1696 posts • joined 15 Jun 2007
Re: The Captain Scarlet effort on CITV was good
But to me it never had CGI wow.
Maybe I need to watch it again, but to me it looks to have been animated using the Max Steel or Action Man CGI rendering engine, which make movements look unrealistic. I know it was probably a different company doing it, but the Starship Troopers CGI series looked better.
Hopefully, they will use a better engine for the Thunderbirds remake.
Re: The Captain Scarlet effort on CITV was good
I only watch the first DVDs worth (four episodes?) of the Captain Scarlet remake, and I was very disappointed. They messed with the format so much that only the fundamental details survived.
It appeared to be the case that they went completely down the action route, whereas the original series demanded that the kids follow the story. I wonder how much of 'kids have short attention spans' is reinforced by providing programs that need no degree of attention to watch. Possibly a self-fulfilling statement.
IIRC it was billed as "Gerry Anderson's New Captain Scarlet", so I wonder what Gerry actually thought of it. The reason why he hated the live-action movie so much was he had lost control of the franchise (he sold the complete rights to finance one of the later series), and so had no input at all. I agree that it was barely worth watching, apart from the cameo reverse-format puppet hand at the Thunderbird 1 controls, which was the sole amusing bit of the film.
Re: Trade War?
"it applies to them no matter where they operate" - it depends on what they are doing.
This is the US interpretation of a US law. In actual fact, if Microsoft operate on European soil, they are probably doing it through a European subsidiary, which is subject to the laws in the region they are operating.
It has to be this way, otherwise all employees of US owned (I'm talking US holding companies owning the regional subsidiary) companies working on outsourced operations for, say, UK government agencies could be forced to divulge national secrets if asked by the US Department of Homeland Security.
It's different for business transacted over the Internet, because it's much more difficult to enforce national boundaries.
Where the issue is further clouded (pun intended) is if a non-US organisation stores data in a US owned storage cloud. I can envisage situations where US DHS could ask for the data to be migrated onto servers under US jurisdiction, and then they have the law behind them to get it disclosed!
I think that Office365 is probably run by Microsoft US, and the servers are probably on US soil, so the statement about that is probably true. A reason to consider carefully how you use SAAS and cloud based storage.
Bollocks. That shoud read "You're", not "Your".
Re: Please........ [re. data only connection] @This Side Up
And the cost of all of these physical things..... very little (probably a single electronics module, provisioned in bulk, which would probably be installed anyway even if they did offer a data only service). Anything that is shared or managed centrally (like call-set up, breakdown and billing) would not be any different.
Your argument goes back to old fasioned exchanges (pre System X) where things like ring and dialtone generators were seperate pieces of hardware shared between a small numer of telephone lines.
Re: Please........ @Roland6
Normal ADSL services uses frequencies well above voice. As a result, I don't think that their service would have provided any enhanced bandwidth, other than there being no need to install microfilters which may make a slight difference to the signal strength.
Re: Please........ @lallabalalla
Your not being billed for it seperately, so you are only paying an unquantifiable amount for it.
My assertion is that as BT provide it by using otherwise unused spare capacity at weekends, it costs them effectively nothing to include, and they are unlikely to ever offer a package at lower cost that does not have this particular feature. They may offer a data only package, but I bet it would work out the same.
You are assuming that if they did offer data-only lines, that they would use less equipment to justify a rebate.
The cost of provisioning the service from your home to the exchange would be the same, most if not all of the stuff at the exchange would be the same, and from the exchange to the rest of the network is all IP now for both voice and data anyway, so again would be the same. There would not be much of an equipment saving.
Bundling it all together is pretty much what they do. The line rental that I think you may be complaining about is not the cost of the voice service, it's the cost of connecting your house to the exchange. This is necessary whether you use voice, voice and data, or data only.
Why not just use their Unlimited Broadband package, and not plug in a phone? The only bit you would be 'saving' on by not using it would be the free weekend calls, and bearing in mind that voice traffic bandwidth was traditionally low over the weekend (so is low cost to BT), it is unlikely they would offer much of a rebate anyway, so how much do you think you would save?
Re: I am still using my Eee 701SD...Same here
Mine is a 4GB model, ordered in the first week they could be ordered, and now has Ubuntu 10.04 on it. I cannot see me putting 12.04, though (far too small and underpowered).
