Re: It's a bit like rugby?
I recall reading American Football described (in the 1970's IIRC) as a perfect combination of the two most characteristic aspects of American culture: Violence and Committee Meetings.
750 posts • joined 17 Jun 2009
-- What were they thinking when they came up with that mechanism? --
Just as Bill gates did not invent CTRL_ALT_DEL, but did popularize it, there was guy who weaponized the shutdown as the one true way to govern.
Nice thing about recent history is that many of the players are still around, so you might ask him:
(I predict, though, that the answer will be somewhere between "The end justifies the means" and "F-you commie rat-bastard")
Not to single out Newt, really. A _lot_ of politicians are lawyers, and most seem to think that "If it is not illegal (yet), it is perfectly OK". Also, a surprising number (at least in the U.S. Congress) of politicians are former cheerleaders
and once you have a certain level of physical gymnastics handled, perhaps getting into mental and moral gymnastics is easier.
How would the controller know that moving the load N instead of E would put it through the window of the bosses car?
How about N vs S? Your comment pushed me over the "should I bother to post?" edge, as the article had tickled an old memory about a not-exactly-security issue with a traveling crane. I probably read it on comp.risks, which means "before 2001" when I went cold-turkey.
Anyway, some repair of said crane had resulted in the phases being connected incorrectly. It powered up OK, stopped. Then the repair guy commanded a small movement one direction, but due to the reversed phases, the result was in a small movement the other direction, which the control loop "corrected", leading quickly to full power the opposite of the correct direction. The stop blocks at the (actual, not anticipated) end of the track were not able to halt the mass of the crane traveling at full speed, and it crashed through the wall and landed on a vehicle parked outside. There was speculation at the time whether that vehicle was owned by the electrician who had done the erroneous wiring. Poetic, but unconfirmed.
have to let the system know which processes are trusted and which are not.
I thought one of the key principles in the Evil Overlord's Guide to World Domination was to _never_ let any of your "trusted" henchmen know which of them is actually _trusted_ (for now).
(allegedly) old saying:
Two fools. One says "This is old, and therefore good". The other: "This is new, and therefore better"
Meanwhile, I, and the other "nudged out the door" greybeards of my acquaintance had a tendency to document what we know, and were doing, including early design notes, without needing a patented process in place. Those who have stayed with a company for more than a few years have a personal relationship with their (soon to be) former co-workers, and do not want to make their lives difficult. Sometime, we are given time to do this. Others? Well, I left work on my last day of one job after 8PM, finishing up some notes to my replacement.
Some folks on another list have mentioned that the Apple "Privacy" sign is on the side of a Marriott hotel. Odd choice given the Marriott data leak.
Meanwhile, I do believe the Apple ecosystem is (a bit) more secure than most, as long as:
1) They don't get subborned by some TLA
2) You avoid iCloud like the plague.
Problem is, with the rise of authoritarianism, (1) will not last long, and (2) requires constant vigilance to avoid the dark patterns that try to get you to click the "leak all my info, passwords, email, etc. to Apple" link that _looks_ like a "make your device more secure with our guard-unicorn! It even farts rainbows!" button.
Very OT, but I would love to be told the name of the film or program that I stumbled on many years back when many UHF channels were pretty much "obscure old films, all the time". It was almost certainly toward the end of this one, and the scene I remember is some guy stumbling out of a spherical tank (probably shot at an oil refinery or other chemical plant) screaming "It Burns!", and the revelation that the "advanced fertilizer process" was actually making food (or fuel, or aphrodisiacs?) for some alien overlords.
On the chance that the headline is referencing that film, could someone enlighten me with the title and (rough) year)?
While diverging into B-movie filmography. any hints of one that features a tube station overrun by crocodile-sized intelligent mantis-like creatures? At least as far as I could ascertain through the (RF) snow. We no longer have that problem (snow, not crocodile-mantises), just variations on major parts of the frame entering Witness Protection, or the audio becoming completely unmoored from the video, in our brave new DTV world.
So, the Russians had nothing to do with dodgy "signature fails", false announcement of polling places moving, real moving or closing of polling places with little or no notice, "harvesting" of absentee ballots... Good to know American Ingenuity is still a thing, without help from furriners..
As for 2FA, having it actually work might be nice, but as it is, every time I use one of my alternate computers, or a VPN, or use the (horrendous) gmail web interface _on_ my main computer, I get a panic message from Google about a "new device", even if I had had it for years and used it the day before. It's almost like they will not rest until I give up dealing with their buggy IMAP interface on a non-google device, and just turn on the "snoop everything, all the time" stuff in the webmail and app.
