. You don't need authentication tech in order to protect your data from your potential customers."
Sure you do; it's called "trade secrets". Negotiations between companies are almost always secret because the prices involves tend to differ each time, and negotiations are things you do not want the competition to know since they can use that to undercut you and steal your business.
So tell me, how DO you provide sufficient security to a site full of people with truly awful memories? And you can forget 2FA because these people don't have cell phones and the password they forget most is the one for their e-mail.
I think porn hits its practicality limit when HD came along. Porn is nice, but up-close HD details starts to get countered by the Too Much Information factor.
You might want to reconsider. Singapore isn't exactly a wide-open paradise. In fact, probably the only reason a place like Singapore can pull this off is it's SIZE. We're talking a tiny little SPECK off the south tip of Malaysia. Japan's a slightly better example with its many islands, but it's still only about the size of California and much denser. Color me impressed when a large, sparse country can guarantee something like 1Gbps throughout its territory.
They're trying that with Apple in the US, and it's still rather messy over there. How do you deal with that without trampling on the rights of the customers?
Thing is, the executives remove themselves from the nitty-gritty so they can claim plausible deniability. As for consent decrees, what if they decide to take their ball and leave instead? Plus there's the risk of collateral damage to innocent customers.