I feel like what I'm hearing is that they're re-inventing NFS (for some reason).
382 posts • joined 10 Jun 2009
Small floating point differences
In college physics, we were required to calculate not simply the results of an experiment, but also the margin of error. This had to be included in each step of the primary calculations. This was referred to as "showing your work."
Surely small floating point differences are part of the computation of the margin of error? Don't they calculate that in real life, or do they just do that in school?
Ah. Smoker as in smoked sausage.
I thought at first they were inhaling the dog into their lungs, one cigarette at a time.
...because when the president does it, it's not illegal.
Chain of Reasoning
Science is always scary.
Nature is always safe.
Cross-breeding two crops via sexual reproduction is inherently safe. There is no reason to investigate the resulting cross.
Cross-breeding two crops any other way is inherently unsafe. There is no reason to investigate the resulting cross.
Gene editing is unsafe because the combination of those two words sounds scientific, and science is dangerous.
Anyone who disagrees is part of a political or financial conspiracy.
My experience with Tier 1 support is that they have the FAQ section of the company's web site open on their computer. If the answer isn't there, they can't help. They're there to act as gate keepers to keep the sub-literate masses from wasting the time of upper-tier employees with valuable problem-solving skills.
The emotional down-side of working that kind of job is severe. I try to be as kind to them as possible. Occasionally you'll get someone who is dramatically horrible of course, but mostly they're just ordinary people working a crappy job.
The challenge is that objects in space are usually spinning. Something as "small" as an asteroid may be spinning comparatively quickly. So the laser blast would have to be energetic enough to heat just a portion of the asteroid to affect its trajectory before that portion rotated away.
Otherwise, all you get for your effort is a whole lot of nothing.
You've got to feel for the phone vendors, though. Every couple weeks, there's a new patch of one kind or another. If they have a couple dozen phone models, they might need to type "make" several dozen times.
My God. Think of the carpal tunnel.
I'm hopeful that those who insisted that cell phones caused cancer will at least have the good grace to commit suicide.
There are plenty of us looking for jobs, but not ENOUGH of us that we're willing to work for less than the offshore folks.
So that old hymn was prophetic:
"WIPO mine eyes and see snot."
The "IT" Quiz
(c) Ask what they've tried so far, then berate them for lacking initiative
tax the crap out of it... unless you have a medical pot card
In California, it's only available by medical referral, and it's taxed that way, too.
Waiting for XTube to migrate to html5.
Porn is the only reason I have Flash installed.
No, it is not installed on my work machine.
Hmm. If one department is taking on the responsibilities of another (PHB doing IT by credit card instead of delegating it to internal IT), it's probably important to figure out why.
Some folks seem to be saying that if the PHB mistrusts IT, and that mistrust is well-founded, then it's okay for the PHB to make decisions without IT's input.
That sounds like an argument for two wrongs making a right. That kind of thing usually doesn't end well.
I blame Citrix.
I mean, I can't remember the last time I saw an in-page java applet, so that's been disabled for ages.
But I have at least two clients who use a Citrix VPN who only allow me to connect via Citrix "applications" (which run through a Java helper).
It's likely I'm missing something.
You can duplicate the phone data into a VM and brute-force a 4-digit code in no time at all.
Under such circumstances, the FBI's request to break the encryption itself, as a "one-off," is bizarre.
And if Apple has received a court order, I don't see why they don't offer brute-forcing as an alternative, either.
When something seems that obvious, then it's likely that I've either completely misunderstood the problem at hand, or else there are shenanigans going on.
In order to move forward, first back up
I remember those days.
We had a package called Retrospect. It was ostensibly a backup program, but part of its functionality was to run AppleScripts remotely on any workstation that had the Remote extension installed.
Our nagging problem was that Word's preferences file would frequently become corrupt, so the Quit Word/Delete Preferences/Restart Word procedure was first eye-opening non-backup script we created.
It was awesome.
Damn, I'm old.
...it'll weed out those people who just punch in at home...
Presuming they don't know how to operate a VPN.
Does your office really have a vast tonnage of employees who would punch in from home and sleep? I'm betting not. So really they're throwing technology at a problem which could have been solved with one or two well-placed firings, meanwhile casting a veil of suspicion over their entire workforce.
I say run, don't walk, to a new job. Even the unemployment line would be preferable.
If Jira seems to be the main target for the usage of tab groups, then I feel like this is a problem that's best fixed in Jira's own UI. For exactly the reason we're seeing here.
Re: As a side-note ...
On the one hand, refraining from feeding trolls is a good policy.
But in terms of real-life discrimination, "simply ignore them" is functionally equivalent to "shut up and take it."
I'm not offering any clear rules. I'm suggesting that situations can sometimes be more complicated than they appear on the surface.
Pictures or it didn't happen.
Re: It's probably just a false flag case...
That makes the most sense to me.
The 1000 VM idea is the most obvious solution. So obvious that it's reasonable to assume they've already done this, have all the data, and have people under surveillance already.
So the point of the media circus must be to convinced the surveilled people into thinking they haven't been fingered, and therefore lure them into doing something they can be nabbed for.
....at least that's how I'd write it if I were working on a spy novel. But we wouldn't find that out until the last chapter.
Re: NTP rejects bogus times?
I think it's important here to disambiguate the protocol NTP from the ntpd daemon offered by the folks at www.ntp.org.
The ntpd daemon by default ignores time offsets that are huge. BUT it's also a common practice to do an ntpdate in the script that starts the daemon to set the hardware clock first. I think this is to handle wacky-ass BIOS clocks and make it so network time Just Works.
The NTP daemon chronyd respects large offsets -- at least on startup (also I think during running, but I'm not as clear on that).
Long story short, you can't rely on rejecting large offsets to protect you.
