I'm hopeful of an actually-shipping and sensibly-priced AMD board in the next 6 months or so. Maybe mini-itx or similar, maybe via 69boards. This Qualcomm product is clearly further off.
457 posts • joined 29 Nov 2006
What happens in the Microsoft Ireland case is the next thing to watch.
If that goes the wrong way, i.e. if the court says that Microsoft US is obliged to exfiltrate data held by MS Ireland, then these multinational US-headquartered companies will have to decouple themselves further. I see one option as a form of franchising, where e.g. Facebook EU is an entirely separate company from Facebook US, with its own shareholders, but it pays a license fee to Facebook US for the use of its brand and technology.
Ultimately, though, the spies will continue to spy. As I read them, the Snowden revelations were suggesting that at least much of the interception was without the consent of the companies concerned. It is probably legally easier for the NSA to hack an EU company's infrastructure in the EU than it is for them to do that in the US. So this judgement may end up not increasing practical privacy at all.
400 000 bottles!
Half a million bottles! Seriously, are there really thousands of people drinking this gloop?
3p per call.
Compare with, say, a £30 fine for littering. 1000x greater.
Re: ARM did it!
> IIRC a talk I heard a few years ago from Sophie Wilson ARM added another
> instruction specifically to get Nokia as a customer. I suspect ARM would be
> very different (even maybe not exist) if they hadn't done that.
The main thing was adding a completely new MMU in order to get Apple as a customer, for the ARM610 in the Newton.
Re: ARM did it!
> I can argue that it would be useful
OK, I'll fix my sloppy grammar:
"I'm sure that adding multiply would have improved benchmark results, but you can't argue ((with my assertion)) that it is also useful in real applications."
Re: ARM did it!
> IIRC ARM added an extra instruction to their ARM 1 design for
> ARM 2 as an extra test had been
No, you don't recall correctly.
The ARM1 to ARM2 instruction set changes included adding a multiply instruction, and removing certain complex shifts. I'm sure that adding multiply would have improved benchmark results, but you can't argue that it is also useful in real applications.
But more to the point, the changes were completely public and were not designed to work around government rules that were intended to protect peoples' health.
Re: ...due to the actions of some lone shark at VW. ????
>. there was a hidden adblue microresorvoir..
Was there? I've not read that anywhere.
So WTF is BT still not doing IPv6 on domestic broadband?
(They haven't started without me noticing, have they?)
Re: A physics question, I'm confused.
> in an engine I want the maximum amount of CO (converted
> to CO2), H2O, NO to come out of the exhaust for a given
> volume of fuel.
Formation of CO, CO2 and H2O is exothermic so yes you want to maximise those.
But formation of NO is endothermic.
The Beeb have been quoting someone saying this sort of cheating couldn't happen in Europe:
"Mike Hawes, who is chief executive of the UK's Society of Motor Manufacturers and Traders, said the EU operated a "fundamentally different system" from the US, with tests performed in strict conditions and witnessed by a government-appointed independent approval agency.
"There is no evidence that manufacturers cheat the cycle," he said. "Vehicles are removed from the production line randomly and must be standard production models, certified by the relevant authority - the UK body being the Vehicle Certification Agency, which is responsible to the Department for Transport."
Does anyone know what the difference is? It seems to me that taking random vehicles off the production line and having a government witness isn't going to make any difference if the software on all the cars is programmed to recognise that it's on a rolling road. So is this guy talking rubbish, or is there really some difference between how the two continents do testing? Would it be sufficient to put a sack of spuds on the drivers seat and move the steering wheel periodically?
Re: Darwin Awards Equivalant
> Well, given time, he exponentially threatens to exhaust the resources of the Universe!
No. It increases quadraticly, not exponentially.
Re: sign of the times
And to think people used to actually pay for software.
Re: "The farm decided to go with a more modern, off-the-shelf software solution."
> It is like booting Windows: for the past 30 years it has seemed to take about
> the same time, regardless of the increase in the power of the computer I run
> it on!
In other news this week, all animals take about 21 seconds to piss irrespective of their size.
Must be related somehow.
Prostitute is not on the list. Which is odd, in view of today's other news.
The three following Tom Baker all blend together into a confusion of rubbish in my memory, but I've voted for Peter Davidson because his appearance made me think at the time "but he's Tristan off All Creatures Great And Small". Sylvester McCoy was probably even worse as the Doctor - he just clowned - but at least I could look at him without thinking about him having his arm up a cow.
Locoscript was great. I think one reason was that the keyboard layout was designed specifically for that application. In particular the [+] and [-] buttons left and right of the space bar provided a much easier to understand way of inserting formatting tags than anyone else was offering.
My main complaint about the machine generally is how awkward it was to use more than 64k of RAM in CP/M. It could only really be used as a RAM disk. My attempts at writing serious applications came unstuck because I ran out of memory. I used two different Modula-2 compilers, neither of which really worked properly because of this.
Has this word now been lost?
Do we now call fishing boats "trollers"?
Does anyone know the difference between red and white? Why is white not in the key?