But that "no password reuse" advice is "table stakes" for security. But also consider "Don't invite a vampire (IoT) into your home"
I suspect you meant "should not". Public records have been altered and deleted for probably as long as they have existed. It's just that destroying, say, some incriminating cuneiform tablets with a mallet is easier than destroying all extant copies (even those in the internet archive) of Hansard.
--- I recall a 555-based tone generator a friend and I breadboarded together ---
Are you sure that wasn't a 556, for Dual Tone?
And that your muse didn't have a surname starting with 'W'?
OTOH, the harmonic content of simple 555-based tone generators made for their use as "tariff reduction devices" iffy.
When someone (probably senior, but they'll find an intern to blame) forgets to renew the contract with a "security consultant", you can expect said consultant to go looking for other customers. "Business is Business".
But I totally agree that it is far more likely the contractors were not merely out for monetary rewards for services rendered.
Electing someone who owes us money: Maybe a few hundred million dollars
Sowing chaos in the 'Free World': Priceless!
That sounds a lot like the typical advertising "There is no better <x>", which they intend us to read as "This is clearly the best" while those who stayed awake in rhetoric might discern it as "This is not really any worse than the rest of the crap".
I like the analog stuff, though. At last an explanation for occasionally wildly odd AI results. "It works just like your brain", which is so simple/obvious that even Uncle Phil can understand, after a few too many pints.
Brings to mind the days when DEC PDP-10s were considered mainframes, and someone gleefully pointed out that a certain growing non-aerospace Seattle company used one for its business infrastructure, rather than "dogfooding".
The response was a (slightly later) statement from said company that it did not own or operate any such systems. Not mentioned: These functions were now carried out by independent contractors (coincidentally former employees) in leased office space (coincidentally) formerly occupied by the same people and equipment. But _technically_...
(IIRC. Anecdotal, this may not have happened, Don't believe everything you read. Where did I put that lawyer's card?)
-- "Mommy, why is this thing that I stick into that thing called male and that other one female?"
A friend had that epiphany (about M and F connection terminology) while doing a talk on amateur radio to grade 9 students at a RC seminary. Gave him pause, it did.
And yes, IBM used ambisexuous connectors (they called them hermaphroditic) on I/O cables for System 360. It makes a lot of sense when you are snaking 50 feet of cable under the floor and want to avoid the "Oops, got the wrong end of the cable" problem.
When a law enforcement agency says it has no way of intercepting messages on a particular encrypted service, it is a _strong_ clue that they do have access to such messages, probably through a backdoor. Or a side door, or dangling through the skylight with night-vision goggles, whatever.
"Oh, please don't throw me into that briar patch"
The last commercial product I worked on had not one, but three 8051s in it. _Somebody_ has to tune the SerDes DSPs that makes PCIe reliable. Ditto the "supervisor" in some 10Gb Ethernet (and probably Infiniband) switches. And as has been pointed out, lots of USB gear has an 8051 inside. They don't call it "embedded Computing" for nothing.
You generally have to pay the people with the spades, or at least a sufficiently nasty and well-armed set of slave-watchers. With crypto-coins, you can often get away with commandeering the resources of others. That's been the key to success for millennia.
OT, but that reminded me of the "pep talk" we recently acqui-hired remnants of a once-promising startup were given on arrival at the (larger head-count than the town I grew up in) megacorp. The speaker was the (insert plausible title translating to "high muckety-muck") of global marketing, and he reassured us that the emphasis will still be on commitment to quality and reliability, promising we would deliver "nine fives". A fellow newly-borged coworker and I looked at each other, agreeing that this lot could probably achieve it.
One must presume that any mandatory standards promulgated by GCHQ (or other five-eyes "security" agencies) will contain NOBUS (Nobody But Us) provisions. Secure from everybody but GCHQ and friends, where some friends are such bastions of freedom and decency as [redacted per security spec]
While I agree that a lot of conscientious people worked a lot of hours in the run-up to Y2K, IIRC a patch for Windows believing 2000 would be a leap year came out in something like November 1999. This despite earlier complaints from fin-tech people that computations of future value or the like were odd. The thing is,, sometimes you don't just need to know what day today is, but what day 60 or 180 days from now will be.
Here's the thing. While I agree that in an ideal world where computers are managed by knowledgeable technicians with both the skill and the attitude to "do stuff right", any firmware mods (let alone JTAG access) would be controlled by a hardware jumper, preferably one that is either:
A) Verified to be disconnected before the "special mode" it was needed for can be exited back to "normal mode" BIOS/UEFI)
B) In such a position in the case that the vulnerable system cannot be buttoned up and slid back into the rack.
