571 posts • joined 15 Jun 2007
Re: Bad written software = old versions needed = vulnerable systems
The performance tuning is different in each version of Java. For example, String.substring() was changed in Java 7 to perform very differently. That's an extremely heavily used method and the change is not welcome to many. Parsers need to stop using the String class to regain performance! Another resistance to change is that it has usually taken several years for each new Java GC to be free of critical bugs on extremely large applications.
My plan for success in the US government
1) Buy hundreds of enterprise grade routers and pocket sales commission
2) Legislate local telcos out of business to eliminate interference
3) Auction off vague but exclusive telco contract for highest bribe, um, I mean commission
4) Create expensive contracting agencies to oversee progress
5) Drain local subsidies of all funds to cover "unforeseen problems" and "regulations"
6) Say it's "almost done" and ask voters for more money
7) Leave town and repeat in another state
Ah, now I know why Silicon Valley traffic lights are possibly the worst in the world. Only in Santa Clara county will 90% of your time on the road be spent at red lights for intersections with no traffic flowing. It's to give you a few minutes to play with the car tech at every intersection.
Do the prom clothes still fit?
Apple's surge of innovation in phone tech is gone and it no longer justifies the strict rules for sellers and developers. While others are trying to make phones with the smarts of both an iPhone and a desktop computer, Apple is working on making desktop computers dumber like iPhones. Apple is still celebrating the glory of an event long gone while forgetting to tend to the present.
Cooperative duopolies wrk grt in US. (Keep post shrt so uplds faster)
Re: Why the Internet clusterfucks
Another month, another research paper promising to save us from TCP. How refreshing it would be to see a research paper instead showing that new tuning algorithms don't work outside a carefully controlled test. Here are your input parameters: Ack packets, data packets. Here are your output parameters: Data packet rate, data packet size, Ack packets. That's all it comes down to. There's absolutely no way for those input parameters to indicate which output parameter is the bottleneck. You can set up a slow guess-and-check feedback loop but the required solution changes too quickly for that. Unless your OS is many years old, TCP already knows all the tricks that work. UDP is also no cure for handshake latency and TCP sessions. To not have a handshake means that hackers can request that extremely large payloads be delivered to forged addresses. QUIC requires an initial handshake and session, just like a long-running TCP connection, for security.
Honestly, the best way to speed up web pages is to block advertisers and web bugs. Google is the problem, not the solution.
There, fixed that low disk space issue!
Re: Optical archival system - where to buy from?
Data on spinning rust can be safe forever. I still have my files from a 1989 hard disk, and even a few from a 1983 5.25 floppy. Keep feeding the Drobo new drives to replace failing drives. Keep a second copy to protect against Drobo failures and human errors.
Efficiently sending TV over the Internet is no technical challenge as existing regional distribution boxes could have proxy or multicast hardware put in them. The challenge, especially in the US, is all the greedy fingers that want a cut of the money. Toll trolls can't do anything about over-the-air TV because it's direct and uninterruptible. Cable TV suffers channel outages as the media company owning the wires battles the media company owning the programs for more money. Now imagine every ISP, from mega media corp to mom'n'pop, installing a hierarchy of simple TV proxy boxes. Toll trolls would have a feeding frenzy. You'd end up with such a ludicrous mess of DRM, activation dongles, usage tracking, ad injection, and fees that it would never work.
But there's an elephant in the room, crapping on the carpet
There's public backlash against government spying and all I hear politicians saying is how hard they're working to punish the whistleblower. Diane Feinstein's buddy Nancy Pelosi keeps saying that it's all about the economy. How much money does all that illegal spying cost? I'm guessing it's enough money to give every US citizen fast Internet, cleaner energy, and a good education.
And so commences the death of Oracle. "It's too hard to get support for it," businesses will say.
Re: Just what the world needs …
What's odd about Microsoft is that they're designing a new language syntax. There's really no need for that. They could recycle C++ or Java syntax but supply it with web-specific runtime libraries rather than the sprawling and insecure ones used for applications.
It seems like when you're at the point of 30 megagram cables you want the elevator to instead climb a track. The lack of a counter weight would be a lesser disadvantage than the inertial mass of so much cabling.
What if you cut back the water, blend it until the proteins get sticky, mix in a bit of baking powder, and cook it in a skillet?
Re: Hot Mac Pro?
I was thinking of a HEPA filter attachment for allergy free computing.
Revenge of the Mac Cube
That new Mac Pro won't be so sleek when it's surrounded by a tangle of data cables, accessory boxes with noisy fans and blinking lights, power cables, power bricks, and everything else. A large silver box with lots of internal slots seems very elegant now, doesn't it? The power button is on the wrong side too. This would be a kick-ass Mac Mini but it's a total failure as a Mac Pro.
