Re: Culture ship names
You missed the best one: "What are the civilian applications" :)
Though the most appropriate is "Sacrificial Victim"
1402 posts • joined 18 Aug 2011
You missed the best one: "What are the civilian applications" :)
Though the most appropriate is "Sacrificial Victim"
Without the supporting infrastructure this is a gimmick. I do not see anythiing anywhere to force railtrack (or whatever it is called today) to provide backhaul along the rail-line and base-stations with predicted handover. A train is the easiest moving object to deliver high bandwidth to via wireless as it is moving with a known speed in a known direction so you can handover based on a predefined sequence instead of handover based on radio conditions. If you want to give a train several 100s of MBit you can do it with ease _IF_ you serve it using specialized backhaul and wireless.
So the train companies will all stick a single 3G/4G mifi per carriage (if not one per whole train) which will get saturated by 3 commuters and will not do anything about the abject absense of coverage along main UK rail routes. It will also have to compete vs all the mobiles in the same carriage so if it gets 16KBits you can sing halleluia and jump with joy.
Try using mobile on London to MK or London to Cambridge. And wheep - there are up to 15 minutes gaps where there is no coverage whatsoever (or a single channel of edge).
Dude, you are clueless.
There are two sides to this coin. One is (you are correct here) - management. This is the LESS valuable one.
The other one is teaching the young un's how to "hold that rifle and where to stick the pointy thing attached to it". Same as in the army - an experienced non-comm is more valuable to the survival of its squad than a whole office of freshly minted West Point (or Sandhurst) graduates. This is because he can teach the others practically how to survive in the day to day job, be it killing the enemy, be it writing software.
First of all - the only way of doing that is by being in the trenches yourself. You HAVE to have some experienced employees around all the time to ensure that stupidities are squashed early in the bud and not propagated for several years before they implode taking the down project (and sometimes the company with it)
Second, forcing everyone who attains some level of experience to become management or leave is utterly stupid. The result is McDonalds and McDonalds quality software. Going back to the army analogy - most grey beard non-comms would not make a good commissioned officer. It is pointless to send them to West Point or Sandhurst - they are valuable where they are and doing what they do best - being in the trenches with the troops.
It is probably me being thick today, but this diagram does not make a lot of sense :)
Come on. Diamonds are forever you know.
Indeed. IMHO this is giving the right answer to the question: "Why do we need voice recognition on the server side". At least I do not have any questions any more
Samsung intrusiveness is pushing you towards..... Sony?
Funnily enough this is not as paradoxical as it seems. They got burned early and badly so on the overall they have been pretty well behaved on both the home entertainment and mobile front as of late.
Not a lot, at least for now - the prices on Misco do not show a massive discount. They are pretty rock bottom as it is though.
Bitrotten - not so sure. TVs now use generic OS-es. My Tosh TV gets an update every 1-2 month. So does the new Sony BR (I suspect both run some form of Android). VR will only continue to be embedded deeper and deeper into the OS as this is where Google likes to take it so not like it will bit rot any time soon.
It is not "next generation". It is today's generation of embedded device developers tackling a new niche.
99% of the embeded development - cars, security systems, cctv, smart energy, etc has never heard of Postel's principle, has no clue of even the most basic Internet application security practices and will write insecure code by default. It comes with the territory.
This is exactly why I roll my own. I used to use Via mITX systems. I nowdays use Rapberry Pi.
Properly secured, communication with mothership only over VPN. All data movement, etc written by me in my spare time so I know exactly what and how moves around. Anything that touches my locks, central heating, has sensors and cameras in my house is going in only if I can see all the source or even better - if it comes as hardware and I can write the software myself. Off-the-shell cheap Chinese internet camera as a security device (or Nest for that matter) - no thanks, do not smoke that.
I was not that paranoid until I had to work with Smart Metering and review SCADA security as part of the process ~ 4-5 yeas ago. After seeing how they write those supposedly "critical" systems...
That mat was deadly - they fitted it also on the last real (2004) Daihatsu 4x4 Sirions before they completely crippled Daihatsu in 2005. I got one of these and it got caught on the clutch several times (no clutch on USA cars so break or accelerator will be the victim). To add insult to injury the f***ers did not include it in the recall list so no free mats from Toyota for us cheapskates.
I have tried anything and everything to deal with this and finally found something last year - the same OEM part as used on Isuzu trucks:
http://www.amazon.co.uk/gp/product/B00NC0ICWS (no association with the links). Two of these dealt with the problem once and for all.
So no hackers involved I am afraid. Just terminally (literally by all means) bad design (resulting from terminally bad management).