That just "doesn't scale". When Spectre/Meltdown or similar are discovered and (at least partially) mitigated, the small business with under 10 servers can do the trudge from one to the next with a "crash cart", and probably has one person who, because they need to be a jack-of-all-trades, has all the needed skills. Now consider even a medium-size outfit (like one of my former employers) who has three or four rows of a dozen or more racks with at least a dozen servers per rack. How many crash-carts do they have? How many adequately skilled IT techs can you cram into each aisle, if you even have them?
One might argue that hardware designers should be more about reliability and security than the current mania for speed and cost, or that software developers should dial back the "Ship it and deal with any problems in the next release, or maybe never, Does never work for you?"
That argument is unlikely to get much consideration from folks who need to keep the lights on in the face of financial and schedule demands. In this universe anyway. "Damage to reputation" doesn't seem to actually happen much anymore. Pretty much all the "victim companies" of massive data breaches are still in business, and no corporate officers are in jail.
Everybody wants quality, damn few want to pay for it.
It would be difficult to have the human operator touch "OK" on Curiosity's screen, so "Always accept all updates" was their only possible choice, although I might quibble with the "don't bother even notifying the user" bit.
Or maybe the decline in c ( http://www.talkorigins.org/faqs/c-decay.html ) has messed with the comms gear, but only for "fake science" results like "Mars is definitely over 6000 years old"
I agree that incarceration is probably a lose/lose for society, but I can't help wondering if there is more to it.
I can't shake the notion that they will be employed mainly in creating malware for the FBI rather than on chasing other outlaws.
The Abagnale reference is taken, yet you don't typically hire a ninja to trim your topiary, no matter how good he is with a sword. But if you are darn tired of that pesky neighbor, it might make sense.
The queues are typically produced deliberately, in districts that do not typically align with the party controlling the elections board. Those people on the elections board are quite competent at assuring that only the "right" people are elected.
Think Occam once in a while, not just Hanlon.
of 1080p low-latency gaming does it take to hit the "don't call it a cap" on your "unlimited data" plan and get throttled to 200kbps?
Also, how long before some buffoon walks in front of a bus while using an augmented reality headset that displays it as a coach and four unicorns?
(and as other have mentioned, how long does it take to walk out of your coverage area?)
is recalling some of their diesel autos:
I don't know about you, but spontaneous combustion seems a more immediate issue than emissions cheating.
Of course, BMW could always ask this comment to be removed as a "Right to be forgotten".
So, another "less rigged" election, run by the folks elected in the previous, rigged, election(s)?
How's that supposed to work?
Note the undercurrent in the various discussions. Dems generally favor methods that require a lot of "foot troops" to subvert, while GOP generally favor methods that require a few select points to be subverted, often at substantial monetary cost.
Back in the 1960s I read a book from the 50s or earlier about the U.S. Navy's submarine program, including a disturbing story from the early days. A naval inspector noticed a small pit on the pressure hull of a sub under construction. As a bureaucrat, he of course had a paperclip handy, and was astonished to find that the "pit" was a hole, all the way through. Rushing to the shipyard management to report it, he was confidently assured that since the hole was "above the waterline" and would be covered by paint, there was no problem.
Pressure differentials work either way, but construction by the lowest (or best connected) bidder is a constant.
To a city so tech-friendly that they can find a web-designer who doesn't make a hash of the images, or doesn't rely on images rather than text. I can see how some people would consider their "Gender Equality" (or possibly "hook-up sex") icon appropriate for "Quality of life" (at least in Firefox 61.0.2, MacOS Sierra), but I have to believe there is more to quality of life. Little intangibles like not having to cope with inept web-designers.
You need to parse that in the lawyerese sense. Maybe data was lost, but they know who nicked it, so it was not lost to an unknown party. As to whether that "knowledge" is more detailed that "User A. Nony. Mouse at an IP address 'somewhere in China'", We'll never know. And more importantly, as others have noted, neither will the customers whose data went walkies.
Note that "inland" is a bit of a misnomer. The "border" (and Constitution Exclusion Zone) surrounds any airport with at least one international flight. I don't know how frequent that flight has to be. Maybe they just have to launch a yearly weather balloon headed in the general direction of Canada or Mexico?
All your rights are belong to U.S.!
3 days in advance is plenty of time to discover problems.
What I see is far too many people showing up hopelessly underprepared and then expecting the local IT folk to drop everything to make it work.
True Dat! Working backstage for a fairly well-known conference (Well, El Reg covers it :-), I lost track of how many times the speakers, who were asked to come "on deck" backstage 5-10 minutes before their talk, showed up with "just a few changes to my slides". Yeah, we developed a process for doing these "diving catches", but it was never smooth, or justified.
An then there's the folks who used snazzy custom fonts in the PPT decks, but did not bring the fonts along... (almost as good as the "file:" URLs for images you'd occasionally see on websites. "Hey, it worked on my machine!")
Biting the hand that feeds IT © 1998–2019