Still can't turn off the destructive Auto Save "feature". I see no mention of improving the sluggish old HFS+ filesystem codebase. That's not so Maverick.
Record this, NSA : I'd like to see a lot of the government in jail with no retroactive immunity.
RAIDing the workforce
Layoffs can't be too bad. Surely they're keeping at least one in five employees redundant.
One bar of death
Ha! Now employees can experience the overheating, crashing, radio malfunctions, nonsense roaming warnings, and circuit crosstalk gremlins in their phones when the signal is weak.
In addition to obvious points about Softbank not being Chinese, hackers would want a much faster network.
Can't be any worse
"My new wireless access point was delivered sounding like a box of rocks and bits of broken plastic are falling out the vents. I need a new one shipped with some padding."
"Thank you. Who is your internet service provider?"
H840 revision 2 would shorten nicely to "Hate 42".
No PIN is needed. Most ATM cards also work as credit cards, and retailers don't need to perform any security checks on credit cards if they're willing to pay high transaction fees.
The catch is in the contract worth $2000 - $3000 that's bound to the phone. The telco asks you to keep paying even if the phone they gave you is incapable of functioning. The telco and manufacturer are well defensed against continuous warranty repair claims. They keep your phone for two weeks each time and send it back as "operating as expected" while you keep paying the contract. The other option is legally fighting the contract. Nobody wants to risk that on a Facebook phone. (And why I will never buy from Sprint or Samsung again)
IKEA furniture bot
Wait for motion to stop
Re: A similar argument applies to Time Travel - if it were possible, they'd already have visited.
Time travel would be possible with infinite computational power. Traveling back in time would be a matter of examining the state of the universe, reversing its path in a virtual environment, and then entering that environment or overwriting the present with it. Altering the present from the past would be calculating what changes a past event would have and then applying them in the present. Altering the future would be predicting what changes would be needed to arrive there and applying them in the present. You could argue that it's not really time travel but, if done well enough, there'd be no way to know the difference. Extremely narrowly scoped examples can already been seen on the Internet, in history books, the financial market, and in good brain washing. The scope of such hacking will increase over time.
NSA DEBUTS 'DIGITAL LIFE' ROBO-HOME AND SECURITY TECH
There. Fixed the title for you.
Manufacturing is driving costs too. An LED's layers are built at very high temperature so a big chip would warp and crack when cooled. This limits production to small sizes on synthetic sapphire. I suspect that one reason that the US DOE is looking specifically at higher intensities is for using LEDs to pump lasers.
Re: Great firewall of China
Unfortunately, large countries with well maintained networks must also use APNIC allocations. Blocking the constant stream of intrusion attempts from China, Korea, and Taiwan isn't as simple as adding a bunch of /8 CIDRs. Australia, New Zealand, and Japan should tell APNIC to get their crap together and release all of those giant IPv4 blocks with invalid registrations. Electronic intrusions and espionage attempts would drop instantly.
If you can't create tech, criticize it
1) Set all plugins to "on demand" so they don't execute unless you click them.
2) Don't click them unless you know what you're running.
Most effects are seldom noticed because the battery stays within normal tolerances. I've found that the charge history has the biggest impact when running the batteries at high currents. It's not always the classical memory effect, but how material in the battery packs together or crystalizes. For example, a NiCd race car battery that has been partially discharged, idled, and then slowly recharged puts out maybe 1/3 the current of one that was run dead and rapidly recharged immediately before use. SLAs have similar issues with how the sponge lead forms. Finding documentation on this is tough and experimenting on lithium batteries means destroying them (and maybe other things nearby).
Re: TicketMaster "Ticketfast" Charges
£2.50 sounds like a bargain. US Ticketbastard fees are commonly 50% the ticket price, even for expensive events. Disgust and lack of a box office keeps me away from most concerts.
Pics or it didn't happen
Instead, use buggy routers not yet known to be buggy
This is another case of the government outlawing a symptom rather than a cause. Rather than mandate quality and security reviews, one they have outlawed one company known to make easily exploitable hardware. With this stupid mentality, the winner will be the least tested manufacturer.
Korea's networks have always been a mess of infected machines and botnets. My bet is that a few C&C servers for those bots were hacked and provided with self-destruct code; all the dead machines were bots. If so, thumbs up to whoever did it. My firewall logs just got a lot shorter.
This is great news. Now AT&T can provide slow and overpriced Internet & TV bundles to 400 times as many people.
