Take coal and oil out of the ground and fill the voids with sea water. All problems completely solved.
1073 posts • joined 15 Jun 2007
Some parts of CA still have water. I could pound a pipe down into my back yard and suck water out of it. Problem is, CA is 770 miles long and 250 miles wide with areas so dry that the forests are dead and burning down. Water conservation and desalinization won't change that. There's no statewide network of pipes that runs like an electric grid.
The strict water conservation efforts are about not sucking salt from the ground in remote areas using wells. For areas that do have water, there's moderate conservation just in case the drought continues for a few more years.
They have master keys?
I've never seen a TSA approved lock that didn't break when dropped on the ground.
Re: I study real mobile traffic in great detail in my day job.
ISPs commonly host third party edge cache servers. This greatly speeds up web pages that are heavily loaded with CSS, JS, and static images that block the initial layout. Software updates and streaming video are commonly hosted there too, which takes a big load off the ISP's pipes.
Getting this to work at or beyond cell towers needs new technology. Heavyweight HTTPS encryption is used to protect static data when all you really want is tamper resistance to stop malware injection. If there was a third option, like a digital signature, then caching would be possible without adding any additional crypto steps. Such caching could use small tower caches or even neighboring cell phones.
Electroplate your leg with gold. (Hang on tight, this might tingle a little.)
At what point is it no longer "hacking"
How open does a system need to be before it's no longer "hacking" to use it? Let us say that you have a big pile of money in your house next to a window. Breaking the window and stealing the money is illegal. Finding that the door is unlocked and stealing the money is still illegal. But maybe there's no house and no fence but just a pile of money with a "free money" sign along sidewalk. That's what I think of when this bug happens.
So, you're not saying that they're ALL fake
Computer geeks know that one-in-a-billion events happen frequently.
Re: About Time
What's replacement? PHP, Ruby, and Python have lightning fast development for small projects but their weak typing makes large projects a nightmare. Golang too often feels like an ancient language with a fresh coat of paint. C++11 and Java handle big apps well, but differently enough that I wouldn't want to be stuck with just one of them.
Only the one Apple way
The scary thing about iPhones is that they're extremely expensive and there's never a Plan B. Got a bug? No workaround. WebKit crashing? No workaround. 0-day? Maybe you can wait for an update to come out or maybe the upgrade is nothing less than buying a new phone.
Android OSes tend to be lower in quality but there's always a workaround for major problems. It's essentially a fancy little Linux computer so you can swap the OS and apps without much hassle. Some phone makers let you download chip firmware too, so if the shiny new 2.x doesn't work you can go back to the old reliable 1.x.
Kidnapper van for nerds?
The same IQ as 9000 PE teachers
We disagree with the stolen documents calling us hackers
GFYS. I have to firewall your government networks because the dictionary attacks drain my Internet bandwidth. You intentionally place false information in APNIC contacts. Finding a .cn domain registered with anything more accurate than "12323545 asdf 00000" is like winning the lottery. From all appearances, it seems like you host cybercrime with great pride.
Cloud development environments let you concentrate on the important part
That would be tracing, translating, and debugging RPCs. You haven't experienced "cloud" computing until you've dealt with fixed length RPCs using binary records, SOAP, Java RMI, JSON REST, Protocol Buffers, and my favorite of "I wrote this one night while drunk" which is usually some form of "put the file here then wait for a new file there."
1990 supercar came floppy disks in the glovebox
Those article photos - What photo editor still does nearest neighbor resampling and two passes of one dimensional sharpening?
So besides peak acceleration, how else is the car fast? I got new A3 2.0 Turbo as a loaner car recently. Extreme turbo lag, messy automatic shifting, and poor visibility made it anything but fun to drive. It was more like budget car that would rocket forwards after holding down the gas pedal for 1.5 seconds. Turbo boosted boring.
I'll stick with my aging 2007 A3 3.2 Quattro S-Line. The paint is peeling but it drives like an angry beast.
I stab them a few times with a diamond point slate bar. It's fast, no fuss, and it causes the platter surface to wrinkle up. Just mind your toes.
"work a little bit harder to find and spoof your email address"
A pretty good guess is that it's the same e-mail address the public records part of the domain registration. If I was going to register a billion dollar domain, I'd do it with a registrar that does more than check the "From" address in an e-mail before accepting major changes.
Yawn, another cloud camera
I have a couple of the Axis IP cameras. There's very capable Linux system and microSD slot on board so nothing but PoE electricity is needed to make it run. No cloud computers, no Internet, no privacy problems, and no subscription needed for all the usual surveillance features. It can write to CIFS, FTP, SMTP, and central monitoring systems out of the box. You're free to log into the camera to install more software. Point it to a big NAS and you can keep as much continuous video as you'd like.
The downside is the initial cost but there's a long-term win in that it has no subscription fees and it's unlikely to need upgrading for a very long time.