Since our reporter found the walk back up the hill to the car park a bit of a challenge, I guess he didn't explore as far as the Falls Of Clyde (Corra Linn). In the Victorian era, this waterfall was a well known beauty spot with the likes of Wordsworth and Turner visiting and recording their impressions. But then in the 1920s most of the water was diverted into Scotland's first (of many) hydroelectric power stations. I recommend finding out when the power station is shut down for maintenance (a couple of times a year) and the waterfalls are in their natural state. And in the spring, you might get to see peregrine chicks nesting on the opposite cliff; there is a hide with telescopes from which you can view them.
Re: Driving the car
> Wouldn't a far simpler solution be if the door detected say 1000 open
> attempts that it is switches off the receiver for 5 minutes. Make brute
> forcing impractical.
That makes you vulnerable to denial-of-service.
There's a tradeoff between making it harder for someone to steal your car and making it easier for them to lock you out of it.
The desalination plants would presumably be idle in the years when it did rain enough, yet you still have to pay the capital costs. It would be interesting to know what the capital costs would really be.
I think it comes down to this choice:
(a) make other people cut down on water use
(b) do nothing and hope it rains next year
(c) spend money
Normal, i.e. short-sighted, voters will probably choose (a) and (b).
Rangers Football Club
The only other time I've heard of Employee Benefit Trusts was in the context of Rangers football club, who were using them to "pay" their players. There was a major court case with HMRC about this which the club eventually WON (to my surprise). I wonder how/if this Gibralter scheme differs from what Rangers were doing?
FT story: http://www.ft.com/cms/s/0/c53a8272-c25d-11e4-bd9f-00144feab7de.html#axzz3hOpAQKbL
> You shouldn't pay off someone's debts until they have learned the way
> not to just rack up another one
Greece now has a significant primary budget surplus.
Re: Tempting for devs?
The fact that it has a different screen size from most of your users makes it less attractive as a development target.
But having thr same processor is a good thing. This is exactly the opposite of the last iPod, which had the same screen size but a different processor than the corresponding phone.
> ought to have respected established protocol
I fear that in the 99% of cases that we don't hear about, the "respected protocol" is to quietly sell your exploit to the highest bidder.
I can't see anything on the OVH website, not even a press release. Any links anyone?
I also remember visiting in the 80s; I think there was a special bus. It was very impressive, and I still have the souvenir guide!
Isn't TO-2015 a power transistor package?
(The closest I can find is TO-201, which is a coaxial transistor! If you want to waste the rest of your weekend exploring a dinosaur's graveyard of obsolete transistor packages, have a look at https://www.jedec.org/standards-documents/focus/registered-outlines-jep95/transistor-outlines-archive )
Re: Completely and utterly bonkers
> None of which are actually functioning today.
The Manchesterr "Baby" replica in the museum of science and industry is functional. Or was last time I visited.
It's worth noting that when supermarkets run e.g. two-for-one deals, that may be funded by paying the suppliers less. I don't know much about the doughnut industry, but the example in the story might not be entirely accurate.
See e.g. http://www.theguardian.com/environment/2011/jul/02/british-farmers-supermarket-price-wars
You can pick up a punnet of British raspberries – at their best this weekend – on a two-for-one offer in most supermarkets. But as shoppers reach for that quintessential summer treat, they should perhaps ponder the fact that it is the farmer, not the supermarket, who is paying for the generous discount.
> "Clear rules for when and how the Federal government can watch Americans
> from the sky....."
Only Americans, of course. The rest of us can be not only watched but murdered from the sky, and that's just fine.
Keychain on iOS is secure
Having just read the PDF -
- The keychain on iOS is not affected.
- The only thing on iOS that is affected is URL schemes. This has been known forever; anyone can publish an app which claims any URL scheme, so you shouldn't send anything sensitive using them.
OSX has more holes....
That's wrong. It's referring to the amount of free space that you need to do the update from 8 to 9, compared to the amount of free space needed to do the update from 7 to 8.
I'm waiting to learn if this improvement is because 9 will drop compatibility with 32-bit binaries.
> Apple will also require developers to use HTTPS for all network traffic on
> iOS 9 apps
That seems surprising, to say the least....
I mean, what about something like an ssh app?
No, I think someone has got the wrong end of the stick. Anyone know what has actually been announced?
Re: How do the manage the fuel
> I must admit that most of that is completely, and I mean
> completely, over my head...
I'm curious. What sort of person reads The Register, but doesn't know where Voyager 2 gets its electric power from? (Isn't that in the GCSE science curriculum?)
Seriously, I may have completely misjudged this site's demographic!
One box near me has been turned into an ATM.
I also wondered if they could be turned into super-loos. (Serious suggestion.) They are clearly a bit too small, but thinking about what visitors to this city centre need pre- and post- busy Saturday evenings, it is cash and urinals.
The "10,000 CPUs shipped" number is very impressive. Where are they all? Not on the $1,500 or $2,500 dev boards that I can buy, surely! Someone - PayPal or someone else - is doing some seriously large scale deployments. Good!
