It's all a show to keep the team players happy. Maybe Musk has been hanging with Legere.
996 posts • joined 15 Jun 2007
Not so many, really
There really aren't very many cameras sold on Amazon. Most of them are the same handful of cameras rebranded over and and over. Even companies that you'd expect to actually make cameras are sticking their label on something else.
This turned out to be extremely frustrating when I was looking for a security camera. Those few cameras have completely garbage firmware running under a patchwork of open source Linux software that somebody likely found on a sketchy FTP site 10 years ago. I'd open the box of a brand new camera and realize it was the same as the old camera. Default login won't stay off, pages not checking authentication, and much easier to crash than to keep running. I eventually started asking companies to send me sample videos so I could compare headers.
I'm guessing that TRENDnet was the vendor that said they have no idea what to do. Their TV-IP310PI is a defective Hikvision camera that they can't support. Other models may be similar.
Google Play Store is a malware wasteland
I consider it great luck when I find something in Google's Play Store that isn't malware. Google doesn't take abuse reports seriously, if at all, and they still require G+ signup to rate apps. The author of the software might have good intentions but it's hooked up to an ad service that hijacks the app. First launch shows "This application needs an update for media library v2" or "This application is no longer supported. Please use the current version." then starts installing more crap if you don't decline or uninstall. That's followed by endless half-assed phishing ads like "This iPhone is infected. Click here to repair."
Remember the good old days when humans were customers rather than marketing targets?
Re: Google has also sought to make the Google Now virtual assistant more prevalent with Marshmallow
Google is the new evil carrier that throws gigabytes of battery draining shovelware onto your phone. I wouldn't recommend their customized OS any more than one from a telco. Third party AOSP builds are nicely trimmed down.
Is this to streamline creating those spams that redirect through Cake Marketing/Rackspace then land on an Amazon hosted phishing site? It looks like it was a lot of effort to create them yet I get many per week. The next product can sell templates for the usual fake store fronts - pharmacy, company, solar installer, courthouse, package delivery, photo sharing, etc.
Re: Customer Disservice
Service was always prompt for me. I'd bring the phone to their store with a problem and then they'd return it minutes later saying, "We erased everything and did a factory reset so it's probably fixed now. Bring it in again if it has more problems." I bet they proudly displayed statistics showing that people rarely returned with a problem after the first service.
Re: Nice video.
Good catch! The back side of the tail wasn't blurred to match the low quality camera and the mask is slightly misaligned.
Re: Biiiiiig data
Marketing-centric retail is hard. They likely very prices for each item based on many static and dynamic factors. That results in an enormous and ever-growing hidden catalog to support a consistent experience each customer. They'd also be recording as much tracking data as possible for "customer retention" programs and marketing pattern analysis. Throw on top of that millions of single-use coupons, reusable promo codes, customer-to-customer recommendations, gift cards, billing information, and hopefully some fat crypto. Now it's getting to be a big database.
So what does Oracle, owner and destroyer of Java, think of this? Anyone checked the height of Larry's fountain at HQ?
Checking my Silicon Valley address...
Across the street from new LinkedIn, Apple, and Google campuses, AT&T is offering 3 Mbps to compete with Comcast's 0 to 150 Mbps. For those not satisfied with having just AT&T and Comcast to choose from, there are two other internet companies that can resell those same connections at much higher prices.
Re: Still don't want Chinese Kit!
As an owner of an Chinese phone, I can assure you that the OEM software is not sending your personal data to China. It's sending all of your minute-by-minute personal details Google, like every other stock Android phone. The good news is that the Chinese phone makers let you replace the stock OS with one having a bit of privacy and decency built in.
White LEDs are inefficient when hot but they're hardly hurt by it. I overloaded some to test what would happen if their regulator failed. Over and over again, the LEDs would unsolder themselves before suffering any noticeable harm.
My guess is that the phone is protected with PTC fuses - little components that stop conducting while hot. They can protect against wire fire, battery damage, and overheating due to software malfunction. The downside is that they aren't a good match for modern heat tolerant components. They'd have a very downgraded current threshold in a phone.
The biggest problem with cheap high-spec phones is the lack of LTE bands. Most of them have two sets of two or three diverse bands to choose from, with hopefully one set having one band that is used in your region. The OnePlus Two is better than average in this respect. I count 8 LTE bands in the North American model.
"cable was too short to reach the socket"
The perfect metaphor for this design show.
Re: Has anyone got any real details?
Modern cars tend try to run the engine at heavy acceleration as much as possible for efficiency. The gas pedal modulates the transmission to use the highest gear possible for the desired power. Extra RPM is extra friction and extra exhaust. This has been the only trick left after already optimizing combustion, accessory loads, tires, transmission, aerodynamics, etc. This is also why modern AT cars have such terrible acceleration lag. The engine is already near maximum torque so you must wait for a gear change.