The big problem is that a mainstream distro leaves an uncomfortably small amount of space on a 4GB SSD. I have to aggressively manage cached packages, multiple kernels and other things to leave enough space for the system to work.
But otherwise, it is surprisingly usable.
Re: Accounting @AC 11:25
Even as a relatively high paid IT consultant, £2500 would represents well over a weeks total income. Justifying it as a tax deductible expense would still make it a considerable purchase for a one person service company. Even claiming back the 20% VAT will not drop such a purchase to below 2 grand, and that is money that could be used for other things (such as paying me), and one of the primary things it would have to be able to do was track it's own depreciation!
Fortunately, I never had the need for that class of machine, as I have not needed to be away from power for more than my 2nd hand Thinkpad can provide.
I totally agree about the accounting package. A usable and supported payroll and accounting package with current HMRC tax tables was the only reason I kept a Windows partition on my Thinkpad. Since shutting down the company, Windows has never been started on it, and it's been Linux all the way.
Re: Ghost In The Shell...
But I don't think Bateau's visual overlays are provided by his cybernetic eyes. I think that they are directly injected through his cyberbrain. Otherwise Aramaki and Togusa would not get what they 'see' either.
Re: Well actually @Spearchucker
In my experience, the various Ubuntu releases work on everything I've put it on with few or no problems.
In the last 8 years since I started using it, I've put it on lots of Thinkpads and other laptops, netbooks, and desktop systems, and while I won't say that I've never had problems, none of them have been show-stoppers.
OK, when I first used my eeePC 701, I had wireless problems until the slightly strange Atheros chipset gained a Linux driver. My Thinkpad T30 does not reset the sound correctly after suspend, and the Mobile Radeon graphics adapter is too old to work with Compiz well, and I came across a wireless card for which there was no Linux support on a Shuttle XPS (which, incidental, did not work in Windows very well either).
I suspect that your Vaio must have some very specific hardware in it, and only works on Windows because you have a system restore image prepared by Sony that contains the right drivers. I would be interested in seeing how well you managed to get it working with a retail windows install disk, and what would not work.
Windows users think that their systems 'just work', but this is mainly because the PC manufacturer has taken the necessary background steps of identifying the drivers and building a bundle of Windows and drivers specifically for their systems. If they went to the same lengths for Linux, it would be the same.
What is amazing in my view is that a single build (one CD, not even a DVD) of, say, Ubuntu will 'just work' on a huge number of different systems without all of the behind the scenes customisations that happen for Windows, because they are done for you.
One of the problems is that Windows drivers are specific to a particular instance of hardware, so a Atheros card from say Netgear would not work with the drivers supplied by Belkin for a card with the same chipset, and often not even with the driver for another card from the same supplier with the same chipset.
Linux is different here, because its drivers are largely manufacturer agnostic. It identifies something like an Atheros chipset, and it configures the driver regardless of the manufacturer (OK, I know Atheros is an old chipset not used much now, but it's the one that came to mind first).
Occasionally, you will come across some hardware for which the PCI or USB ID's are not in the database, so the module code cannot identify the required driver correctly, but this becomes less and less frequent as time goes by, and is usually fixed for what must be regarded as non-mainstream hardware (if it were mainstream, the ID's would be in the database) after a little Googling. Not everyone's forte, I accept, but you cant expect the distro maintainers to be omnipotent!
Re: Don't blame UPnP... @Peter
I'm not sure that I believe you that it is just a router. Most routers now claim to have statefull firewalls in them, and bearing in mind that they are the first line of defence in most peoples home networks, I think that you need to treat them as a firewall.
Indeed, some misguided PC world sales youth tried to persuade me to buy an (expensive) all-singing, all-dancing ADSL router to replace my ADSL modem/router, separate Smoothwall firewall and wireless router, as it would do everything I needed in one box. I don't normally lecture people while in PC world, but he was an exception. I had gone in to try and find a wireless range extender.
But you are right, I should have been more careful in my comment.
