Has this word now been lost?
Do we now call fishing boats "trollers"?
439 posts • joined 29 Nov 2006
Has this word now been lost?
Do we now call fishing boats "trollers"?
Does anyone know the difference between red and white? Why is white not in the key?
Since our reporter found the walk back up the hill to the car park a bit of a challenge, I guess he didn't explore as far as the Falls Of Clyde (Corra Linn). In the Victorian era, this waterfall was a well known beauty spot with the likes of Wordsworth and Turner visiting and recording their impressions. But then in the 1920s most of the water was diverted into Scotland's first (of many) hydroelectric power stations. I recommend finding out when the power station is shut down for maintenance (a couple of times a year) and the waterfalls are in their natural state. And in the spring, you might get to see peregrine chicks nesting on the opposite cliff; there is a hide with telescopes from which you can view them.
> Wouldn't a far simpler solution be if the door detected say 1000 open
> attempts that it is switches off the receiver for 5 minutes. Make brute
> forcing impractical.
That makes you vulnerable to denial-of-service.
There's a tradeoff between making it harder for someone to steal your car and making it easier for them to lock you out of it.
The desalination plants would presumably be idle in the years when it did rain enough, yet you still have to pay the capital costs. It would be interesting to know what the capital costs would really be.
I think it comes down to this choice:
(a) make other people cut down on water use
(b) do nothing and hope it rains next year
(c) spend money
Normal, i.e. short-sighted, voters will probably choose (a) and (b).
The only other time I've heard of Employee Benefit Trusts was in the context of Rangers football club, who were using them to "pay" their players. There was a major court case with HMRC about this which the club eventually WON (to my surprise). I wonder how/if this Gibralter scheme differs from what Rangers were doing?
FT story: http://www.ft.com/cms/s/0/c53a8272-c25d-11e4-bd9f-00144feab7de.html#axzz3hOpAQKbL
> You shouldn't pay off someone's debts until they have learned the way
> not to just rack up another one
Greece now has a significant primary budget surplus.
The fact that it has a different screen size from most of your users makes it less attractive as a development target.
But having thr same processor is a good thing. This is exactly the opposite of the last iPod, which had the same screen size but a different processor than the corresponding phone.
> ought to have respected established protocol
I fear that in the 99% of cases that we don't hear about, the "respected protocol" is to quietly sell your exploit to the highest bidder.
I can't see anything on the OVH website, not even a press release. Any links anyone?
I also remember visiting in the 80s; I think there was a special bus. It was very impressive, and I still have the souvenir guide!
Isn't TO-2015 a power transistor package?
(The closest I can find is TO-201, which is a coaxial transistor! If you want to waste the rest of your weekend exploring a dinosaur's graveyard of obsolete transistor packages, have a look at https://www.jedec.org/standards-documents/focus/registered-outlines-jep95/transistor-outlines-archive )
> None of which are actually functioning today.
The Manchesterr "Baby" replica in the museum of science and industry is functional. Or was last time I visited.
It's worth noting that when supermarkets run e.g. two-for-one deals, that may be funded by paying the suppliers less. I don't know much about the doughnut industry, but the example in the story might not be entirely accurate.
See e.g. http://www.theguardian.com/environment/2011/jul/02/british-farmers-supermarket-price-wars
You can pick up a punnet of British raspberries – at their best this weekend – on a two-for-one offer in most supermarkets. But as shoppers reach for that quintessential summer treat, they should perhaps ponder the fact that it is the farmer, not the supermarket, who is paying for the generous discount.
> "Clear rules for when and how the Federal government can watch Americans
> from the sky....."
Only Americans, of course. The rest of us can be not only watched but murdered from the sky, and that's just fine.
Having just read the PDF -
- The keychain on iOS is not affected.
- The only thing on iOS that is affected is URL schemes. This has been known forever; anyone can publish an app which claims any URL scheme, so you shouldn't send anything sensitive using them.
OSX has more holes....
That's wrong. It's referring to the amount of free space that you need to do the update from 8 to 9, compared to the amount of free space needed to do the update from 7 to 8.
I'm waiting to learn if this improvement is because 9 will drop compatibility with 32-bit binaries.
> Apple will also require developers to use HTTPS for all network traffic on
> iOS 9 apps
That seems surprising, to say the least....
