It means that you are safe from the patents that RedHat owns. No one could provide protection against third party patents (or even list them all - there are too many).
398 posts • joined 20 Mar 2009
Calibre is far better than Edge for handling EPUB files.
And who uses Bing as their first choice search engine?
My own opinion of Edge and IE 11 is so bad that I have used the Program Control feature of the Firewall built into Norton Security to block both of these products (and Cortana) from internet access.
Signal to noise ?
The PV panels on a satellite accept a wide range of light frequencies and have a wide acceptance angle so as to get power even if the panel is not perfectly aligned with the sun. This implies that along with the desired signal from the LEDs on the ground there will be a huge amount of background noise from all the artificial lights on Earth (in nighttime) or from the reflection of the Sun's light (in daytime). The resulting signal to noise ratio will be horrible. (Look at pictures of nighttime Earth from space to see the amount of light emitted.) A lens and a narrow band optical filter could improve the S/N ratio by 40dB or more compared to the PV panels.
Re: The wheel turns...
No - the US companies will put their own badges on Chinese products and sell them to the US government for 3 times the price!!!
Your boss asks you to run the 'cloud project': Ever-changing wish lists, packs of 'ideas'... and 1 deadline
Does not even need the cloud
The ever changing project requirements have been around in computing since well before the internet.
If your project does not have at least the majority of its requirements defined before the design phase then the result is certain to be a failure - unfortunately there are too many bosses that think the requirements can be changed at any time (including the test phase) without increasing the timescale.
Re: This is the
Actually in "The Year of the Jackpot" story - you would live a bit longer at the bottom of the deepest mine and even longer (a few tens of minutes!) on the equator on the far side of the Earth from the Sun. (Hills would be no protection!!)
Is this a problem ?
If I read this correctly, the attacker needs physical access to the target device to exploit any of these vulnerabilities. If that is true then this is only a problem for a person that gets a pre-infected phone (eg a NSA target) or a person that lets a malicious person (say in a phone repair shop) have control of his/her phone.
Good quality encryption is already in the public domain (eg OpenPGP ) and any attempt to insert a backdoor is very unlikely to succeed when the source is publicly available.
For people who REALLY want to keep information secret - it is possible to use multiple encryption programs in series (eg use 7-Zip to create a password protected Zip file then use ccrypt to encrypt the Zip file then use OpenPGP to encrypt the output from ccrypt.). Done properly there is no way of recovering the original message without knowing the keys even if one of the programs has a backdoor.
Charging station ?
The charging station needs a LARGE electrical energy capacity (or a permanent cable to an external generator).
In hostile waters, the charging station would probably need to be either a large drone to allow it to get to a suitable location or an air dropped disposable charger. As the drones to be charged have to find the charger, it will need to emit some signal (probably acoustic) that the drones can detect. The presence of the signal would however tell any enemy that there are drones working nearby and where the charger is.
In friendly waters, a grid connected charger or a towed charger (if too far from mains electricity) would be possible.
Skynet anyone ?
How long before the Internet wakes up?
5000 kilometres depth not 5000 metres
the two other planets - should be - the two outer planets
The Greats have gone
And who is to replace them?
Of the current SF authors only David Weber is of the same level as the great SF authors of the past (Heinlein, Norton, Asimov, Brunner, Bradley, Clarke, E.E. Smith etc) and he is over 60.
Raid inside SSDs ?
As there has to be a controller inside each SSD to handle the mechanics of block allocation, wear leveling etc, it would be feasible to have RAID 1 logic inside this controller with 2 flash arrays on the SSD. (Higher RAID levels would probably not be feasible due to the increased complexity and overheads.)
Their current Falcon 9 (in maximum performance mode - no attempt to reuse the first stage booster) can already get a heavy payload to GTO (flight 38 carried a 6761kg Intelsat payload). This is more than enough lift capability to get a third stage with a payload of a few hundred kg to lunar orbit. (As the third stage would already be at orbital velocity, it would not need a large engine - just large fuel tanks)
How many decades ?
