427 posts • joined 7 May 2012
Re: Laptop resolutions...
One of the most popular in use versions of a IDE that is commonly used in business applications screws up anchored points for visual components when you use screen scaling. The newer versions don't but they require substantial rework to support.
I won't mention names but I did get a chuckle out of the irony of your handle.
Re: Pixel wars
>If a manufacturer wanted to really revolutionise the world of tablet and mobile phone screens, they'd make non-reflective ones.
To be fair, Samsung have finally copied a real work useful feature from Sony in the s5 with it apparently now able to survive a drop into a kitchen sink.
Such blatant copying hasn't been observed since they stole swipe to unlock from Sony's 1980s walkmans.
Whilst you are right that the penalty of any offence is by design more costly than doing something the right way to begin with, the punishment is the job of the court not the plaintiff. Apple are free to mention damages due to lost licencing revenue or alternatively due to lost profit if they did not intend to licence it out. They can even do some sums and claim the higher of the two figures. But if the court finds Samsung guilty then the court will take such damages into account as well as any disincentives (including any disincentive to frivolous lawsuits that seem increasingly necessary).
Re: What an amazing coincidence!
Er, if the father was a golf pro then there would be no coincidence.
>How do we identify which sheep are OK and which aren't?
That is the wrong question if you ever plan a trip down under. You must always start with the premise that any animal or plant will cause you a violent death. Too many tourists pay the unfortunate price...
Re: Hope they're using a good hash
Put it another way then, if collisions were not possible then you would have a very effective compression algorithm.
The number of unique hash values is 2^size of hash. So for md5 that is 2^128 possible target values. So given a source set containing 2^128 + 1 unique pieces of data, at least 1 must clash.
The challenge posed by the OP requires you to not only find a collision but to do so in a way that preserves the image information and doesn't make your cat picture contain 500MB of nonsense in its EXIF detail. That is the unfeasible part.
Re: Hope they're using a good hash
Whilst collisions are possible and indeed information theory tells us necessary for a mapping to a hash of a fixed tiny size, what you suggest is computationally unfeasible. It would be orders of magnitudes cheaper to lobby for "improved copyright protection"
This is just a cover story. We already know that the NSA already uses secret flaws to push iTunes into their unsuspecting victims PCs in Operation Killmenow.
Bad analogy. It is more like the book is locked to your particular brand of reading glasses. The point is that a customer should retain the right to read that book in the future even if their glasses manufacturer goes bust or simply because I now prefer another brand.
Does this also cover goto fail implementations?
There are also exemptions for obviousness and prior art when applying for a patent, apparently.
Re: Mobile phones don't have remotely enough range
>I still don't understand why they had enough time to turn the jet but not enough to radio a distress
There is a possibility that whatever incident also took out their radio or the pilots were overcome before they could take that sort of action.
I sure hope the air crash investigators have the good sense to check the forums on el reg or they may end up looking in the wrong spot.
Irony cannot be lost on having your public broadcaster named CCTV.
Re: iOS 7
No. It is a string.
Question for the cryptographers here. If I have two RNGs, one "good" and one compromised and I XOR them, does this result in another "good" RNG or is it slightly or wholly compromised by the input that is compromised? To me on the surface it would seem to still be "good" but I don't know why I think that.
Assuming for a minute that I am right here, surely the best available RNG would be basically an XOR across as many RNG streams as you can access?
Clearly this must have formed part of the Australian mainland during the cretaceous period. Probably killed off by the drop bears.
Re: Yes but
Just for clarification, proper spelling doesn't mandate the use of a 'u' in between every instance of 'o' and 'r'.
Were they from Taumatawhakatangihangakoauauotamateaturipukakapikimaungahoronukupokaiwhenuakitanatahu per chance?
Since when is an atom a unit of measurement of height? For a start, are you referring to the 32 pm helium atoms or the 200+ pm caesium atoms? Why stop at atoms? Protons are a lot smaller at 1.7 fm but I digress.
2D exists only as an abstract concept to help us to work with surface areas and planes. Just because something is abstract doesn't make it any less useful (see √-1 for example).