Re: Touching customers
Show me on this doll where the Apple retail chief touched you.
I think this very situation was described for the semi-ballistic transportation that the heroine like to use in "Friday."
Who are we protecting here?
If I were to summarize the bill, I'd say:
First responders, members of the press, and victims of an accident are free to post images of an accident on social media (or wherever) without restriction, and without regard for taste or morality.
Everyone else is forbidden from an hour. Also regardless of whether the images are tasteful or not, or moral or not.
So either way, the images go up. It sounds like it's simply a way for the press to make money off it before the bloggers make it available everywhere.
The best software
...is the software I prefer.
If you do not prefer the same software, the only possible conclusion is that you have made a mistake in your evaluation.
Since you have made a mistake in your evaluation, you are a bad person.
Since you are a bad person, you must be insulted with all the rage I can summon.
Dumitru Popescu is pretty dishy
Re: More proof
"I'd love to help you out son, but you do have to buy a ticket first..."
The odds of winning without having bought a ticket (perhaps finding the winning ticket on the ground or being left one in a will or something) are pretty similar to winning after having bought a ticket.
So...God's mistaken on this one. Much the way he screwed up by making the avocado pit too big.
Re: Kudos for publishing over the Christmas break.
If I had to proofread over Christmas, I'm pretty sure I'd be doing it drunk. If I were managing proofreaders over Christmas, I'd be serving the booze.
Re: It's 2016 for cripes sake....
You're blaming the hammer for the actions of the carpenter.
My first thought was: Who can be THAT unfamiliar with how email works?
For some values of "Resolved"
enSilo states this issue is yet to be resolved - a claim firmly denied by Intel Security, which said it patched the bug in late August.
I'd argue that if the end user must think to search out a bug, find a patch, and then install it manually, that bug doesn't get to have the staus, "closed." Until it's rolled out in an automatic update, it's in "testing" at best.
They also delete true things
Like in "Our Man in Havana," in the book Millie was about 16, and perhaps a little spoiled. But in the movie, she is every second of at least 28, and is also quite obviously mentally challenged.
I keep writing that in, and they keep deleting it.
Remove the Incentive
If lawyers share the blame for bringing frivolous lawsuits, maybe it would be helpful to remove some of the incentive for them to bring ridiculous lawsuits to court.
What we don't want to do is allow rich people to victimize poor people by making it too hard for poor people to get decent representation.
Perhaps requiring a lawyer to only charge for time and materials, and forbid lawyers from receiving payment based on the amount of the settlement might help. They could still work on contingency for poorer folks, still only getting paid if they win, but limit the payment to their usual, non-contingency rate.
You'd need to keep unscrupulous lawyers from rubber-banding their "usual fee" based on the amount of the claim somehow.
Just a thought.
The result is that: "Publishers now have no idea who serves what ads on their websites, making it virtually impossible to police for compliance and security – unless they rely on dedicated audit and scanning technology."
The simplest solution is for publishers to actually host the actual ads they're going to display. Just like TV and radio stations use their own bandwidth to broadcast ads.
It's been a long time since anyone offered to give me helmet in the workplace.
Bad News for T-Mobile Customers
Once we buy the phone, we're essentially SOL in terms of automatic updates.
Yeah, I suppose I can theoretically download and install a new OS myself, but I'd lose WiFi calling, and with my luck, probably brick my phone anyway.
Re: We got our Osgood answer, though
We got our Osgood answer, though
If you think about it.
A Whovian of her calibre asking what TARDIS stands for? There's suspension of disbelief and there's suspension of disbelief. Obviously, this is a factoid about the doctor she never thought to ask her "sister" before she was killed.
I saw the accusation+hysteria principle depicted on a well-known documentary called Buffy the Vampire Slayer.
It seems a demon took the form of a pair of children (Hansel & Gretel), to whip up anti-witch sentiment, which of course negatively affected Willow.
Re: Why stop there?
Tried buying a pair of scales recently?
If you're looking for scientific scales, then yes, that kind of precision is pricey. But for common uses, like cooking (we were talking about sugar), you can find them at reasonable prices at any kitchen supply store (fancy-ass name brand stores notwithstanding).
My understanding is that bypassing biometric authentication is simply accomplished, and fairly conventional, as depicted in documentaries such as "The Avengers" and the "Mission: Impossible" series.
Re: Collects whats?
In which case, what's the exact thrust of the article? That it's NOT, in fact, a spyware application?
Actually, I was wondering what would happen if said battery had more than one ounce of electrolyte.
Not a smuggler
Yeah, I was dating him, he was unconscious, one thing led to another....
Like the mplayer plugin that I use to play web video. That's the kind of functionality we lose.
It's confusing that in English, "plugin" and "extension" are pretty synonymous, but in Mozilla products, they mean distinct things.
"it communicated with a server in China, therefore it's clearly the Chinese"
You would expect such sites to be spread like butter around the world for exactly the reason you say. Criminals and the computers they control should be scattered randomly.
A concentration in one area or another is interesting data. Do we have more criminals? Do we have stupider sysadmins? My politics would insist that neither could be true. But alternative explanations don't seem to accompany reports of incursions.
Re: re. *Not after actual fictitious Smurfs, ...
Actually, my first guess about the one that turns on the camera was that it would be named Vanity Smurf. I'd be surprised if nicknames for shadowy illegal stuff would be careful to avoid copyright infringement.
"Down by the ocean,
Down by the sea,
I looked in the water and what did I see?
Me! Me! Me! Me!"
Trust in Experian
I'd argue any trust in Experian was already misplaced before the breach.
I don't know of a single human soul who has looked at their Experian credit reports and found them to be particularly accurate. If they're that slapdash in their approach to details in one area, they're likely to be careless with details in another.