Hand out the data to the authorized dealership which in turn transmits it back to the corporate servers.
There is a "Sony Pictures" waiting to happen somewhere in here. The question is not if it will happen, it is a question of when it will happen.
Twitter can be "in charge" and is "in charge" as it has chosen (quite deliberately) to have minimal (if any) busyness entities outside the USA. So most governments and jurisdictions can hit it only with a polite request backed up by a threat of applying The Great Firewall of [Turkey, France, Britain, Russia, etc ]
This will not last - they will have to go outside the USA and start establishing presense in other countries in order to monetize sooner or later. Once this happens they will start getting proper legal requests as well as the compliance and audit trail to go with it.
This is one phone I would have loved to have. Unfortunately, when I looked to update the "fleet" a month ago frm the post-X-mas fire sales it was not available neither on Amazon, nor elsewhere.
Pity - I like the concept.
Better this than arming some psychopath or giving a tosser a truckload of arms so that a psychopath can pick it up at a later date.
Also, make it Tössers, so it has a proper IKEA style sound.
Actually, Amazon is obsoleting them all. It will obsolete Conrad and Maplin too.
It now has listings for nearly any electronic component under the sun for ~10% of the prices which Shack and Maplin used to charge so why bother going to a specialized store.
This is not stupid.
A fool and his money will soon be parted. The one who is providing for the needs of unhealthy paranoia and complexes in people is usually not stupid. Immoral - yes. Stupid - no.
Stupid is the one who is _BUYING IT_
This is why I have a DIY wiring management using slotted trunking on the back of all desks and on the back of the media unit. It takes ~ 20 mins to put a length (or couple) of slotted trunk iin place and screw it in as the glue tends to be insufficient to hold it in place. You can pull a cable out anywhere and similarly "reel it in" anywhere as a result. Nice, tidy, does not collect dust and allows your robot servant to do its job.
It used to be that the floor under each desk looked like octupuses in a feeding frenzy. The Roomba taught me to keep it a bit more tidy. Win-Win.
Judging by the design of the brushes on the picture this looks like the Samsung clone by the way.
You will damage the lacquer on the rest of the board. There are better options nowdays (water based acrylics).
First, ask a nearby female which one does she "prefer". I suggest doing it in a rather tame country. If you do it around the Mediterranean (Spain, France, Italy, Croatia, Serbia, Bulgaria) or in Northern Europe (Sweden) you will need the panic button on YOUR phone - to call the ambulance to be taken to A&E to remove a shoe heel from your tenders. In a more tame country you are likely to get the explanation that as far as a woman is concerned there is bugger all difference and you will get the heel _AFTER_ that. But you will still get it. And you should.
Second, originally, taxi licensing in most countries was introduced for exactly this reason - criminal record checks and overall customer safety. Now the fact that some municipal authorities have converted it into a cash cow (Bonjour Ms Idalgo) is a different matter. This was later.
Actually - for PGP compatible key formats and PGP compatible options there is not. The old PGP 2.x series which is available as software is obsolete by all standards. As far as using it all - ALL Linux distros and nearly all other free software uses distribution mechanisms based on PGP formats for signing implemented via GPG.
While it is theoretically possible to move them to x509, doing so will require a considerable amount of effort. Additionally, x509 is centralized trust anchor, while PGP is a trust mesh. So you completely change the trust model. IMHO the mesh is more appropriate for free software development as there is no center and even Ubuntu or RHAT do not have the means to maintain a CA with all the associated security and trust procedures.
Actually all contracts now include 4G except the lowest 250MB one. The change not mentioned in the press release is that they have started removing 3rd party wifi hostpot like BTWiFi, etc from the contracts in parallel with adding 4G.
There has already been at least one successful cat-assisted war-driving experiment.
Some of the smaller android phones (which also happen to have cyanogen loads and root access) can be attached without a lot of trouble to a cat collar. Load a WiFi attack suite, let the moggie do a tour of the neighbour's gardens and voila - here is your new and shiny botnet (nicely localized to a location too).
The fence they are using will exclude everything, not just the toad. Hint - toads are not frogs, they really suck at jumping. So a 10-15 cm reverse inclination (outward facing) fence should suffice. There is no need to build a 2 foot high monstrousity.
Also, if done right, it can serve as a one-way trap. A toad can climb from inside out, but never come back.
It will at the same time allow most indignieous species to get to the water and offset the balance in their favour. On the negative side this means that you need to level the ground in front of the fence to ensure it is effective so a smaller fence is likely to be more effective.
