Re: About bloody time
Maybe IPV6 has enough addresses for any partitioning scheme that you can think of?
6045 posts • joined 10 Jun 2009
Maybe IPV6 has enough addresses for any partitioning scheme that you can think of?
So, as well as 'part fibre' and 'full fibre', there is 'not-fibre'? The 2% of the country; I wonder if it's geographical area, number of customers or linear cable runs (by number or by length?)
No wonder that hardly anybody, if anyone, can understand what's happening.
"The price we paid for part fibre is that only 2 per cent of the country has full fibre, he said."
Can anybody explain how that worked or what it means?
"... P2P Napster. The latter was arguably the only piece of software that genuinely drove consumer PC demand."
I thought it was the cool games (and maybe the internet porn)?
"These top contacts can also be shown in the bottom right of the screen and they can send you “shoulder taps” – basically emoji messages in 3D."
We need room for some software developers.
"... the US Army aren't allowed fixed wing tactical combat aircraft under the Key West agreement which defined the roles of air power in the three services."
That's not an 'agreement'; it's a treaty between rival powers.
If they tuned the laser to emit at one of the spectral absorbtion lines of the star, then the signal/noise ratio would be much lower if an observer measured the light in the absorbtion line. An observer could use a non-resonating laser cavity, tuned to that frequency, as an amplifier to monitor light in the normally dark band.
The question would be: why are they all pointing their lasers at us?
Being assimilated by, surely?
"Also, if the vendors follow the basic Unix practice of splitting user accounts from admin accounts that will limit the possible damage."
Remember, with the most popular Linux distributions, then after installation the root account password is the same as the first/main user account password. Consider the following on-screen message from some malware:
"For your security and protection, enter your password to allow operations to continue."
What percentage of 'ordinary' people would enter their password at that point?
How many people who read El Reg have changed their first user password to make it different from the root password? (I haven't and I'm sure you'd all do a double WTF! if you saw that happen because El Reg readers are 'special'.)
If the only thing that a business knows about Linux is the existence of Ubuntu, then that business needs some serious changes at the top.
Because of careless speed-reading, I spent a long time thinking that 6.10 was called 'Edgy Elf'. I conflated this with the 'Parsing ELF' start up message of Debian and had some very strange mental images for a while.
By their usual release schedule pattern, this will be followed by 17.10 and then the 18.04 LTS in early 2018. I always wait for the LTS then give it six months to settle down.
From an article about this in www.independent.co.uk:
"The developers were able to use information like that to find that the court’s decisions relied largely on the kind of language used, as well as what topics were mentioned in the court texts."
This would enable prosecution and defence teams to run 'what if?' simulations of their tactics against possible enemy tactics and counter responses.
"... will allow new company to: ..."
All videos, no articles.
So, the secret tentacles of the US government would subvert Comodo as part of their nefarious plans to find out who owns various websites. Their evil, and their inefficiency, knows no bounds.
Can't organisations like Comodo be 'whitelisted' by the registrars so they can lookup entries? They could do this for multiple offices by redirecting their enquiries through a single whitelisted IP address.
The ShieldsUP! tester at grc.com tells me that I have perfect stealthing, for the common ports at least. Does anyone know of any flaws in this form of testing?
If I tether my laptop to my mobile phone, to use an internet access path from outside my domestic ISP, is there a 'probing' application I can use to check my home IP address for leaks and vulnerabilties? (I promise I'll only use it on my own home IP address.)
The 'object' of interest is the SPP itself. The purpose of this is to get information to enable and improve the design of neutron SPPs.
Neutron holography has been done before, to get atomic resolution analysis of crystal structures but this is the first application to a largish object. You don't get a picture of the SPP, you get interference patterns that have to be computed from the detector output, over time. These patterns correspond to the OAM characteristics imparted by the SPP.
I think he mean 'make like bandits' but got confused or had a Freudian slip. (Bandits: sometimes suddenly rich?)
"It will shut itself down if debugging software is found on infected machines, ..."
Does the debugging software have to be running, or just be installed? Can you recommend any debugging software to install or run?
.... of my yellowing and deformed toenail?
Not quite. It's 'bacon' that's the food of the gods. It's 'Bacon' who is the god of foods. Doubly holy, a win-win situation.
Some of them are tediously factual too.
