I came here thinking that the Apple Watch was somehow related to the Riker Maneuver.
748 posts • joined 15 Jun 2007
I came here thinking that the Apple Watch was somehow related to the Riker Maneuver.
So... I can check my private security key into GitHub, wait for my computer to get hacked, and then I have a right to spy on GitHub's visitors?
Blu-ray movies are "sold" and you "buy" them. Those are the terms used on the box and the adverts. When they require permission to play, they're technically a lease or a rental. I would hope this technicality bites AACS-LA the same way it did with DIVX. It wouldn't surprise me if China redirects a bit of their DoS bandwidth towards Blu-ray licensing servers.
CloudFlare specializes in keeping sites up, not only against DoS attacks, but against complaints of abuse or illegal activity. Personally, I'd like to see of lot of the company thrown in jail for all the trouble I've had with their customers.
Let me guess, sensor data is uploaded to Google for complex analysis and it is retained for long periods of time as AI training data?
I had to turn on the lights to find them. The capsules are very loose inside the plastic chamber so I expect that one will break if I accidentally drop it.
If you work out the cost per day of shipping, the number is quite small. (And getting smaller. I don't have mine yet.)
I buy music from iTunes because AAC sounds good and the files work on non-Apple devices. I'd buy even more if I didn't need to run that steaming pile of iTunes.
I'd say Apple is attempting lock-in by holding your data hostage to the platform: proprietary file sharing, proprietary filesystem, proprietary RPC, hidden user data, iCloud, patent trolling, and integration of Apple apps into the OS. It's the 1990s all over again. Analysts will predict never-ending growth due to lock-in and then one day customers will stop putting up with it.
Zapping the data lines won't propagate beyond the USB port. A nastier trick would be drawing some to charge the capacitor bank then returning it at extremely high positive voltage. There's an excellent chance of there being a strong diode path allowing the surge to backflow into a common 5V power rail. PTC protectors used for secondary protection are too slow to stop this.
That's a brilliantly refreshing idea. A remote controllable WiFi music player. They could call it something catchy like "SoundBridge" or "Squeezebox." Maybe it could disguise itself as a tabletop clock while it's idle.
I did some checks on current cloud computing offerings and they seem to be better now. The original cloud model of many virtual machines is always a nightmare when it comes to tracking online resources, maintaining uptime, and implementing secure host-to-host communications. That overhead guarantees that every application is bloated, complicated, and dangerously buggy. Newer cloud services offer virtual data centers, which is what you really want for some clusters of related services.
I'm starting to think that CloudFlare is sponsoring articles on The Reg. I don't see any good journalism here to investigate the other things that CloudFlare offers protection against: spam complaints, fraud complaints, and criminal complaints. These services are even stated in CloudFlare's own blog and Facebook page. Check out the comments section for lists of actual customers.
This new "One Jack Mac" is a lot like Trash Can Mac. Minimalist and elegant but needs a whole desk full of cables, gizmos, and peripherals to be useful.
The Java runtime is quite useful and common. Some types of applications are faster to develop in Java or easier to support across diverse platforms.
Insurance companies and the US government are both experts at fee manipulation. I picture both of them gathering greasy, vile, monocle-wearing lawyers and financiers into a dark room, deep underground, around a ancient and worn wooden table to plan the next attack.
"Due to an unexpected technical problem, cashncarrion.co.uk is temporarily unavailable. Please check back in a few minutes – we'll be up and running in no time!"
At how many volts? Come on, only Wired should make mistakes like this.
"electric pedal assist for speeds of up to 25km/h"
That's hardly impressive, and hardly difficult on a normal bike.
This is an issue with telcos locking down phones that they claim they're selling to you. You should never buy a locked phone. You will regret it in 6 months when you've hit a major bug and the telco offers to fix it with a $250 phone swap.
BTW, Apple stops providing security patches to older models too and offers no workaround other than switching to Linux or buying a new computer that isn't actually any faster.
Will Ikea sell Qi hardwood floors to power the Qi furniture, or do you still need to string an extension cord out to the middle of your living room?