Back on topic, you can turn UPnP on if you want, but I am never going to allow a vendor device on my network permission to open up inbound connections without being bloody sure I trust it, and I will offer that advice to anybody who asks me. I believe that it is just asking for your network to get pwned. It only takes one mis-configured or deliberately malicious device or software service/piece of malware (PCs can use UPnP as well) to appear on your network to let in things you do not want. If you do not see the danger, then that is not my concern, apart from having to fend off a future botnet in which your machines are enrolled.
Re: How do I do a port scan to see what ports my uPNP router has exposed?
Steve Gibson's own Shields Up! on www.grc.com may be a good place to start.
Re: Don't blame UPnP... @Dom 3
I think that you've misunderstood what a firewall is for. It's there to protect you from devices and services that try to compromise your security regardless of their intent.
My view is that having a mechanism that can override your firewall without your knowledge can never be a good thing regardless of how much easier it may make running your environment. If you need remote access, configure it yourself, and learn in the process. Trying to justify anything else is just lax thinking.
"Anyway, after a few minutes all the old Unix skills come flooding back: typing backslashes in paths that demand forward slashes"
You think that mistyping slashes is a skill?
There was a time when bottom left to top right was called slash, and top left to bottom right was a backslash. Then DOS came along....
Re: And the 755 is not water cooled.
Since I posted the last two comments, TPM has corrected the article without adding a corrction note. Just saying to explain what I was commenting on.
And the 755 is not water cooled.
The 755 is what Watson was created using, and is a cluster of slightly altered P7 750 nodes with Infiniband gluing it all together.
Power 795 "Blue Waters" beasts - Wrong.
The Blue Waters machine would have been a P7 775 cluster, not a 795, which is the large commercial system.
Hey, he's invented the Mainframe...
Back in the day, you had a cabinet or two for the processor(s), at least one for the memory (especially if it were core), another for each disk string controller, and then more for the disks themselves, and then additional cabinets for front-end processors, tape drives and any other ancillary devices.
It was perfectly possible to add and remove memory, disk controllers and strings of disk without having to replace the computer as a whole. Or you could replace the processors, and leave the rest of the system untouched.
I remember on weekend in 1985 when I went home on a Friday night, after using NUMACs crusty old IBM 370/168 which was collapsing under the strain, and came back on Monday morning to the same system with an Amdahl 5860 that to the user was identical, just a lot faster.
Professor Harry Whitfield (director of the computing laboratory at Newcastle University at the time) wrote the following in his annual report for the year:
"The installation of the Amdahl 5860 in late September 1985 and its introduction into service in early October must be regarded as the major event of the year. The whole process went so smoothly (and unannounced) that users 'merely' noticed that the system had suddenly become much more responsive and five times faster."
I admit the analogy is not perfect, but there are serious similarities.
Re: why is line-rental mandatory?
It's the model BT has used for telephone lines forever. For metered services (like telephones used to be), it made absolute sense for BT to split out the maintenance and equipment cost from the usage cost, so that they still got money to provide the service even if no calls were made.
Nowadays with everybody offering packages with inclusive calls, it makes less sense, apart from the ability for the provider to hide some charges in the headlines of the advertising ;-)
For people asking for no line rental, which do they prefer. £13 a month for broadband and £14.60 line rental, or £27.60 a month for broadband without line rental, because that is the choice they would get.
It does not matter how it is charged, the ISP (possibly through BT) has to pay for the cost of the upkeep of the wires/fibre from the exchange to the premises, the exchange itself, and the equipment in the exchange. It will either be in the line rental, or added to the package cost. Assuming that taking the line rental out would leave the package costs unchanged is just lose thinking.
For the specific statement 'Telcos in other countries are happy to provide a "dry-pair" for the DSL without voice services' that would be true if there were really separate bits of kit in the exchange for the analogue phone line and the DSL link, but I suspect that in modern digital exchanges, that is not the case. Even if the line was not used for voice, I suspect that the kit would be the same.
Re: Can they still call this The Internet?
Why? For normal users who do not provide internet visible services, but only use client services, the change will be almost completely invisible. Outbound connection requests will still be given ephemeral port numbers, just like they are at the moment, and these will be recorded by the NAT server to allow packets to be routed back correctly.
In fact, if you have a cable or ADSL router/modem, you are almost certainly running NAT already.
It is only if you offer inbound services to your network that you are likely to notice anything at all, and if you are, you probably already know how to get around any problems. And it's not like they are not telling you what is happening.