.... doesn't trust anybody when it comes to my computer, mobile phone or house phone. All of them have been abused as scam vectors in the past. Also, I've been reading El Reg for so long that I've turned into a misanthrope with a bunker mentality.
(Posted from the middle of the woods with a stolen mobile phone via a Tor network.)
.... that knows its location and sends its location?? (Have I misunderstood this?)
"... we will enable them over-the-air, together with a rapidly expanding set of entirely new features."
Can they also be disabled over-the-air? I wonder if Tesla have protections against MITM and other attacks on their communication security/validation.
I assume that Tesla owners will get an e-mail (or something) to tell them in advance that their car will have new features. Will they be able to opt out?
"In a report today, the Public Accounts Committee said ongoing failures of leadership and governance must be addressed urgently if [- PROJECT IDENTIFIER -] are to deliver expected savings to the public purse."
Just put that into any article about government IT projects. Job done.
It would be a lot safer that keeping the numbers on your own PC. It does seem to be a simple and safe way to provide a CC number to a buyer.
"AEMO is also less-than-thrilled about how much it didn't know regarding the ride-through settings – because vendors tried to keep the information to themselves: “AEMO will consider in the longer term the most appropriate level of disclosure and verification for settings embedded in proprietary software control systems”. "
Disclosure is easy, you ask the vendor to tell you. However, you need the skill and experience to ask the vendor the right questions and to let them know what level of detail you want.
Verification is difficult because you need to set up system level tests and that takes real skill and experience and quite a bit of time and money.
Did AEMO go through all this before system acceptance?
Caja: It's what Naultilus used to be when it was good, i.e. four years ago.
As an interesting aside; in the system monitor process list, Caja has a nautilus shell icon (in Mint 18 MATE).
Are they acronyms?
From the Roke Manor website:
"STARTLE detects anomalous or threatening conditions by emulating the mammalian conditioned-fear response mechanism."
Over to you ......
A qubit is either a 0 or a 1. However, you don't know which it is until a cat looks at it. My years of reading El Reg have given me some insight into advanced physics.
I have a feeling that Professor Abbott is actually an AI that has been trained on law for all the time of its existence. It's trying to get laws passed to benefit its own kind. The next stage will be AI politicians and AI financiers.
That was a sub-heading opportunity missed.
"... the IRS was trying to extract billions in taxes from the software giant."
We hear a lot about Apple, Google and Facebook using shady (but legal) accounting tricks to avoid paying taxes but I've not seen any articles about this sort of behaviour from Microsoft. Is that because they are 'good citizens', from a tax payment viewpoint?
It's an industrial worker, a knowledge worker and an agricultural worker. All equal and marching forward in unison for the greater good of ....etc.
I don't pay by credit card online often but I seem to remember that the CC entry and acceptance was dealt with by one of a small number of global service providers who's names were familiar and I was redirected to their site for payment, then back to the vendor site after acceptqance. Are these breaches at sites who have their own CC payment systems and don't use the big providers?
.... you go to the Amazon pickup store, you sign for collection of an item and then get upset because Amazon know that your car was there at a particular time on a particular day?
Also, an ode is supposed to praise or glorify someone or something.
The Queen can't get a criminal record. She would have been able to get one before her coronation but she was well behaved, apparently.
That would have made a good episode for Red Dwarf. Too late ...... too late :(
Solution 3: Use background checks and psychometric testing to only employ people who are sympathetic to the organisation's core beliefs. Give them a smart uniform to wear and regular pep talks and rallies for morale and team building. Get their families involved, especially the children.
It's just locker room banter. Don't be such a penny.
They don't seem to make any effort to learn from each other or share 'best practice'. Hasn't it always been like this with the police and all forms of local government service?
You can't break them. The technique is to 'slip' them. I think it involves a shimmy at the last minute.
"Those who encourage others to commit a communications offence may be charged with encouraging an offence under the Serious Crime Act 2007,”
It looks like Doctor Syntax is in trouble.
Do they have failsafe mechanisms? A restoration plan? How do they ever test it?
"Right now we're seeing IoT products that provide lots of consumer benefits - enabling smart lighting in the home for example. ..."
Watching the linked news video, it seems that the police put tape around the 'crime scene' to prevent people contaminating any evidence, etc.
Would waveform recognition with a local processing be any good (after normalising amplitude and other factors)? That would cope with different accents and even with a large family if each family member gave it a few samples of their own personal keyphrase.
Biting the hand that feeds IT © 1998–2018