Somebody should remind the Ericsson lawyers that Ericsson is in the business of selling cellular base station hardware. There's a lot to consider there, like killing off your own ecosystem or inspiring Sony and GE review old paperwork about Ericsson Mobile Communications.
Yosemite and Mavericks used to have good connotations.
Aw. My post about a certain company, involved with this and other El Reg articles, selling services to both sides of the battle does not seem to pass El Reg moderation.
Complicated? There's just four magical plastic boxes in the engine compartment. Nothing all technical there to go wrong.
This will really kick ass when paired with my 7 Mbps internet connection.
Granting temporary root permission is unfortunately too streamlined. Put up dialog box with a "Continue" button. Wait two seconds. Ask for root. Finger taps "Allow." You could probably improve timing using the camera, gyros, or touchscreen diagnostics to detect motions immediately preceding a touch. A countermeasure could be granting root permission using a gesture that's easy to abort.
If I have Hangouts on my phone, it somehow self-activates at a very annoying time and repeatedly posts notifications asking me to sign in. I quickly solve that by uninstalling it.
Just wait until Sony and Hollywood find out that Samsung is transmitting illegal copies of movie audio every time somebody says, "Hi TV."
I thought Jedis liked to customize their lightsabers. They won't go for a sealed disposable cutting appliance that takes a very long time to turn on.
Big brother Oppo has gone the same way with their ColorOS. Much like big telcos with their custom ROMs, Oppo is angering customers with upgrades that lag by more than a year. AOSP is buggy, ugly, and no easy task to turn into a polished product. You'd think that independent phone makers would be better off donating money and technical support to public AOSP teams to improve custom drivers and themes.
The list of signatures looks like it's from mayors and public utility companies. I'm not seeing any independent providers in there. Unfortunately, I think that mostly says that independent providers don't exist any more.
U16 is a naked chip - solder balls on silicon that is melted face-down to a high precision PCB. It's supposed to be sealed with some black goop after soldering.
They'll be closing their stores in two phases.
Sparsely populated areas can be well served by fixed wireless. Big cities are where big telcos bribe and sue the local governments to eliminate competition. Charging 6 million people $100/month to use decades-old wiring is extremely profitable.
BTW, Kansas City has Google fiber.
The second recall was about them self-detonating so pulling the fuse or wires is no help.
(I have no hate for airbags. Having been in a crap 1988 Tercel during a fender bender, as the car flexed so that my front teeth almost met the steering wheel, I was thinking that a bag of explosive would have been a nice feature. That, and a car that doesn't flex so much. ...and a gas pedal that isn't behind the brake pedal.)
Sucking power from trees to later detect a fire? By driving a giant nail into them? HOW ABOUT USING ENERGY FROM THE FIRE? Is that too obvious? A reservoir of liquid and a turbine. Heat from the fire boils the liquid, drives the turbine, and provides tons of power. It's so good at harvesting power that the circuits will stay nice and cool until the liquid runs out.
I'd appreciate it if they'd hurry up. I'm tired of having to firewall China myself to keep out all the bandwidth-leaching attacks from state run networks that, by policy, publish fake contact information.
Verizon engineers, please write this 1000 times on the whiteboard:
There must never be a user ID parameter in authenticated REST calls. That's what authentication is for.
4K TVs are a gimmick so 15 Mbps should be plenty. With racks of CPUs crunching at it, the video can be compressed using proprietary intelligence that your average freeware on a desktop can't do. This is already being done to cram more channels into a single OTA stream without the P-frame distortion and I-frame flicker you'd expect of such a huge bandwidth deficit. You also have to take into account that smaller pixels in a 4K TV allows for much larger defects to go unnoticed. The MPEG group has gotten quite good at hiding losses in AAC and H.264 so I expect that H.265 will be able to convincingly simulate details without having to faithfully encode them.
There's plenty of bandwidth available in the USA because channels were sized for MPEG2 + AC-3 codecs with tons of error correction. All we need to do is start the 15 year process to free ourselves from the old codecs.