I mean, what about something like an ssh app?
No, I think someone has got the wrong end of the stick. Anyone know what has actually been announced?
> I must admit that most of that is completely, and I mean
> completely, over my head...
I'm curious. What sort of person reads The Register, but doesn't know where Voyager 2 gets its electric power from? (Isn't that in the GCSE science curriculum?)
Seriously, I may have completely misjudged this site's demographic!
One box near me has been turned into an ATM.
I also wondered if they could be turned into super-loos. (Serious suggestion.) They are clearly a bit too small, but thinking about what visitors to this city centre need pre- and post- busy Saturday evenings, it is cash and urinals.
The "10,000 CPUs shipped" number is very impressive. Where are they all? Not on the $1,500 or $2,500 dev boards that I can buy, surely! Someone - PayPal or someone else - is doing some seriously large scale deployments. Good!
My understanding is that at present 3rd-party watch app's all run on the phone with which the watch is communicating over Bluetooth. So an app that displayed a watch face would need to create the watch face graphic on the phone and transmit it to the watch every second. That would clearly be much worse for battery life (both of the watch and the phone) than a "native" watch face. Maybe this is the reason for the restriction?
Commenting only to say how awful Scribd, on which the linked presentation is stored, seems to be.
I am allowed to view 3 of te 5 pages (on my iPad), at which point I am told that I must download their "free mobile app" in order to read the last two. FUCK YOU SCRIBD. I will not install some app just to view this! Bjarne, is this what you wanted? If not, maybe try Google Docs? Or just host it on your own website FFS!
> Even at British universities, students on Msc & PHD are 'informed' that
> their work at the university belongs to the university and any ideas they
> may have during their time at the uni. also belong to the uni.
That certainly isn't how I remember it. Have a look at the Cambridge rules here, for example:
Scroll down to section 14 for the rules for students, which starts like this:
14. The entitlement to intellectual property rights in material created by a student shall rest with the student, with the following exceptions:
The "lookout" app does not claim to be anything like an anti-virus app.
The "virus barrier" app was apparently a thing that will scan for nasties in e.g. email attachments; it looks like you would choose to "open in..." their app from e.g. the mail app, and it would tell you if it found something matching its signatures. So it is also not an anti-virus product in any conventional sense. Not sure what Apple's objection would be. Have a look at: http://www.intego.com/mac-security-blog/virusbarrier-ios-8-antivirus-malware-scanner-iphone-ipad/ :
"For instance, email is one of the most common sources of malware in iOS. Once you receive an email attachment, before you open the file you could scan it in VirusBarrier to make sure that it is not infected with malware. Here’s how easy it is to scan these files:
Hold your finger over the attachment until the share sheet pops up
In the middle section of the share sheet, select “Open in VirusBarrier”
The VirusBarrier application will open and perform the scan
If no malware is found, you can return to the email and feel safe to open the attachment
If the scan comes up clean and no malware is found, our integrated file reader will open the document for quick and easy viewing, or you can send the file to a remote location, such as Dropbox, for storage.
*All scans must be done manually; automatic scans or real time scanning are not possible due to Apple restrictions. You may scan entire cloud drives and websites, but email attachments must be scanned individually."
If there were a provider with a more anti-censorship attitude, I would give them my business.
What you describe is "answering machine detection", AMD. They don't want to talk to you, they want to leave a message on your answering machine. So they wait for a bleep. If they detect a real human, they hang up.
> Did nobody from their phone operating compay *notice* this?
I once tracked down a company operating a telephony gateway service that was being used for spam calls and sent them a complaint. Their response was "you probably made a mistake, and even if it did come via us, they are probably using an opt-in list."
700,000,000 pounds! That is a hell of a lot of something.
Over 4 years that's £2.50 per year for each person in the country.
On AWS, that would buy 25 GB of data - 500 MB per week, each. That's the sort of numbers I would expect to see for the BBC, not for .gov.uk.
Of course it's not all spent on data, but if that were all spent on hardware that would be a similarly vast amount of something.
Does anyone know what they were actually asked to provide?
It says "further education", not "higher education". So no, they aren't saying what is taught in universities - and the "ALL" in the headline is therefore somewhat misleading.
> What exactly is a field?