Re: I dont really understand
IPv4 or IPv6 addressing is largely irrelevant to most internet users. DNS and stateless address autoconfiguration or DHCPv6 takes the pain out of knowing IP addresses.
Let me ask you. Do you know, off the top of your head, any IP addresses of servers on the Internet?
And do you care what the address that systems have on your private network?
For most home users, the answer to both of these is no, in which case, apart from the pain of switching your router and systems over to only use IPv6, the change will be almost entirely unnoticed.
Of course, some of us (and I am in this category), do care, and I am dreading the switch, because I want fixed addresses in my network for certain systems (no uPNP for me, no sir). I have to do some learning to find out what I need to do to, and I'm not looking forward to that.
Re: Does the author know anything about TCP/IP?
If Plusnet give a fixed IP and port number(s), then it is still possible to do port forwarding even in a double NAT environment. You just have port forwarding on both NAT devices.
I would be quite happy to be given a range of ports (say 16) for input services on a fixed IP address, as long as I knew what the external port range was, and what ports each would map to when presented to the local NAT device. This would be preferable to me than having all the ports available on an indeterminate IP address, and having to use a dynamic DNS solution to find my servers on the Internet.
A more complex setup, but I'm fairly certain that the people who want it are the ones most likely to understand how to set their side up.
Alternatively, you could run your ADSL/cable router in bridge mode, and have them map directly to your servers (only having ISP run single NAT in this case), but that is not a configuration I would want as the ISP would then have sight of your private network unless you put another firewall in.
Does the author know anything about TCP/IP?
"NAT makes it impossible for anyone on the internet to establish a connection to a computer behind it"
Not true. You just have to include port information in the address, and set up an inbound port redirect on the device doing the NATing. So outside, you advertise, say, port 2080 for your web server, and have the NAT device redirect inbound packets received on the 'RED' side port 2080 to port 80 on the private address of the device on your 'GREEN' or 'ORANGE' network. All of the devices that I have used that provide NAT have this functionality, so I'm sure that an ISP could deploy it.
In case anybody does not understand, a valid URL can include a port number, so you can have a URL like www.mywebsite.co.uk:2080/home.html
It works, but there are caveats, particularly on URLs that refer to other pages on the same site. But it works very well indeed for single port services such as SMTP as long as it is known to use a non-standard port.
IIRC, DNS has support for providing port information as well as IP addresses for name lookups, it's just not used.
And in many other places as well
Cable only covers cities and large towns. Once you get into the sticks, cable is almost non-existent.
I'm surprised by central London, though.
OK, I got it. Thanks.
I had not considered using NOPs to make the return address less critical, nor the fact that you could find the absolute address of the stack frame relatively easily (although it is compiler specific). That stack_smashing paper is dynamite.
Each exploit has to be taylored to the OS and processor, but I guess that Wintel is a big target.
Re: Significance @Gerhard den Hollander
Is this PDF safe to read in Foxit?
In this case, it cannot be the kernel stack.
Re: Significance @runwin
OK, I've read the page, and it falls into the "change the return address" scenario that I mentioned. Having read that, and done what I should have done before and worked out the way stacks are stored, it looks as if most systems grow their stack 'down (higher to lower addresses)', and I admit that the return address will be stored in memory with a higher address than the buffer, so could be overwritten.
But I still think for several reasons, that this will be more likely to cause a DoS, rather than a remote code execution problem in this case.
I'm always a bit sceptical about the danger of this type of bug. Sure, it will cause unpredictable errors, but lets look at what could happen.
As they talk about stack overflows, I'm presuming that the URL is being copied into a variable stored on the stack, i.e. a local variable. When this exploit runs, whatever is in the memory locations after this variable will contain some data that is under the control of the exploiter.
So. The memory locations after the variable will be another variable, or possibly a stack frame header including the return address and possibly some saved register contents.
If it's another variable or saved register contents, then the previous contents will be lost, and/or some unpredictable behaviour might happen when the variable is used. It might be a pointer, which may mean that some other data address could be clobbered later in the code. It could be a vector (pointer to some code), but in order to exploit this, you'd have to understand the rest of the code really well. If it's a stack frame (and I've not checked the direction of stack growth so don't know whether it will be the frame for this function or another), then the return address may be damaged, which could be used to control where the code returns to.