The old days of Skype
Modern cell phones can do text messaging, voice calls, and they're starting to get video chat. My cell provider does cheaper International calls for $10/month. My landline is toll-free to much of the world and has better rates than Skype when there's a fee. Best of all, none of the non-Skype solutions will seize your account balance due to "fraud" when you make a call from a foreign country.
I don't think you can call it a cloud if it's all in one datacenter. That's just called a "datacenter".
Maybe in trouble
NOx is nasty stuff. It eats through engine parts, sidewalks, sculptures, buildings, soil, eyes, lungs, wildlife, and pretty much everything else. The trick will be for VW to fix the emissions without a class action lawsuit for the car no longer meeting advertised specifications. If VW was running the combustion chamber extra hot to meet soot regulations, then they're definitely facing a technical nightmare at this point.
The path off MacOS
I have an original "Mac Mini Server" running MacOS 10.6. I know that an Apple upgrade will destroy every single configuration it has so the logical choice is a new Linux box. This nice set of instructions will probably shave a few hours off setup when that happens.
Solid 7Mbps ADSL or 0-75 Mbps from Cable?
I'm sure it will make my 3Mbps video streams really come to life. (as long as I'm not getting an e-mail at the same time)
And the music player
At least in CM12.1, you can crash the lock screen if a song is playing. Just hammer all of the mini player's buttons as fast as you can until the OOM killer makes a visit or things start to crash.
Re: Next up
Somewhere there's a big database of every link ever found in a private message, and I'm betting that it's pretty easy to get other people's original URLs back out. Each recipient who clicks a shortened link is going to generate an access log entry. That's how it's not even remotely private.
They could get around this by not substituting the entire URL. Just substitute the domain and throw the rest after a '#'. A sent URL of "http://some.domain/private/secret/mystuff" becomes "https://t.co/domaincode/#private/secret/mystuff" when received. The part after the '#' anchor delimiter is never sent to servers by browsers but Twitter could return a document that can see it and reconstruct the original URL. Advertising metrics would be reduced but not entirely lost.
Take coal and oil out of the ground and fill the voids with sea water. All problems completely solved.
Some parts of CA still have water. I could pound a pipe down into my back yard and suck water out of it. Problem is, CA is 770 miles long and 250 miles wide with areas so dry that the forests are dead and burning down. Water conservation and desalinization won't change that. There's no statewide network of pipes that runs like an electric grid.
The strict water conservation efforts are about not sucking salt from the ground in remote areas using wells. For areas that do have water, there's moderate conservation just in case the drought continues for a few more years.
They have master keys?
I've never seen a TSA approved lock that didn't break when dropped on the ground.
Re: I study real mobile traffic in great detail in my day job.
ISPs commonly host third party edge cache servers. This greatly speeds up web pages that are heavily loaded with CSS, JS, and static images that block the initial layout. Software updates and streaming video are commonly hosted there too, which takes a big load off the ISP's pipes.
Getting this to work at or beyond cell towers needs new technology. Heavyweight HTTPS encryption is used to protect static data when all you really want is tamper resistance to stop malware injection. If there was a third option, like a digital signature, then caching would be possible without adding any additional crypto steps. Such caching could use small tower caches or even neighboring cell phones.
Electroplate your leg with gold. (Hang on tight, this might tingle a little.)
At what point is it no longer "hacking"
How open does a system need to be before it's no longer "hacking" to use it? Let us say that you have a big pile of money in your house next to a window. Breaking the window and stealing the money is illegal. Finding that the door is unlocked and stealing the money is still illegal. But maybe there's no house and no fence but just a pile of money with a "free money" sign along sidewalk. That's what I think of when this bug happens.
So, you're not saying that they're ALL fake
Computer geeks know that one-in-a-billion events happen frequently.
Re: About Time
What's replacement? PHP, Ruby, and Python have lightning fast development for small projects but their weak typing makes large projects a nightmare. Golang too often feels like an ancient language with a fresh coat of paint. C++11 and Java handle big apps well, but differently enough that I wouldn't want to be stuck with just one of them.
Only the one Apple way
The scary thing about iPhones is that they're extremely expensive and there's never a Plan B. Got a bug? No workaround. WebKit crashing? No workaround. 0-day? Maybe you can wait for an update to come out or maybe the upgrade is nothing less than buying a new phone.
Android OSes tend to be lower in quality but there's always a workaround for major problems. It's essentially a fancy little Linux computer so you can swap the OS and apps without much hassle. Some phone makers let you download chip firmware too, so if the shiny new 2.x doesn't work you can go back to the old reliable 1.x.
Kidnapper van for nerds?
The same IQ as 9000 PE teachers
We disagree with the stolen documents calling us hackers
GFYS. I have to firewall your government networks because the dictionary attacks drain my Internet bandwidth. You intentionally place false information in APNIC contacts. Finding a .cn domain registered with anything more accurate than "12323545 asdf 00000" is like winning the lottery. From all appearances, it seems like you host cybercrime with great pride.