How long before 50% (let alone 100%) of companies comply with the regulations ?
For fun - just imagine 1% of the users of Microsoft products query M$ for the data that M$ hold on them (or the same for Google !!!).
How many firms are going to go back over their archival backups to delete individual's data ?
Accounting records have to be kept in the UK for a number of years - how does this interact with the GDPR? If a user requests that his data is deleted - does this then have to happen when the retention period required by tax lax expires?
Possible deadly flaw - compromised software
For a closed source implementation (eq most Windows programs) there is a danger that a deliberately weakened random number generator is used. If the public/private key pair is generated with only 32 bits of randomness instead of 2048 or 4096 then breaking would be easy for the NSA. This would not be easily apparent to the users of such compromised software as all the key exchange protocols would proceed as normal.
Note such a flaw could already have been placed in IE/Edge at the request of the NSA and there would nothing to indicate the problem to users. (Make 96 bits of the 128 bit AES encryption key depend on the other 32 bits and the NSA has an easy decryption job.)
Re: progress - hiding endpoints
If you use Usenet newsgroups then you can hide the destination of a message. A newsgroup message is a one to many broadcast. If a busy newsgroup is used then it becomes almost impossible to detect who is the intended recipient.
How many P100s could you stick onto an AMD EPYC processor ? (And how big would the case and PSU need to be to handle them all !!! )
Staging servers - Equipment control
The NHS has a lot of computer controlled equipment that is mission critical (eg CAT scanners). Until (and unless) the supplier of the equipment has confirmed that a particular Windows update is safe, the NHS would be risking the continued use of the vital equipment if it performed an update. (If the supplier has gone out of business or no longer supports the equipment then there is a real problem.) I do not blame the NHS for use of old software for such equipment.
However the NHS also has a LOT of CRAP OBSOLETE software that relies on things like IE6 and ActiveX because no one ever was prepared to pay for it to be upgraded. This is the fault of the NHS and its paymasters who have left it with insufficient money to handle day to day activities let alone needed software upgrades.
No results for Equustek
What will happen to Equustek if Google complies with this order by not returning ANY results for a query that includes the word EQUUSTEK ?
This will probably kill Equustek as they would lose so much business.
Not suitable for touchscreen devices
Even a trace of grease from fingerprints is going to be enough to kill the anti reflection property. This would only be suitable for a NON-touchscreen device such as a wall mounted TV.
Offline encryption ?
If you encrypt/decrypt the messages on an offline system with no internet connection and use a good encryption package (eg OpenPGP) then there is NO way that the messages can be decrypted in real time. (The only decryption that can be done depends on forcing the the key from the recipient - for example by torture.)
Re: "1) Starting at 30000 feet instead of sea level - equivalent to over 400 m/s"
Simple - gravitational energy - a body falling from 30000 feet in earths gravity would attain a speed of over 400 m/s in a vacuum. This energy will be provided to the rocket by the plane rather than by burning its own fuel.
The 400 m/s extra from equatorial launch probably includes the gain from not needing the orbital plane correction - the rotational velocity change between the equator and Cape Canaveral is about 200 m/s. I was not sure of the amount of energy consumed by the correction which is why I showed it as ??? .
I am not a rocket design engineer so I did not know how much advantage the reduced atmospheric pressure would give to the performance of the engine so I left this out of the list of advantages.
Big advantage - no need for launchpad
Existing large rockets need big expensive launch facilities - with a lot of unoccupied land around to handle the occasional large bang.Doing an air launch over an ocean removes the need for the ground based launch facility. There is also the advantage that the rocket can start in the desired orbital plane rather than having to expend fuel to allow for the difference between the desired orbital plane and the launch site (eg an equatorial orbit when launched from Cape Canaveral wastes quite a lot of fuel due to the launch point being over 28 degrees north of the equator.) For an equatorial orbit there is an additional 200 km/h advantage from launching from the equator rather than Cape Canaveral from the earth's rotational speed.