The comment from Paul Ducklin from Sophos, re. "The crash, which is a side-effect of a stack overflow, pretty much lets you write to a memory location of your choice," seems an over-reaction, as it is likely that you could overwrite an address following this buffer in the page the stack is in or a contiguously later memory page. Any point after this will probably generate a segmentation or address violation, as soon as it tries to write to an unallocated address. To me, this is not the same as "a memory location of your choice".
You've potentially got some executable code (if that is what the URL contains) stored in a memory location you should not have access to, but it's not in the program text, and I've not yet seen a method described of triggering that code (the return address in a stack frame header is the only one I can see which would affect the execution stream). This does not appear to be a practicle means of injecting code, much more likely some DoS attack against the user running Foxit.
So it is important (all bugs should be regarded as such), and I'm sure there may be some special cases I've not spotted, but on casual inspection it can only be described as a DoS vulnerability with a 'potential' remote execution problem. saying any more would be FUD.
Possibly someone could educate me if I am wrong.
Re: Rip off @cornz 1
I hope that you are only using usenet for your content, because if you watch 'live' TV over the Internet (yes, it's a bit of an ambiguous definition, but I believe that it means material that is broadcast over the Internet while being broadcast to air, even if delayed by a few minutes), then you still need a TV license. Your computer becomes TV receiving equipment under the terms of the law.
But if you are using usenet, expect a letter from your ISP accusing you of copyright infringement.
What's not clear is whether the fact that you could watch Internet broadcast TV but don't is enough to remove the requirement for a license.
It's not quite that straight forward.
Shareholders are already on the hook, as they are unlikely to get the money they invested back. They are just as much creditors as the workers who are owed pay.
In the case of a company that is negligently driven into large debts, especially if money is owed to HMRC (in the UK), then the directors can be sued for corporate negligence, which can result in them being banned from becoming a director for a period of time, personally heavily fined, and in some cases, sent to prison, especially if fraud can be proved.
Limited Liability companies do not offer complete protection, but I admit that there are ways of extracting value from such a company and walking away without the debts.
There's two points here.
One is that it allows companies to hire more people in order to be able to select the ones worth keeping after three or six months, and the other is that companies are petrified by the redundancy conditions such that they do not take people on until absolutely necessary, for fear that having to make them redundant at a later date if there is a downturn in their business is so costly. This is also the reason why so many companies prefer to use agency staff until they know an increase is really justified, to avoid the redundancy packages.
In both cases, if it was easier to get rid of workers more easily, companies might be prepared to employ more people.
I personally would prefer to work for a company knowing that they could shed staff more easily if it stops the business going bust and everyone being made redundant, even it it did lessen my job security. There are some safeguards needed, but giving a company in difficulty the choice of going bankrupt because they keep too many employees on and have to keep paying them, or going bankrupt because the redundancy packages they have to offer can't be afforded, is no real choice at all. They both drag the company down.
If I remember the story properly from the BBC
What is happening here is that the Indian government is retrospectively changing the tax rules, and then expecting foreign companies on just roll over and pay more tax for years they already thought were closed. It is a policy that is specifically designed to extract more money from non-Indian companies that are operating in India.
It's within what a government can do, but is clearly not going to make companies operating in India happy.
Re: thinkpads? @cap'n
I think that it depends on whether you are a form-follows-function person or not.
Thinkpads are functional. There is little wasted weight or space, the screens and keyboards are/were the best in the business, they are not too bulky, and they will suffer the day-to-day wear and tear that a road warrior will put them through. And there is nothing in their design that makes them unpleasant to use. The lips and edges you talk about are all deliberately engineered so that when shut, they all lock together, so there is not too much strain put on the hinges. Seen many Thinkpads with broken hinges? No, I didn't think so.
Add to this an engineering, maintenance and warranty strategy that means that they will can and will be fixed if they break in warranty, and have the full maintenance manuals available for third party maintainers to fix them when they are out of warranty, with a large pool of donor systems for parts means that they have an extended 2nd and 3rd user lifetime where you will still see 6-7 year old Thinkpads in regular use (my T30 has a manufacturing date of 2005, and the A20 which runs as my linux firewall is even older).