Re: SD or SSD
I went back to the original PR and couldn't find any info on how they're stacking the storage. Other articles seem to indicate that this is 48 layers per chip. That sounds crazy, but I guess no more crazy than the current microSD process of grinding chips down to nearly nothing and stacking them.
ICANN really isn't all that big. Many countries have their own two-letter TLD that completely defy ICANN regulations requiring legitimate record keeping, transparency, and honoring of trademarks. ICANN's only power is in the general TLDs .com, .org, and .net. At worst, Google or Microsoft could manage those for free without being subject to any politics because the data mining value would dwarf all else. Doing a little better, these could be managed by public software and repositories. No matter who takes it over, learning how to trust sources of information is going to take some time to sort out.
There should be plenty of tantalum for chips since MLCC have done a very nice job of making tantalum capacitors obsolete. Hopefully the chips don't have a nearby oxidant that made the caps prone to exploding.
Re: can I add SD card?
Hardware buddy Oppo makes the high-end version with the high-end price. On those, one slot of the dual SIM tray may hold a microSD card.
As much as I distrust Microsoft, having them help fund Cyanogen is probably the best way to wrestle OS control away from carriers that have no intention of updating phones. Cyanogenmod is lacking stability and usability in many ways, but at least it's always making progress.
That's a hack too
Yes, that social engineering is still a hack. There should not be any kind of password sharing - EVER. Secure systems exclusively use personal authentication and privileges. That makes "never give your password to anyone" rules easy to follow. It funnels the creation of new authentication and privileges through people or teams that know how to go about it securely.
Law not a problem
So how do you take down drones? Ram them over with an aircraft so heavily loaded that it's barely airborne? No. Firing a shotgun over a evacuees and teams of firefighters? No. Jamming radios? No. Maybe starch fiber grenades to tangle small propellers?
The company making self-driving cars happens to employ the largest pool of people who don't know how, and don't care how, to drive. It's amazing that swarms of motorcycle cops don't hang out there. I don't know if Google and LinkedIn make "donations" to the police, but 50 traffic violations per minute per intersection sounds like a lot of money.
I admit that I have a few MP3s from Amazon with squeals and a few AACs from iTunes with fuzziness, but saying that's worse than 8-track, AM, FM, or cassette is ludicrous.
8-track : Like telephone hold music but in stereo, a complex tape path designed to add fluttering effects, and CLICK-THUMP right in the middle of a song.
Cassette : Full frequency response range if your head azimuth exactly matches the recording head azimuth, choice of bad SNR (Dolby off) or bad fluttering (Dolby on), and increasing fluttering with age.
FM : Pretty good frequency response, massive dynamic range compression, dynamic range limiting to keep receiver IF and DEMUX PLLs working, amplitude pumping, and dropouts.
AM : WTF
Re: Nice to see....
Andrew's article is more correct. CloudFlare states that they won't take down sites until a court order demands it. My personal experience with them backs that up. That makes them a popular edge cache and anonymizer for online criminals. As others do, I occasionally post lists of CloudFlare's criminal customers to their Facebook page. CloudFlare was creepy enough to e-mail my wife multiple times, telling her that I should stop posting.
Security is straightforward and no more complex than the system it's on. Lots of web pages say how to do it.
The hard part is justifying the time for it. The simple setup of a good firewall and strong LAN passwords is an impenetrable barrier only until somebody opens a well crafted e-mail on their workstation.
Re: Worst Case Scenario, Really?
Somebody wasting their time hacking my WiFi and LAN all day would not be so bad. I'd probably notice it and power everything off before it finished. iCloud integration possibly enables silently hacking millions of devices at once and then selling access to anyone on demand. Just search the Internet for "icloud hacked" if you're not worried yet. At the very least, iCloud seems easy to knock offline.
I don't recommend anyone enter my house using a brick. The dog won't like it.
Apple's landfill chip
This all sounded good until the iCloud part. That's an unacceptable instability, unacceptable risk of leaked personal information, unacceptable planned obsolescence, and unacceptable single point of attack for all HomeKit devices. The irony is that entirely depending on iCloud makes them exactly the opposite of cloud devices. This is classic client-server pairing with a proprietary protocol. There will come a day when Apple says your HomeKit devices are no longer supported - maybe before the warranties are up.
GOOD NEWS from email@example.com
How about all the 419 scammers, phishers, and counterfeit product spammers using Google for some kind of hosting? Microsoft has done an excellent job of kicking them off their network and Yahoo is mostly dead so that leaves Google as the easily exploitable online service with no functional abuse contact.
Re: Why isn't theregister available over IPv6?
CloudFlare is self-proclaimed bulletproof service provider. That really puts a dent in connectivity and reliability rankings.
Have you got anything without spam?