The speed benefits
1) Starting at 30000 feet instead of sea level - equivalent to over 400 m/s
2) Equatorial launch (instead of Cape Canaveral) - equivalent to 200 km/h
3) Plane velocity - around 200 m/s
4) Orbital plane correction - ??? km/h
There is an additional benefit from an air launch - the maximum dynamic pressure will be reduced as the spacecraft will be in thinner air than for a ground launch for any given supersonic speed.
Access from India
Could it be that the support team that is now in India cannot access the systems to restart them ?
Restart often needs hands on staff to push buttons and enter initial commands.
Easy to meet the 30% local content
Just include footage from local traffic cameras - boring as hell - but so what it is local content!!!
(If traffic camera footage is not available for some reason - use videos of cattle or sheep grazing.)
If they want to include "artistic" performances then see if any churches would like any of their services videoed. Also see if local TV news services would like their programs copied onto Netflix etc.
Disposable email address
Anyone who wants can set up a use once and throw away hotmail or gmail account for the registration and use a name and address from the electoral roll. The only people who will be badly affected by DJI are the law abiding majority - anyone intending to break the rules will use a fake registration.
In rural areas drone deliveries could be useful to reduce the number of van miles per package. In built up areas there is usually a number of nearby deliveries that can be covered efficiently by a single van but in farming areas a delivery van may have to travel multiple miles between each delivery.
My own proposal - within one mile of an airfield no drones above 250 grams unless operated by a qualified pilot with the agreement of the local ATC - between 1 mile and 3 miles from an airfield drones restricted to 100 feet above terrain (land, trees or buildings) - elsewhere restricted to 1000 feet above terrain. A drone under the direct control of a qualified pilot can exceed these height limits with the agreement of the local ATC.
The 250 gram derestriction allows drones that are too light to damage an aircraft to be used near an airfield - small camera drones can even be used to inspect parts of an aircraft that are otherwise difficult to see (eg tail fins ). (250 grams is less than the average weight of a London pigeon.)
Apart from security fixes - why change Thunderbird ?
It works - and its default of blocking remote content is useful for dealing with junk emails.
What useful enhancements can you think of for Thunderbird ?
Re: Fun fact. -The toll road is useful
I use this road when I am journeying from my home in North London to my relatives on the Isle of Skye. The reduction in journey time and petrol usage more than outweighs the toll charge (which at £5.50 for a car is less than the cost of 1 gallon of petrol - even a HGV is only charged £11.00)
In parts of the UK even 2G is unavailable
In parts of the scottish highlands it is not possible to even make a mobile phone call let alone an internet connection. (In January this year in the town of Portree on the Isle of Skye there were parts of the town with no mobile phone coverage - and Portree is the largest town on Skye.)
Conflict of legal requirements ?
The GPDR requires removal of personal data in some circumstances but audit and other legal requirements often require holding data for years. Audit requirements often need an unaltered copy of a database to be kept for several years. Which takes priority - legal requirements to keep records or legal requirements to delete records ?
Amazon Gift Cards
Why not just use Amazon gift cards - they are available at most major supermarkets and have been for years. I use them to avoid giving Amazon my credit card details.
Re: Attribution is a myth
If you send the data back using a Usenet group then there is no way to tell who the receiver is as news servers propagate the information across the internet. Like broadcast radio it is effectively impossible to tell who the listeners are. The only disadvantage is that the relay time from a message being added to Usenet to it appearing at a distant server can be minutes (or even hours) instead of the fraction of a second for a direct TCP or UDP link.
For example an encrypted RAR file could be added to the alt.binaries.etc newsgroup using GigaNews in one country and then at some future time be read using NewsDemon in another country.
Re: What MS giveth MS taketh away
If you set the startup type of the Windows Update service to disabled then windows updates will not occur until after you have re-enabled the service (disabling the Background Intelligent Transfer service can stop other unwanted data usage as well). Note - just stopping the service is not enough - the startup type has to be set to disabled or windows will restart it.
Re: Oh no!
THL make quite decent Android phones - mine is a THL W8S which for a 4 year old phone has a nice spec and very good display.