The other kind of taking back
What happens when you buy one of these devices and then the whitespace becomes used up? Maps for urban areas show TV frequency usage is nearly complete. Is the device returnable, bricked and useless, or do people hack it to trample licensed frequencies?
I use a rooftop antenna for TV and I'll probably have to buy Internet from a point-to-point wireless service. Comcast and AT&T won't deliver decent service by wires but the regional geography works well for wireless. I worry about what happens when these devices get hacked to use spectrum that isn't available.
Sample aliasing creates a huge amount of noise. A fast 8 bit DAC is more accurate than a slower 14 bit DAC for high frequencies. That 3.1mW power draw, if correct, is amazing.
RF DACs don't need many bits because they're usually receiving very noisy signals. If you took a very snowy analog TV image and converted it to a 256 color PNG, it would look pretty much the same.
I've always considered PayPal to be unsafe for transactions because it's lacking consumer protections. Partnering with a good solid system like Facebook solves all of that.
Re: More critical reading is needed
Try reporting hacking incidents and it's clear that the Chinese government is all for it. To start with, the network contacts for Chinanet and many of the Chinese schools have been fake for about a decade.
South Korea and Taiwan are probably involved too. Maybe not directly or intentionally, but they have incredible numbers of bots that are constantly hacking away at every IP address on the Internet. As with China, the network contacts for HiNet (Chunghwa Telecom) and KORNET (KT Corporation) are not functional.
So they've never heard of local buffering? They're probably sending 2Mbps - not a big deal to dump into flash.
"But to use the malware removal tool you have to install Java and this is perhaps not the best idea especially since the language has become a prime target for hacking attacks of late, as Sean Sullivan of security software firm F-Secure notes."
Install Java but don't enable the browser applet plugin. Java by itself is no danger.
Re: Explicit Kill Switch
All cars should have a mechanical handbrake that kills the ABS power when lifted. It's not such a large kill switch to unsafely disable the car but it's enough to stop when the electronics are malfunctioning. (I've been in Cavalier with crap electronics. If the ABS says you can't use the brakes then you really can't use the brakes. The pedal pops up with more force than even the pedal can withstand.)
I looked at the PDF briefly (as fast as it could scroll) but didn't see how this relates to humans. Perhaps The Reg could bring out the Playmobil set for those of us with a short attention span?
Re: Glass platter
I opened up some of those IBM "Death Star" drives and I recall the platters being incredibly strong and more flexible than aluminum.
Yet another bad research paper
I don't think I've ever seen TCP run at 1/30 efficiency except when selective ACK is off and hardware is failing. Making my ADSL2 or WiMAX connection 30x faster would break the known laws of physics for crappy telcos. I could turn down the ADSL S/N ratio until I'm burning away my all FEC bits and I'd only get 1.2x throughput. Maybe they mean that their protocol has 1/30 the latency of TCP on a network that's heavily congested with TCP traffic? If they've come up with a super-polite traffic-avoiding network protocol then they can expect people to tune it to be greedy like TCP.
Not in the clouds but the sand
Hopefully this fourth wave finally drags Yahoo out to sea and buries it. They're a vast digital ghost town of run down services with no inhabitants. Their web portal is a complete wreck of ad content that hijacks the page layout. It won't load reliably without an ad blocker yet links don't work with one. How is this same portal is going to safely collect data to build an "interest graph?" I see maybe two Yahoo e-mail addresses a year that aren't a 419 scam, phishing scam, or spam from yet another person with a stolen Yahoo account. The ROI of firing the anti-abuse staff should be clear now.
My smart meter is useless for finding ways to save energy. What works much better is going around the house with a handheld infrared thermometer. One big warm spot traced to an Onkyo slave amp that was consuming 150W in standby mode. Some wall warts were running hot enough to justify replacements. I also know where the insulation has fallen off from under the floor.
Hash before encryption is it. Nobody will know what is in your original and personally created data but the hash matches will allow for reverse lookup of known files. Very small files could be brute-force decoded. It's not great privacy.
Big hashes do create false positives sometimes so there can be data loss. Sure, it's a chance of 1 in an nearly infinitely big number, but the amount of data in the world is nearly infinite too. Math says that a smaller number of bits can't represent all the patterns of a larger number of bits.
- Vid Hubble 'scope scans 200000 ton CHUNKY CRUMBLE ENIGMA
- Google offers up its own Googlers in cloud channel chumship trawl
- Bugger the jetpack, where's my 21st-century Psion?
- Interview Global Warming IS REAL, argues sceptic mathematician - it just isn't THERMAGEDDON
- Apple to grieving sons: NO, you cannot have access to your dead mum's iPad