Yeah I can imagine doing it in Cambridge and taking the press down to the Robin Hood (when it still existed - it got vandalized into an Eatin' Inn lately). Or maybe not.
Woa... This comment thread beats the all time insults per post average on el reg and you sir gave it a nice start.
In any case - it goes to show that there is little or no need in a revenge porn law. The law book on extortion, libel and hate speech is so thick that you get the equivalent of a murder sentence if a qualified lawyer hits you with it.
In fact - if he was tried under revenge porn laws he would have gotten away with less
This is not exactly blackmail. It is standard BUG for BOUNTY negotiation as far as todays security landscape is concerned. If you do not show that you have really broken it, you are not getting any bounty (usually).
Unfortunately this is the thinking currently in 3GPP meetings, industry junkets and boardrooms and they will try to drive it down our throat with a tank if need be. The fact that most home routers suck so badly because they run slightly rebadged Broadcom Sh*tware instead of proper software is helping quite a lot here too. See, your [ Netgear | Dlink | Belkin ] is so unreliable that there is just no way you can trust it with your M2M connection.
So if you do not like the idea, you need 3 things:
1. Bookmark WriteToThem and prepare some envelopes with your MP's mail address.
2. Some money to donate to OpenWRT.
3. An enormous cluebat with which to go into the HomeNet working group meeting at the next IETF and beat some sense into them to finally produce a set of standards which will allow M2M equipment to communicate safely and securely with Joe Average lUser's CPE router.
I had to wipe the sarcasm off my desk, it was oosing out of the monitor.
You do not have flashblock? While adblock is a matter of taste, flashblock is nearly mandatory for any sane internet browsing. Either that or a CPU for which there is no flash (like my arm Netbook, actually ex-Chromebook).
Well, I am going to say this agian (to be downvoted again by the fanboys):
With this in mind, I am not surprised about the the announcement of core and memory increase to match the Windows 10 requirements which is _NOT_ a Linux requirement or a requirement for 99.9% of current Pi apps.
Now let the downvotes commence.
Why are you so obsessed with 1gb NIC's and SATA?
This is a low end device FFS
With the pretense for media center capabilities including HD decode and ability to capture video at reasonable rates. While you can just about get by with the 100MB/s interrupt driven NIC and USB for both it is exactly that - "get by". To do anything more with media you need a decent NIC and a decent storage as well as USB power budget that does not cause a crash the moment you plug in a decen 5.1 channel USB audio into it.
The Pi is good for what it is - IO (for those of us who cannot be a**ed to deal with Arduino). Other stuff - not really and the increase in CPU and memory does little for that either as the constraint is elsewhere.
So coming back to the possible use cases for core/ram increase:
1. IoT, automation, etc - nope (it is good as it is).
2. Media - nope (constraint elsewhere)
3. Windows - oh yeah, it just made the minimum envelope for version 10.
I was wondering why the hell upping the core count and RAM on the Model B. This explains it.
In the absense of sufficient power feed, 1G NIC and SATA there is really very little you can do with 1G RAM and Linux in IOT space which cannot be done with 512M (or 256M for that matter).
So the answer to the "why raise the hardware spec" is now clear - it needs to comply with the minimum spec for Windows 10 which surprise, surprise is 1G RAM.
Well this has categorically answere
No it has not. Still 100 MBIt and no SATA. So it is still as useless as the previous one for microsdesktop (in a network), thin client duties or a NAS. If you want any of these you will still have to (grudgingly) shell out for an x86 based system :(
It is probably even worse than the B+ in terms of power budget too. B+ is barely useful (I got 3-4 in use for security apps) because it has under 200mA or thereabouts left after the SoC consumes its share. It really, really, really needs a proper power plug instead of still faffing around with micro-USB. Otherwise these 4 USBs are useless - you can realistically use only one or two.
The B+ was fine for classic Pi IO duties (sans the power issues) in a IO/Network application and that was about it. For that two cores, 512M and 100Mbit are enough.
If Pi will really insist on trying to do something in the "desktop" space it should try better than this and put a Gigabit Soc on the board.
I did a quick check for my vehicles (I got two Daihatsus from that period) to use a different airbag supplier. I would not be surprised if this is a USA specific issue.
Not just the airbag. There is a set of similar charges to pull the seatbelts which should not last more than 10 years. Unfortunately I have yet to see a manufacturer which offers a refurb kit. IMHO they should be obliged to do this at least once as a regulatory requirement.
So, if, instead of misappropriating card data they were running a small fleet of drones in key locations in the country to gather enough data to feed into some Bayes stats
Hm... There is a rational idea somewhere in this :) It is a trivial mathematical problem - get a statistician and an optimal control specialist and they will calculate you the optimal drone routes in a month or so. From there on - profit...