Communication with phone
My understanding is that at present 3rd-party watch app's all run on the phone with which the watch is communicating over Bluetooth. So an app that displayed a watch face would need to create the watch face graphic on the phone and transmit it to the watch every second. That would clearly be much worse for battery life (both of the watch and the phone) than a "native" watch face. Maybe this is the reason for the restriction?
Commenting only to say how awful Scribd, on which the linked presentation is stored, seems to be.
I am allowed to view 3 of te 5 pages (on my iPad), at which point I am told that I must download their "free mobile app" in order to read the last two. FUCK YOU SCRIBD. I will not install some app just to view this! Bjarne, is this what you wanted? If not, maybe try Google Docs? Or just host it on your own website FFS!
Re: A school owns patents?
> Even at British universities, students on Msc & PHD are 'informed' that
> their work at the university belongs to the university and any ideas they
> may have during their time at the uni. also belong to the uni.
That certainly isn't how I remember it. Have a look at the Cambridge rules here, for example:
Scroll down to section 14 for the rules for students, which starts like this:
14. The entitlement to intellectual property rights in material created by a student shall rest with the student, with the following exceptions:
The "lookout" app does not claim to be anything like an anti-virus app.
The "virus barrier" app was apparently a thing that will scan for nasties in e.g. email attachments; it looks like you would choose to "open in..." their app from e.g. the mail app, and it would tell you if it found something matching its signatures. So it is also not an anti-virus product in any conventional sense. Not sure what Apple's objection would be. Have a look at: http://www.intego.com/mac-security-blog/virusbarrier-ios-8-antivirus-malware-scanner-iphone-ipad/ :
"For instance, email is one of the most common sources of malware in iOS. Once you receive an email attachment, before you open the file you could scan it in VirusBarrier to make sure that it is not infected with malware. Here’s how easy it is to scan these files:
Hold your finger over the attachment until the share sheet pops up
In the middle section of the share sheet, select “Open in VirusBarrier”
The VirusBarrier application will open and perform the scan
If no malware is found, you can return to the email and feel safe to open the attachment
If the scan comes up clean and no malware is found, our integrated file reader will open the document for quick and easy viewing, or you can send the file to a remote location, such as Dropbox, for storage.
*All scans must be done manually; automatic scans or real time scanning are not possible due to Apple restrictions. You may scan entire cloud drives and websites, but email attachments must be scanned individually."
If there were a provider with a more anti-censorship attitude, I would give them my business.
What you describe is "answering machine detection", AMD. They don't want to talk to you, they want to leave a message on your answering machine. So they wait for a bleep. If they detect a real human, they hang up.
Re: "four to six million recorded telephone calls a day"???
> Did nobody from their phone operating compay *notice* this?
I once tracked down a company operating a telephony gateway service that was being used for spam calls and sent them a complaint. Their response was "you probably made a mistake, and even if it did come via us, they are probably using an opt-in list."
700,000,000 pounds! That is a hell of a lot of something.
Over 4 years that's £2.50 per year for each person in the country.
On AWS, that would buy 25 GB of data - 500 MB per week, each. That's the sort of numbers I would expect to see for the BBC, not for .gov.uk.
Of course it's not all spent on data, but if that were all spent on hardware that would be a similarly vast amount of something.
Does anyone know what they were actually asked to provide?
It says "further education", not "higher education". So no, they aren't saying what is taught in universities - and the "ALL" in the headline is therefore somewhat misleading.
Re: We'll see...
> What exactly is a field?
Look up "scalar field" and "vector field" in Wikipedia.
Re: How does this work exactly.
Apple have a doc describing their approach here:
See page 11:
By setting up a device passcode, the user automatically enables Data Protection. iOS supports four-digit and arbitrary-length alphanumeric passcodes. In addition to unlocking the device, a passcode provides entropy for certain encryption keys. This means an attacker in possession of a device can’t get access to data in specific protection classes without the passcode.
The passcode is entangled with the device’s UID, so brute-force attempts must be performed on the device under attack. A large iteration count is used to make
each attempt slower. The iteration count is calibrated so that one attempt takes approximately 80 milliseconds. This means it would take more than 51⁄2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers.
The stronger the user passcode is, the stronger the encryption key becomes. Touch ID can be used to enhance this equation by enabling the user to establish a much stronger passcode than would otherwise be practical. This increases the effective amount of entropy protecting the encryption keys used for Data Protection, without adversely affecting the user experience of unlocking an iOS device multiple times throughout
To further discourage brute-force passcode attacks, the iOS interface enforces escalating time delays after the entry of an invalid passcode at the Lock screen. Users can choose to have the device automatically wiped if the passcode is entered incorrectly after 10 consecutive attempts. This setting is also available as an administrative policy through mobile device management (MDM) and Exchange ActiveSync, and can be set to a lower threshold.
On a device with an A7 or later A-series processor, the key operations are performed by the Secure Enclave, which also enforces a 5-second delay between repeated failed unlocking requests. This provides a governor against brute-force attacks in addition to safeguards enforced by iOS.