I'm sure that it you look, you will still be able to buy brand new OEM batteries from one of the auction sites for any Thinkpad built this century. Try that for a decade old Dell or HP.
Of course, if style is more important, then a Sony Vaio or any of the Ultra books will do the job, but don't expect them to have the same life expectancy. But if you are after style, it does not matter if it breaks after 12 months, because you will probably be replacing it for the latest 'shiny' toy anyway.
Re: @ Peter (was: No mention of token ring? @keith_w)
It may have been that way in the US, but I was involved with a customer still installing new TR kit beyond Y2K. I admit it was mainly because the customer had a large investment in it, but when the organization split, the bit I went with dumped TR, and jumped straight to 100baseT.
In a lot of commercial organisations, being able to use a Premises Distribution System to organise your cabling for TR (and twisted-pair Ethernet, phone and RS232 terminal traffic) was a real benefit, and one that 10base2 thinwire Ethernet could not take advantage of. Thus Token Ring persisted.
I saw the benefit of a PDS when I saw 1MB/s AT&T StarLAN installed for the first time in the late '80s.
Re: No mention of token ring? @keith_w
You're confusing the physical MAC layer with IP.
Token Ring and Ethernet are comparable. IP can run over either, and many more physical networks as well. Although it does not directly follow the 7 layer OSI network model, it is a layered protocol (MAC, IP, TCP/UDP, application protocol), and provided it meets some basic requirements any physical layer can be used to transport IP.
Token Ring is exactly as routeable as Ethernet when running IP. Routing has nothing to do with the MAC layer, except in very simple protocols as IPX or NETBIOS.
I have worked at numerous locations where there were multiple networks using Token Ring, Thinwire (10base2) Ethernet, Twisted pair (10baseT) Ethernet, ATM, FDDI and even SLIP and PPP all routed together using Layer 2 routers.
What makes Token Ring better than 10base5 or 10base5 bussed Ethernet is that it did not use CSMA/CD to arbitrate use of a network segment, so works much better at higher utilisation rates. As soon as 10baseT switched Ethernets came along, that was no longer enough of an advantage, and Token Ring died.
If you look at network topologies, those with multiple tokens or a slotted ring (such as the Cambridge Ring) could carry much more data than Token Ring, but were more complex to set up.
If you had ever had to debug a token ring implemented with MAUs, when one system was running at the wrong speed and causing lost beacons (or beaconing), then you will be glad that TR eventually died!
Re: iOS feature support @DougS
I was only thinking this morning as I connected my tablet to the cable that had fallen down behind the table and I had to fish out again, and which my wife complains about whenever she vacuums, how useful it would be to be able to just put the tablet in the same place and know that it would charge.
Ditto all the cables in the car.
So yes. wireless charging would be a good thing. Even better if there was a standard, and I could have a couple of them scattered around the house, charging all the phones, remotes, media players and other gadgets wherever I wanted to be in the house.
Re: B5 @BoldMan
Yes, there was a terrific dynamic tension between these two characters that persisted throughout the entire show.
I see Andreas Katsulas on other shows (from the past, obviously), and when I do, I can't help seeing him as G'Kar.
Re: Babylon 5 influence
Off topic, I know, but....
I much preferred Michael O'Hare as the commanding officer of B5. With Sinclair being the re-incarnation of Valen, and being involved with a part human Delenn (as would probably have been the case), it would have led to an interesting dynamic. Having 'The Scarecrow' dropped in at the beginning of Series 2, even if he was introduced as the 'Starkiller', lost some of the world-weary ordinariness (quite remarkable for a SF series set in the future) that Series 1 had.
Series 1 did not really start the main story arc, (although throughout there were plenty of forward references that only became important later on, such as B2), it set the back-story for the way Babylon5 operated that was necessary in the later stories. None of the ST franchises managed to achieve the same level of detail, although DS9 probably came closest.
I really would like to have seen how Series 4 would have turned out if JMS had not had to shoehorn in the Shadow Wars conclusion and compress the Earth liberation storyline into the same series. The Telepath Wars storyline for Series 5 was too weak (especially after seeing what happened in 'Endgame' in Series 4), and the loss of Commander Ivanova and Marcus, together with the changed role for Michael Garibaldi meant that there was too little continuation in the last series.