Look up "scalar field" and "vector field" in Wikipedia.
Apple have a doc describing their approach here:
See page 11:
By setting up a device passcode, the user automatically enables Data Protection. iOS supports four-digit and arbitrary-length alphanumeric passcodes. In addition to unlocking the device, a passcode provides entropy for certain encryption keys. This means an attacker in possession of a device can’t get access to data in specific protection classes without the passcode.
The passcode is entangled with the device’s UID, so brute-force attempts must be performed on the device under attack. A large iteration count is used to make
each attempt slower. The iteration count is calibrated so that one attempt takes approximately 80 milliseconds. This means it would take more than 51⁄2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers.
The stronger the user passcode is, the stronger the encryption key becomes. Touch ID can be used to enhance this equation by enabling the user to establish a much stronger passcode than would otherwise be practical. This increases the effective amount of entropy protecting the encryption keys used for Data Protection, without adversely affecting the user experience of unlocking an iOS device multiple times throughout
To further discourage brute-force passcode attacks, the iOS interface enforces escalating time delays after the entry of an invalid passcode at the Lock screen. Users can choose to have the device automatically wiped if the passcode is entered incorrectly after 10 consecutive attempts. This setting is also available as an administrative policy through mobile device management (MDM) and Exchange ActiveSync, and can be set to a lower threshold.
On a device with an A7 or later A-series processor, the key operations are performed by the Secure Enclave, which also enforces a 5-second delay between repeated failed unlocking requests. This provides a governor against brute-force attacks in addition to safeguards enforced by iOS.
Can someone explain why they don't want to get a warrant from a judge?
> this sort of thing causing a mistrial
That would apply if the lawyer-client communication were of the defendant.
In this case, the Libyan is the accuser, and the government is the defendant.
What always get me is how we're programmed to recognise "ballistic", i.e. Newtonian, trajectories. But these solar surface dynamics are driven by magnetic fields, so they look different - i.e. "wrong" - to our eyees. Sometimes they look as if they're playing backwards, for example. All very weird, but very beautiful.
Is that Mercury we see transitting a couple of times?
Apple wants developer lock-in, not standards.
> Am I the only one who thinks you don't need massive CPU for voice
> recognition? A couple of ARM chips might do it?
Yes. I've actually built this, using Pocket Sphinx for voice recognition on an i.MX53 CPU. It does an excellent job for speaker-independent limitted-vocabulary recognition, e.g. "Record bbc2 at 10 pm for 2 hours". It's much less good at unlimitted-vocab, e.g. "Record university challenge".
I've also chosen to use a microphone with a big red button on it. You press the button and talk into the mic, and it does what you ask. When the button isn't depressed, the mic element is disconnected. This avoids the privacy issue entirely.
> I'm not convinced my "Smart Fridge" (if I had one) might need a mobile
> service contract. Nor my "Smart TV" (if I had one), or anything else along
> those lines
I agree. The things I might make an exception for are:
- Burglar alarm.
Two reasons: it might be useful to communicate with them when the broadband has gone down for some reason, and I might prefer to communicate with them via some sort of text message or voice interface, rather than e.g. a web interface.
Come on El Reg, your job is to turn dumbed-down press releases into something we boffins can understand. hair dryers? stepping stones?
I think it's much more likely to be the cleaning staff wearing the tags, so that their toilet breaks can be more closely monitored.
I have been spectacularly unimpressed by Google's "Google Sites" website building product, having seen what a friend has managed to do using it. So I'm not entirely convinced that they are going to up-end the market, if the quality of the product is an important factor at all.
Verizon has a cloud?
> Apple traditionally claims this is down to the higher cost of doing business overseas
No, it's due to the UK and EU prices that you quoted being inclusive of VAT but the U.S. prices being exclusive of sales tax.
> Slight variations in the time in which a DAC is given new data
> can indeed affect the output signal, even if no bits are changed.
If you're using "oxygen-free" copper for your wires, then you certainly need "oxygen-free" air for your wifi!
> Intrusion prevention or other security technologies might have been
> tripped by such behaviour.
I read that as, "if they had had intrusion prevention, it might have detected it".
I wonder if any of these people will actually stop using facebook as a result?
I don't want "synergies", I want several companies who compete with each other to have the best products and best customer service.