Agile has morphed into a religion backed by big money. Consultants will tell you you're inefficient, preach of miracles, and offer themselves as a guide down the long path to being Agile. Go ahead, find an employed consultant who says otherwise. Most Engineering teams suffer from weak project management so execs welcome change at all costs. In the end it's no different. Agile reduces the chances of having epic project cancellations but the pressure of rapid release cycles and unclear long-term goals instead pushes projects into a slow death of technical debt long before anyone is happy with them. I often say that I prefer a flexible process rather than Agile but it's heresy.
Did the need for a Flash plugin come from Voyager too? I thought Voyager was much older than that.
Maybe things have changed since I last looked at NoSQL... Key-value stores can be used in an ACID manner with just the server-side feature of an atomic conditional update, right? It's the compare-and-swap technique where you build new data and apply it only if its dependencies have not changed, otherwise throw the data out and compute again. It's such a simple operation yet, at least a couple of years ago, conditional updates did not exist. The same technique is used in highly multithreaded code where blocking semaphores can not be used.
I've had Samsung and Sony phones and am now using a Chinese Oppo phone. While Google and Apple are trying to make phone appliances, the Chinese phones are more like a pocket computer. They're more powerful, completely customizable, and they have all the bugs that come with those features. I don't see Chinese phones directly competing with iPhones because they appeal to completely different uses. As the open source community gains access to more brands of powerful unlocked phones, I do expect there to be a surge innovation and new expectations of what a phone can do.
The losers in this game are telcos wanting to force customer lock-in with custom ROMs. The telcos can't keep up with fast-moving releases from Apple, Google, and AOSP maintainers.
Why all this concern with the origin of the hacking? It's probably some bored kids who received a bribe, which they'll later realize is 0.2% of the going rate. Networks need to get serious about shutting down bot armies and unplugging peers who willingly host them. Clean up your network and fix your abuse contacts or get off the Internet. I'm talking to you, Yahoo, EIG, China, Jordan, Taiwan, and Korea. I'm betting that all of these attacks would vanish with a few cables unplugged from the right places, and nobody would notice any side effects except for a huge drop in spam and unauthorized login attempts.
Early reviews of the Z3 series said that rooting it caused advanced firmware to delete itself. The obvious loss was in camera quality. Later models seem to have a permanently locked bootloader to make rooting impossible via normal means. Full instructions are here:
I just had to return my Z3 because the microSD card is read-only except for per-app cache directories. Those cache directories are extremely dangerous for storage because they're erased when an app's data is cleared or the app is removed. With this new phone, my 128GB card was rendered useless for the things that external memory is meant for.
This microSD problem is essentially broken KitKat feature from Google that various phone makers are supporting or rejecting. The Z3 had absolutely no way restoring microSD write access other than waiting for a Lollipop upgrade. The bootloader came permanently locked to prevent custom updates.
I figured a timely Lollipop upgrade wasn't happening with all the issues Sony is having.
I see a slightly more technical article at http://www.theregister.co.uk/2013/07/23/sandisk_takes_the_bics_route_to_3d/ but the operation is still a bit fuzzy. Is it turning each cell into a small vertical bucket brigade?
DSL must be open to third parties. When that openness was mandated, DSL went from being an expensive and poorly maintained service to a moderately expensive and poorly maintained service. AT&T will not fix degraded wires if it only impacts DSL.
This is probably going to work itself out like dietary fads. All the inputs and outputs are misunderstood so conclusions are made from patterns that exist only from unintentional inputs and unintentional measurements.
I doubt that magnetic fields are any more harmful than light or sound. Just keep in mind that moderate levels of light and sound, when modulated in exactly the right way*, does cause illness and death. Any other measurement of light and sound would find that it's usually safe except in high doses.
* Certain frequencies in the tens of Hz range, and possibly Fox News.
I had been receiving lots of spam and dictionary attacks from compromised 1 & 1 hosts until just recently (more than usual).