The sole problem is that the "augurs" (sometimes erroneously referred to as financial analysts) which presently make a living on predicting the financial results based on [ guts | cards | stars | bolivian marching powder induced hallucinations ] will pay a hitman for your head after that.
Have you tried driving downtown Paris lately? It will not be out of place in-between the thousands (they are like locusts there) Piaggio 3-wheelers. It will also serve the same niche perfectly - a car for a commute which is spent mostly in traffic jams and at traffic lights and/or jostling for position with motorcyclists at the next junction. When chosing between a Piaggio 3 wheeler and this I know exactly what I am going to chose :)
Ever since the congestion charge was introduced downtown London is a nice and leasurely experience. If you can foot the charge, you do not really need a contraption out of Jupiter Ascending (trailer around 1:23, just looks like the Wachovski has repainted the wheels green http://www.imdb.com/title/tt1617661/?ref_=ttmi_tt ). Paris, Milan, Rome, Barcelona - that is an entirely different ball game and frankly this car will fit straight in.
While the technology (802.1x) to authenticate wired connection has been out there for ages and supported across the board (Mac, Linux and Windows), it is yet to be implemented by 50% or so of the IT departments.
Out of those who have implemented it I have seen only ONE, yes ONE, which assigns different networks with different access policies on the basis of 802.1x identity and once again only ONE which has a fall through for unauthenticated 802.1x devices to a guest network.
Everyone else runs flat, mostly unprotected network of the "once you get in, you can wreck havoc". If there is a firewall, IDS and NAC it is just one and it is at the border.
To add insult to injury you often have execs which actively prevent and sabotage attempts to segment: "Waddaya mean I will not have access to the whole network? I am Chief [Stupidity | Ignorance | Thickness ] Officer, I will have access to what I want and how I want". Unfortunately when facing this outburst 99% of corporate IT falls into line straight away and will never design the network to be segmented in the first place. So from there on it cannot introduce different "access" levels even if it wanted to.
Well, booga. I just renewed the family contracts with Vodafone. If 3 did this 3 weeks ago they may have had 3 new customers.
I just refurbished the "family fleet" with end-of-line fire sales Xperia SPs which all happen to have a band 20 LTE radio.
My exact thought. Dear old Bill. As clueless as ever.
Well, the most lift since Saturn _IS_ Energia. 100 tons. While quite impressive, the Heavy Falcon is not just there, yet. It is however the closest we have gotten to Energia so far.
Otherwise, all that is missing from the picture is Elon buying a volcano somewhere. Everything else - he already has it.
You can restart the services one by one if you want. No need to reboot. Or restart only the ones that are clear to be affected (exim).
By the way - debian patched eglibc packages do not restart it which is weird as they are usually quite a**l about it and have a list of packages they need to restart on upgrade (usually exim, ssh and inetd).
Well, I guess you can get somewhere by having having constant rev fans in a bad airflow design, no regard for MTBF beyond warranty combined with a noise and thermal envelope which would have made the Concord Olympus engines stall with envy.
At least this has been my personal experience with their boxes over the years. I have bought them once or twice and I have regretted every single time I bought them (while quaffing ibuprophen to quench the headache after installing on them).
I admit - it is a good manufacturer for "rack-n-stackers" which have thousands of guys who do nothing else but pull dead ones out a rack and stick blank ones all day long (provided they have good ear protection). Anything else - not so much.
I suggest you go read the detailed description of a civilization with rooms with 360 degree displays.
It is called Farenheit 451
Why just the croc? Insert your choice of [ trapdoor spider | jellyfish | snake | shark ].
In any case, I like the idea of the selfie zone. Can we have it right next to sharp bends (especially at car races) so nature can take its course.
Inherent design problem.
Bats cannot do that either (though they need a tree, wall, etc instead of a meatbag).
I was actually more impressed by how this moved in the air to be honest (again - not surprising).
Welcome to the P2P nature of the beast I am afraid. As long as it remains P2P that will be the case. The performance is unpredictable. This is why I use it only for IM. If I have to do a call I pull hangouts and if I have to do a conference I (grudgingly) use Webex.
Though frankly there is very little P2P left in Skype as it is, because the supernodes are now mostly from a population of dedicated server instances seeded on Microsoft Azure. None the less, the lack of predictable performance inherent to the architecture is still there.
From that perspective the massive b***rdization of SIP in Lync is better. It also works nowdays - even on Mac and Android.