So small; yes
Could be considered 2D for many purposes; of course but so can a piece of paper.
> just three atoms tall, technically making them 2D rather than 3D objects
No. It makes them very short 3D objects unless they are either no atoms wide or no atoms deep.
I, for one, welcome our unmanned flying chemical blasting overlords.
Re: Balancing Imbalance
Keep your perspective. Some of the sheep are quite placid.
Re: Other sites race to be first with dry headlines
Plus, el reg provides forums where other bitcoin exchange operators can check whether they are doing it right. All part of the service here.
Re: 1000,000 of their own
Ten hundred thousand.
>accusing it of "intentional and systematic misuse and misappropriation of its users' property."
Surely intention is nearly impossible to prove in this case. Hopeless incompetency for sure. Negligence. Failing a duty of care. Failing to report such events to authorities (let's forget the question of which one for the moment). Lack of auditing. There would be all sorts of open and shut cases yet the plaintiff seems to be making it very hard on himself to score a victory.
That should not be necessary. Boeing has proven experience in the required battery powered self destruction mechanisms that underpin such technologies.
429 million BTC
That's over 9000!!
Cool. Bonus vote
Re: Like most crime you can't stop a *really* determined criminal.
>But you can make them think it's too much trouble and go after easier prey
As the joke/adage/saying goes in at least one variant.
Don't try to outrun the lion/bear/[any Australian animal except some of the sheep]. Try to outrun the guy behind you.
Truecrypt already does this.
>"If you think passing a law making data localization a requirement in the EU or Brazil [...] stops the NSA from getting into those databases, think again."
That is excellent. hosting in the EU or Brazil is not going to make the job of our beloved acronyms any different so they are offering no opinion about where we host. Got it!
Re: Telefonica’s strategy
> rather than as a flamboyant extension of our personality?
You misspelt penis.
Re: Test-Driven Development
But Shirley you could use mocks to fake that response code? You wouldn't have to write the whole exploit, just a test that used a mock returning a valid certificate and an assertion on the error code or expected exception or however they flag it.
Re: This wasn't an SSL weakness as such
Copy paste should be picked up by CI or nightly builds.
>How many SSL weaknesses are there...?
How many implementations of SSL are there?
When you aren't paying for the 14000 Xeon cores nor the electricity to keep them powered, the economies are different...
Re: A word of advice to tablet makers
>Local storage, how very noughties
You maybe right in a few years, but right now 4G data plans just don't cut it for synching video.
Re: $30 billion eh?
^ do you do copyright math too?
Re: What good does bricking a stolen phone do?
Unless the bricked phone also somehow permanently damages its battery and screen the bricked phone will just be ripped apart and sold as parts.
I'm all for providing users with methods to brick their own devices but this bill doesn't seem to have really thought through the problem.
Re: My instant erase procedure
Re: Overly aggressive throttling?
> Network ain't gonna resize itself just when you pay.
Then perhaps it is best to not sell based on the maximum possible speed you might get in the middle of the night for 90 seconds and rather sell based on the range of speeds you can expect?
The problem these companies have (and I have no experience with Verizon but I doubt they are any better or worse than most) is that through the sales cycle they are quite happy for you to believe you will get 24Mb/s on your ADSL2 connection when they can't even saturate a link which is only running at 33% of that speed during peak times.
If you want to offer a 10Mb service, then you need to provision to deliver 10Mb. If you only provision for 4Mb on account that historical trends show that you can get away with it, then you better be good at JIT provisioning.
Re: Confirms my experience with Comcast choking Netflix (I never get >1Mb/sec any more).
But some data are more equal than others.
Re: He coded it in a couple of days.
It was finished in about 30 mins. The rest of the time was waiting for the android emulator to finish loading.
- Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
- Spanish village called 'Kill the Jews' mulls rebranding exercise
- NASA finds first Earth-sized planet in a habitable zone around star
- New Facebook phone app allows you to stalk your mates
- Battle of the Linux clouds! Linode DOUBLES RAM to take on Digital Ocean