If I was effected then "we apologise for any inconvenience " would make my blood boil.
PR 101 says it should be: ""we apologise for THE inconvenience" and given the severity of the problem they need to grovel much harder.
508 posts • joined 27 Jun 2008
If this 'signing' has to be done regularly and it doesn't happen for what ever reason what happens?
What if both safes were inaccessible?
The 'override protections' seem to be ways to access the vaults.
I'm surprised there isn't at least a third safe!
With backups, father grandfather son is standard for normal data.
How stupid the user was depends on how long ago this was. I remember someone who went on a 'computers for beginners' course at the local college a few years after mice became common.. They started off in a room with no computers and were told to go through to the next room, sit down at a computer and pick up the mouse and move it about and see what happened. So they did as told... yes they moved it about in mid air. She told me that she felt very stupid after being told she had to move it around on the desk. But my response was no, no one is born knowing that and the lecturer had assumed some knowledge.
Sometimes the facility is not easy to replace. If the wall mounted TV in our breakfast room stops working with the built in iPlayer, etc. we have limited options as we don't want any trailing wires. A FireTV stick doesn't quite offer what we want. Anyone know of a good site that compares the FireTV and its rivals? (For use in the UK)
This reminds me of my sons flat. Before he moved in about 15 years ago we removed about half the electric wall sockets! In the lounge each of the three corners had four or six double 13Amp sockets so over 30 in one room and looked ridiculous. I suspect the previous owner had an aversion to power strips.
He also had in the modest flat a full alarm system with remote monitoring and a printer that recorded every event!
Some years ago in a server upgrade they lost all old emails. I don't think users lost any recent ones but we used to send as off site backups some data to an email address that we never downloaded. There was several years worth that disappeared. n.b. The files were backed up to a number of other places so no problem.
Still not clear who the 'driver' was and what the humans responsibilities were.
If the human was told the automatic system would be driving the car and he was only to monitor the system and should never take control, then Uber guilty human driver not.
Was the human told he should always monitor the road ahead and take control if necessary.
Not enough information to decide culpability.
Thanks for the tip about searching for images displayed in Chrome.
I note ElReg's article is on the first google page! ElReg must be crawled at least hourly.
On more than one occasion I've googled a subject mention in an ElReg article, and the ElReg article itself was top of the results!
This is an area I know nothing about but I can't see how you can have a negative output unless it is a comparison?
If it is a comparison, what to?
"...peak transmitter conducted output power of +10 dBm, rather than -10 dBm..."
I had a brief look at the (Section 15.255(c)(3)) link but it goes way over the top of my head.
"Each A76 has 128KB of L1 cache (64KB four-way instruction cache with four-cycle load-use latency, 64KB for data), 256 or 512KB of 1280-entry five-way L2 cache, and shares up to 4MB of L3."
I've often wondered why the L1 cache size on modern CPU's are so small. ARM3 back in 1989 had a 4K cache I'd have expected more than a 32 fold increase in nearly thirty years. Later CPU's now have two extra levels of cache and I understand a little bit about cache coherency. I'm sure there must be a good reason. Anyone know what it is?
How much slower is L2 and L3 I wonder?
"You've behaved ethically, putting long-term consumer concerns first"
If they were ethical they'd make them easier to repair and whilst they may support their obsolete products better than most, they don't support them long enough to entice me, I would call it "Mid-term consumer concerns first" at best
"They USED to invert the left & top with bottom & right to visually indicate clicked or held down. "
I've heard that being called 'Slab in' i.e. trying to visually show that the button has been pressed in. The strange thing is I sometimes find Windows does change the icon to 'Slabed in' but doesn't do the action!
Currently many companies won't talk to you even about non specific account questions without asking three or more security questions including your full address. I keep telling them that asking so many questions is I believe a breach of the law! One company even insists on the full address saying that postcode and house number is not enough adding the road name still doesn't satisfy them.
"Downvoted for being behind the times."
Maybe in your area, but around here it is still very effective. In the past year nearly everything I've offered (A dozen or more items) have been collected, mostly with little hassle. I've also picked up a few things. Last week I picked up an EPROM eraser I needed!
Quite a bit of our sales are 20-35 year old BBC/RISC OS etc kit. Just sold yesterday a BBC micro with no disc interface! I'm on the lookout for old network hubs with 10b2 (BNC) and RJ45. Network intetfaces for some early RISC OS kit are now rare but I have some old but unused 10base2 interfaces that could be used if I can track down some suitable hubs to allow connection to a modern network.
"if only the file system knew a list of all the files it has stored...."
But a database could massively speed up finding a file that I can't remember where it is.
I just did a test on an SSD drive with only 167GB of data on it, it tool over 2 minutes to search for a file.
I hope a database would be two orders of magnitude quicker.
I don't understand, surely it only needs to scan the whole disc once to create a database. Then it would update it as files are added, removed or moved. The initial scan could take quite a while but the updating should be hardly noticeable.
I must be missing something!
The Titanium was designed with RISC OS in mind.
rcomp's ARMX6 uses the iMX6
and 4Ds RapidO Ig uses an IGEPv5 motherboard
Whilst the Raspberry Pi wasn't designed with RISC OS as its sole OS. I know one of the key Broadcom BCM2835 designers was a RISC OS fan and did the initial porting of RISC OS to the Broadcom chip. Thanks Adrian!
Theoretically yes. I've certain seen copies of Arthur (RISC OS 1 by another name) and RISC OS 2 in EPROM. They only needed 2 x 500K or 1MB ROMS/EPROMS. I'm not sure if they ever made any 16bit wide 2MB EPROMS that RISC OS 3 and 4 needed.
RISC OS 5 is available in one time PROMs.
RISC OS 4 was available in FLASH using chips on a carrier PCB but as they couldn't be flashed in situ (No read/write connected on the 40 pin socket) PROMs were a cheaper/easier solution.
"Pretty much everyone got rich off the breakup of Acorn... except the community of enthusiasts and developers that had bought into and supported Acorn products for a decade or more."
Dealers also lost out. My company which specialised exclusively in the RISC OS market had just invested significantly when Acorn canned the desktop division:-(
Great news about the licensing and a very good informative article!
Car manufacturers expect their products to be in use for a much longer time and they also have the revenue stream from spare parts which can be more profitable than the initial sale.
Now if only technology companies could get involved in 'The Circular Economy' Where things are designed for longevity and repairability! www.wrap.org.uk/about-us/about/wrap-and-circular-economy
"... he is also worried about how GANs can be used maliciously. “It's part of why I chose to focus on more general image modelling rather than faces - it's a lot harder to use images of Dogball for political or unethical purposes than it is to use an image of another person.”
It won't take long for the unethical to start using this sort of technique and whilst experts may be able to detect unreal images it will become harder and harder to do so as the technique improves.
 I now try and avoid using the word 'fake' as its use by certain people means it is to me a discredited term.
IIRC years I read a suggestion that an OS could be set so that if you enter one password you'd have access to just some files with the other files hidden and have another password that would give access to everything. I wonder if any OS's have that now?
If you tried 'hiding' most files then it would be fairly easy to detect but if you only 'hide' say 10-20% it might be difficult to spot.
Biting the hand that feeds IT © 1998–2020