As a dev system?
I seem to recall that in the very early days of the Macintosh, you needed a Lisa to develop any software for it. (This from a some computer magazine article at the time).
1425 posts • joined 18 May 2007
2017 < 2019
Maybe, maybe not. Around that time, the rules for computing the term of patents in the U.S were changing from the time of granting to the time of filing, and the patent term changed from 17 to 20 years, and existing patents could pick whatever would produce the longest term. And there can be continuations of the filing. So figuring out when a patent expires is not so simple. A system designed to keep lawyers occupied...
There is probably no terrestrial plant that can handle that (aside from perhaps Antarctic lichens, but they aren't plants, strictly speaking). In northern latitudes, many plants survive winter, but the temperatures never get as low as in the lunar night, and they prepare for it during the summer and autumn: drop leaves and pump valuable stuff to roots like most trees do, or it is only the root system that survives.
Seeds might survive, but in the Chinese experiment these apparently had already germinated.
So their can is full of totally dead things by Lunar morning.
> Choose-your-own-adventure entertainment
Yes, the Black Mirror episode was a bit underwhelming (a bit fun when you choose the "sign" on the main characters screen to be "Netflics"). There was a Playmobil film about pirates that implemented this idea just as well on a DVD, had it once borrowed for the family.
> The mask itself, likely made from a plastic polymer of some sort, would be a fine ignition source.
Doesn't this mean the real problem is the material of the mask? It should have been made of something that does not burn in pure oxygen.
Reminds me of the about only SQL application I made, calling MySQL from a command-line program. Fairly simple, just two or three tables. One operation was entering a lot of record from a file into the tables. Worked fine and quickly locally for even a quite large file. Released it and soon people from a China office complained the enter from file operation took hours. Turned out the latency killed it, the db was in Finland, so each MySQL command paused for the round trip, waiting for response, and several were needed per each entry! But fortunately I found a fix that made the speed tolerable: pack the per-entry operations into a stored procedure, and call that with the data to be entered. It was also possible to send several (around hundred) of these calls in one MySQL api call.
without climate change, most climate researchers would not have a job
Unlikely. There were climate researchers long before this became a hot item. Hard to say how much it has affected the number of persons working on it, but I doubt it has even doubled or something like that. By contrast, without homeopathy there would be no homeopathists at all. Another difference is that climatology is a science, where evidence makes or breaks theories. Not like pseudosciences, where "researchers" concentrate on confirming the particular fallacy. If global temperatures started falling, and it would continue falling for years, the climatologists would eventually admit they were wrong. But nothing would convince homeopathists that all they see is at best the placebo effect.
Tag expansion also happens in RCS, CVS and Subversion (in the latter it has to be enabled in the properties of the file). The difference is that the tag trigger notation in these ($id: ,,,,$ and some others) stays in the file, in SCCS the magic strings expand to version numbers without the triggering character sequence.
Git lost this feature, because it is seriously contrary to its idea of identifying versions with a hash of the file contents. Expanding a version tag would make the file be of a different version in the eyes of Git. A loss, because the embedded file version numbers have often saved my sanity by allowing a compiled program identify what file versions it has been put together from.
The version control system must have been SCCS, which was for years the standard tool for this on Unix. It has this weird default of removing the edited copy of the file when you check in the changes. There is an option to immediately check out the read-only copy, but it is not the default behaviour.
This is just one example of the grand challenge western civilization is facing now. Do we have the guts to stick to the hard-won principles of human rights and the rule of law, or do we sell them for a bowl of soup, like Esau in the Bible?
[Gets down from the soap-box, picks up the sign saying "Repent!"]
Sounds like that angle of attack sensor should be triplicated. How else can the software decide which sensor is bad, if both produce plausible values (one being wrong, but not impossibly so).
- And the same for goes for all other safety-critical sensors.
Paintings are three dimensional objects and a photograph rarely does them justice.
Depends on the style. Old masters worked with very thin paint layers, and their works are pretty much 2-dimensional unless viewed with a magnifying glass. Slapping on lots of paint became fashionable only in the 19th century.