Amazon and Netflix not only offer alternative products to a search that returned no results, but return related searches that also produce only alternative products. Search for "WaffleWidget" and it returns results for "SpamWidget" plus a recommendation to search for "WaffleWidget Deluxe." Right, the deluxe one is it. Of course the search for "WaffleWidget Deluxe" returns results for "SpamWidget Spam Spam Deux" plus a similarly futile suggestion to search for "WaffleWidget 2016." I can definitely see companies getting just as irritated as customers about the brand mixing.
Nobody is forcing anyone to use T-Mobile. There's no contract.
Hey, Sprint. You owe me $2000 for that two year contract where you sold me a defective Galaxy S2, put me on a "4G" WiMax band that didn't work, and then said there was nothing you could do about the phone crashing or the 4G being somewhere between zero and 16 Kbps. I'll start believing you when the check arrives in the mail.
If you're in the heart of Silicon Valley, this might be your key freeing yourself from Comcast "up to" speeds and AT&T "don't care" speeds. Maybe it's fast enough to stream a movie.
Re: for Mac Pro owners
I could say "Apple should support their computers longer" but that's not the real issue. Those 10.6 Macs are really old. It's that MacOS gets progressively slower with each release and the hardware hasn't made any great leaps in performance. It makes a 3000+ USD hardware upgrade difficult to justify.
Re: 25 MPH?
It's 50% under the posted speed during 9-to-5 commutes and 25% over otherwise. Along the border of those two states is lots of honking, swerving, finger waving, and bumping.
Urban expressways like shown are 35 to 50 MPH. I'm guessing that photo is a 35 MPH zone of San Antonio Rd passing over Central Expressway and Caltrain. Only a handful of downtown and residential streets are 25 MPH or less. Urban expressways forbid parking during business hours so that bicycle commuters traveling at 15 to 22 MPH rarely need to mix with traffic. I don't think a 25 MPH car is going to make many friends.
Stereo optical control?
Just how smart is this system? Can simple 3D tricks like lenticular prints fool it into slamming on the brakes?
Re: Who the hell uses Java nowadays?
Java is still used heavily for server software, software development tools, and mobile apps. It's an excellent language when used properly.
I suspect that Yahoo is targeting the 4 or 5 people who install the the browser Applet plugin because some porn malware asked them to. Bundling this junk with the bare runtime or JDK tools would hasten the death of Oracle too.
I never witnessed any city-scale free WiFi working, including Google's free WiFi in their hometown of Mountain View. You can't throw a bunch of repeaters on lamp posts and call it done. Too many laptops are infected with malware that will saturate the network. While Google loves calling out 0day exploits in other products, they're deaf to reports of their own products being abused.
I can think of no nightmare worse than hand-wiring 14000 of the TO-92 transistors pictured. They wiggle around unless you bend the leads, and bending the leads causes solder bridges. After all that, you'll find that one is in backwards and the slightly bent leads have anchored it down with such incredible strength that molten solder spatters everywhere when you pull it out.
Much like supercars, people who can afford these are often too old to fully enjoy their performance. Even if the amp doesn't cost too much, buying a quality speaker set breaks the bank.
You can buy adhesive "Pyrolytic Graphite" sheets for large sums of money. It's a flexible, lightweight, graphene-like material that conducts heat incredibly well. Cellphones sometimes have a strip of it down the back so the CPU and GPU chips don't burn your hand. Ultra-compact switching power supplies use it to cool components that are spaced closer together than normally possible.
Zooming in closer, closer, closer
Is that Pascal?
Lots of banks have this stupid issue too. Enter e-mail address and bad password about 5 times and your victim is locked out.
CHINANET hasn't had a working abuse contact in something like 16 years, so of course China would know nothing of the non-stop attacks coming from that government network.
Sick because of connectivity
Everyone who needs to be online in a significant way should have their own private cloud. It's cheaper for baseline loads and easier to maintain. The big downside is trying to get fiber optic links in the US. There's no public infrastructure so you're hiring a telco to dig a trench through the streets just for you. Want a new telco? That's another trench. Maybe you can get point-to-point wireless if you're the tallest building.
Re: Good idea
Fortunately, my washing machine has never refused to wash new clothes without an upgrade. There are definitely people who like tinkering with their appliances. If you're on a budget or like retro styling, and like to tinker, upgrading aging AV equipment is for you.
Google puts Android on a diet, names it after the first thing it sees under the sink ... yes, Brillo
Single point of disaster
I see "cloud" in there and stop reading. There are so many reasons to never connect a home and personal devices to one big corporate owned "cloud."
One good hacker and one good bug can cause widespread physical damage - fires, floods, appliance damage, burglary assistance, stalking, etc.
It's a single point of failure when the corporation has a problem.
It's a single point of obsolescence when the corporation decides that you're not worth bug fixes anymore.
Finally, it's really about collecting personal information and using it to manipulate how you spend money.