I must admit that I was a bit tearful the first time I saw the final episode "Sleeping in Light", especially seeing B5 finally destroyed, and again when doing a frame-by-frame on the easter-egg cast and crew video at the end of the closing credits. Makes me a bit of a sad geek really.
One last question. Whatever happened to Lennier (I know, I've read what the Lurkers Guide and Wikipedia has to say) but I'm sure there is an interesting story in there somewhere.
Re: Let me get this straight... @Neill Mitchell
Point well made, but I'm sure that Xerox (Star), MIT (X Windows), Sun (SunTools), Digital Research (GEM) and even Apple (Lisa) were using the term "Window" and it's plural form in relation to computer systems a long time before MS Windows version 1 went to market.
Ah, but here's the benefit
Unlike us (because of the NDA that is part of the settlement), Samsung know which patents Microsoft have hit them with over Android in the past. If they avoid those patents, they may be able to avoid having to pay the license fee, which may save them dollars per phone. They will also have some control in order to avoid the Apple ones as well.
I suspect that the main one that MS roll out frequently are the FAT patents, some of which will expire shortly, but I believe we've never found out the full set.
Re: The reality is all too real @RICHTO
WRT the FUD claim and the links to URLs that you claim will affect iOS and Android.
Question. Do you understand the application deployment model in either iOS or Android?
In both cases, the way applications run is handled by a layer ABOVE the OS. So when you talk about it 'rooting' the OS, that is almost certainly not the correct terminology. Rooting by definition means getting access to the root account on UNIX-like OSs.
What has been compromised here is the application framework, *NOT* the underlying OS. In both cases, the underlying OS will be untouched. In terms of what a user sees, the result may appear to be superficially the same, but if you are going to make such claims, it is vitally important that you understand what you are talking about. Anything else is FUD, especially if you are spreading fear as a result of your uncertainty and doubt.
These specific issues are rather analogous to a Facebook application or account being hacked or a vulnerability in IE or other browser, while the underlying OS, whatever that is, remains untouched (unless, you run the browser from an admin account of course, in which case all bets are off).
This one of the historical differences between UNIX based OSs and Windows. Unless you take specific actions, you will *NOT* be running applications as a privileged user on UNIX, BSD or Linux. This was not the case on Windows before Vista, where many people's normal accounts had full Administrator privilege. This has changed, for which I say Hurray! but it took a long time for MS to recognise this (although NT was designed with a good security model from the ground up, even though it was rarely used to full potential).
Re: The reality is all too real @Danny 14 @RICHTO
I say again, this time to RICHTO. Read the article you link to.
This statistic is for defaced websites, not OS vulnerabilities. If you don't know the difference, then you should probably not be taking part in these discussions.
I'm also not sure about the data from Zone-H. The stats you point to are for 2010, and looking at the dates on the news pages (latest, September 2012, total news items posted in 2012, 2, total posted in 2011, 5), it looks like it is a site in decline.
Re: Same functionality as Droid and Apple?
I'd noticed the fact that there were videos missing from the Android YouTube app compared to the same search on a desktop. This also appears to be the case on the YouTube support incorporated into Blu Ray players and SmartTVs.
I think that it is the case that if the YouTube app does not think the correct container or codec is installed on the device, it won't display the video in the search.
I think it is possible to get YouTube in a browser to tell you the format of any video, but I can't remember how, and I can't check as YouTube is blocked/filtered at work.
Re: Winding watches daily
I remember when I got my first self-winding watch about 40 years ago (it was also a cheap bit of crap, made by Timex), and I remember thinking how bulky it was compared to the cheap Ingersol I had before it.
Some people just can't wear heavy watches.
I still prefer slimmer watches, even though I'm now wearing a lump of stainless steel that must weigh close to 100g because I cannot find something durable and lighter that does everything I think I want (although the last time I used the stopwatch was months ago) at a price I'm prepared to pay (when did watches become so expensive!)
- Vid Hubble 'scope scans 200,000-ton chunky crumble conundrum
- Bugger the jetpack, where's my 21st-century Psion?
- Google offers up its own Googlers in cloud channel chumship trawl
- Interview Global Warming IS REAL, argues sceptic mathematician - it just isn't THERMAGEDDON
- Apple to grieving sons: NO, you cannot have access to your dead mum's iPad