Re: Is bit-rot a real phenomena? - SHOULD
Yes data SHOULD be backed up - however what proportion of users actually back up their data - probably no more than 1% of the users that have not already been bitten by lost data. If Apple (and others) wanted to add a useful new feature to phones (and PCs) - make them do an automatic backup whenever they are connected to the internet by a fast WiFi connection.
If a link to the CAN bus is provided - will it be a secure read-only link ? If not then it is only a matter of time before rogue (or badly coded) smartphone apps cause crashes as there is effectively zero internal security on the CAN bus.
Yet another reason to use NoScript
Management enforced cost reductions
The worst type of mess to deal with is where the development team was fired to reduce costs. When this happens the documentation (if any) usually is lost at the same time, the status of the applications (development, testing or production) is unknown, institutional knowledge is lost (must run application A before application B etc) and the result makes Internet Explorer look like a perfect program.
If you are given the job of trying to sort out such a mess - do yourself a favor and look for another job (unless you enjoy pain or you can get a VERY high hourly rate).
For effective browser security use a VM running from a Linux live CD ISO. Do not give the VM any persistent storage and restart the VM for each new browser session. If the VM does not have access to any of its host's file system then even the most heavily boobytrapped web site should be unable to cause damage.
For factories with PC controlled equipment, this could be very wothwhile. No one wants to throw out a half million quid piece of equipment because its controlling PC is running an obsolete OS. Many factories have W98 PCs running standalone machines which is acceptable if they are not networked. Modern equipment however is designed to be networked so long term support is highly desired.
Panasonic has blocked other third party products
Panasonic blocked the use of third party batteries in some of its cameras which forced the owners to pay through the nose for its own brand. I can easily see it doing the same thing again if it thought that it could get away with it.
See the following article in the reg for more details about the batteries
Disable Windows Update service
If you disable and stop the Windows Update service then no windows updates will occur until you reenable the service.
Another way of preventing windows updates is to change the properties of each of the network connections to "metered" as windows should not now attempt to download updates over an expensive connection.
Using either of the above methods gives you control of when updates occur.
Unless you play a lot of games when the extra graphics power of a high end phone might be justified, there is no point in paying over £200 for a phone. There are a lot of generic Android phones with good displays, lots of storage and micro-SD compatibility for under £200 - only pay more if there is some specific feature that you need or if you like wasting money.
A better alternative might be to have a small water container (say 10mm thick) on the top and bottom of the tablet. This would absorb a lot of the heat if a battery failed reducing the impact on the plane. CO2 and/or Halon would not be very effective in puting out a Li-ion fire as such a battery is a self contained firework - it will continue to burn in the absence of atmospheric oxygen.
There is already strong encryption available - OpenPGP - that is open source so any attempt to insert a backdoor would be easily detected. Anyone that needs strong encryption to evade law enforcement can already obtain it and all the wishfull thinking of the worlds politicians cannot stop it.
Clock bug ?
Will these chips have a showstopper bug like the C2000 Atom's clock bug?
After the way that a lot of firms were burnt by the C2000 fiasco, I would expect some resistance to the use of the new chips (and probably some very tough contract terms covering any problems).
Factory reset - default passwords and security
The factory reset may well be wiping all the customisations and resetting the security - however it is probably also going to reset the access ccodes/passwords/security tokens to the original values. If the original owner did not change them (if possible) on purchasing the car then any of his/her apps that had remote access to the car would still work. For a pre-owened car with remote access to be secure REQIRES the new owner to immediately change the access codes etc or to disable the remote access (eg by removing the antenna or wrapping it in foil).
Reuse of passwords
Like many people I have a number of accounts - but many of them are for sites like the register where the consequences of a hack are insignificent. For such sites I often reuse simple passwords - for other sites with financial data (eg PayPal) I use strong passwords that are unique to each site.
An easy way to generate fairly strong memorable passwords - concatenate a car registration number, a friends name and the name on a bit of equipment.
eq XNO123SWendyHUDL2 (not a password that I have ever used!!!)