Even then, a well-made photographic copy, especial if printed on canvas and framed, is very convincing from some distance.
Could hit Perl, perhaps, but in the case of C (or C++) there is no tradition of automatically pulling dependencies off the web whenever you build. Your program typically depends only on libraries that either are part of the platform, or ones that you explicitly install beforehand. In the latter case they usually come from a vendor, or (typically in Linux or BSD) from the curated and digitally signed collection of packages the distribution maintains. These mechanisms make slipping bad code in harder (Not impossible, but much harder).
> Tablets are great as a reader, media player, general surfing and for occasional games but frankly quite useless for workstation chores.
Exactly what I have been saying all along. The tablet is the IT equivalent of a television: a device for consuming content. Very useful in that role (my household currently has two iPads), but if anything needs to be done, it is time to open the laptop.
> 15 years ago with office 2003, Microsoft implemented a macro security setting called "high", which [...]
But the results are already in: The continued success of Word macro attacks shows this approach does not work in practice. For getting any security, macros need to be seriously restricted, or the feature removed entirely.
it is rare that they have anything unique.
Disagree here: The Washington Post, along with The New York Times, is one of the places, where most other news outlets copy their U.S-related news from. So you get it first by reading WP. As for cookies, that fight was lost long ago, and efforts to fight them have just caused each site to have the annoying cookie acceptance pop-up that most people click anyway without thinking. A total waste of time. GDPR did not change anything in practice.
Indeed, it is as if Microsoft wants users to switch to Android. I agree WP8 was a huge advance over its successor! I switched last summer as a experiment (to the Samsung my son used to use - nowadays he get the latest tech, and me the second-hand :-)), but the WP10 Lumia phone has been sitting in my drawer as a backup. I guess better not switch it on, until MS fixes their latest fix.
I kept reading to see what new processor architectures would be added, but these appear to be only variants of old ones. A new ARM-based chipset? AMD Zen variant? Do not count as a new architectures in my book. The difference would be just in some device drivers, and some initialization code. Neither introduces a totally new instruction set.
Personally I "deprecated" both Gnome and KDE years ago. Bloat without any real gain. XFCE is what I have long used, and I notice most of my co-workers do likewise. Mate is also popular. However, I am a bit concerned whether XFCE or other light-weight desktops will be supported in the brave new Wayland world, as it appears to push some of the grunt work X11 used to do into the desktop environment.
> but IPv6 seems to be far more bug prone than v4, and problems are rife in all implementations.
That is simply because it is currently less used. Bugs of this nature plagued IPv4 previously, before extensive usage sanded its edges. I remember reporting a somewhat similar IPv4 dhcpd problem to Red Hat about 15 years ago. Not as serious, it was a case of the server failing to recognize a packet that was correct according to the specs. In that time-frame, you could blow up just about any IPv4 service with malformed packets.
The sample makes it look like it mainly made different word choices, something even age-old joke programs could do (like the classic "jive filter"). Changing style meaningfully requires more. For example, one author could use shorter sentences, another one longer, present things in different order, use more or less similes, and so on.
The God bits don't bother me, but why should there be for example
54. Speak no useless words or words that move to laughter.
17. Bury the dead.
is not so relevant in today's society, where bodies are handled by specialists. I guess this was not the case in St Benedict's day, so he exhorted monks to take care of stray bodies in the gutter.
So it was NT 3.51 to Windows 95? That was a downgrade in terms of security and stability. I used NT 3.51 for a while. Possibly the least crashing Windows I ever had. Unlike later versions, it still followed Cutler's original architecture that tried to minimize kernel mode code. Of course it had the bit clumsy Windows 3.x ui.
Last night wached on YouTube techmoan channel (recommended!) how the guy made an old police interview recorder work. This is a specialized c-cassette recorder that makes two copies of an recorded interview and adds audible time marks on the second track (of what would normally be the stereo pair). Also makes it harder to tamper with the tape. Apparently such recorders are one reason you still can buy new c-cassettes. Reassuring.
Biting the hand that feeds IT © 1998–2019