Cloud development environments let you concentrate on the important part
That would be tracing, translating, and debugging RPCs. You haven't experienced "cloud" computing until you've dealt with fixed length RPCs using binary records, SOAP, Java RMI, JSON REST, Protocol Buffers, and my favorite of "I wrote this one night while drunk" which is usually some form of "put the file here then wait for a new file there."
1990 supercar came floppy disks in the glovebox
Those article photos - What photo editor still does nearest neighbor resampling and two passes of one dimensional sharpening?
So besides peak acceleration, how else is the car fast? I got new A3 2.0 Turbo as a loaner car recently. Extreme turbo lag, messy automatic shifting, and poor visibility made it anything but fun to drive. It was more like budget car that would rocket forwards after holding down the gas pedal for 1.5 seconds. Turbo boosted boring.
I'll stick with my aging 2007 A3 3.2 Quattro S-Line. The paint is peeling but it drives like an angry beast.
I stab them a few times with a diamond point slate bar. It's fast, no fuss, and it causes the platter surface to wrinkle up. Just mind your toes.
"work a little bit harder to find and spoof your email address"
A pretty good guess is that it's the same e-mail address the public records part of the domain registration. If I was going to register a billion dollar domain, I'd do it with a registrar that does more than check the "From" address in an e-mail before accepting major changes.
Yawn, another cloud camera
I have a couple of the Axis IP cameras. There's very capable Linux system and microSD slot on board so nothing but PoE electricity is needed to make it run. No cloud computers, no Internet, no privacy problems, and no subscription needed for all the usual surveillance features. It can write to CIFS, FTP, SMTP, and central monitoring systems out of the box. You're free to log into the camera to install more software. Point it to a big NAS and you can keep as much continuous video as you'd like.
The downside is the initial cost but there's a long-term win in that it has no subscription fees and it's unlikely to need upgrading for a very long time.
Re: SD or SSD
I went back to the original PR and couldn't find any info on how they're stacking the storage. Other articles seem to indicate that this is 48 layers per chip. That sounds crazy, but I guess no more crazy than the current microSD process of grinding chips down to nearly nothing and stacking them.
ICANN really isn't all that big. Many countries have their own two-letter TLD that completely defy ICANN regulations requiring legitimate record keeping, transparency, and honoring of trademarks. ICANN's only power is in the general TLDs .com, .org, and .net. At worst, Google or Microsoft could manage those for free without being subject to any politics because the data mining value would dwarf all else. Doing a little better, these could be managed by public software and repositories. No matter who takes it over, learning how to trust sources of information is going to take some time to sort out.
There should be plenty of tantalum for chips since MLCC have done a very nice job of making tantalum capacitors obsolete. Hopefully the chips don't have a nearby oxidant that made the caps prone to exploding.
Re: can I add SD card?
Hardware buddy Oppo makes the high-end version with the high-end price. On those, one slot of the dual SIM tray may hold a microSD card.
As much as I distrust Microsoft, having them help fund Cyanogen is probably the best way to wrestle OS control away from carriers that have no intention of updating phones. Cyanogenmod is lacking stability and usability in many ways, but at least it's always making progress.
That's a hack too
Yes, that social engineering is still a hack. There should not be any kind of password sharing - EVER. Secure systems exclusively use personal authentication and privileges. That makes "never give your password to anyone" rules easy to follow. It funnels the creation of new authentication and privileges through people or teams that know how to go about it securely.
Law not a problem
So how do you take down drones? Ram them over with an aircraft so heavily loaded that it's barely airborne? No. Firing a shotgun over a evacuees and teams of firefighters? No. Jamming radios? No. Maybe starch fiber grenades to tangle small propellers?
The company making self-driving cars happens to employ the largest pool of people who don't know how, and don't care how, to drive. It's amazing that swarms of motorcycle cops don't hang out there. I don't know if Google and LinkedIn make "donations" to the police, but 50 traffic violations per minute per intersection sounds like a lot of money.
I admit that I have a few MP3s from Amazon with squeals and a few AACs from iTunes with fuzziness, but saying that's worse than 8-track, AM, FM, or cassette is ludicrous.
8-track : Like telephone hold music but in stereo, a complex tape path designed to add fluttering effects, and CLICK-THUMP right in the middle of a song.
Cassette : Full frequency response range if your head azimuth exactly matches the recording head azimuth, choice of bad SNR (Dolby off) or bad fluttering (Dolby on), and increasing fluttering with age.
FM : Pretty good frequency response, massive dynamic range compression, dynamic range limiting to keep receiver IF and DEMUX PLLs working, amplitude pumping, and dropouts.
AM : WTF
Re: Nice to see....
Andrew's article is more correct. CloudFlare states that they won't take down sites until a court order demands it. My personal experience with them backs that up. That makes them a popular edge cache and anonymizer for online criminals. As others do, I occasionally post lists of CloudFlare's criminal customers to their Facebook page. CloudFlare was creepy enough to e-mail my wife multiple times, telling her that I should stop posting.