Re: UK's 11 main political parties... Plaid Cymru?
I thought the leading Welsh party was Shrflyrnpchthryiacflwan (pronounced, "Dferfrywnnshpfaludnionfaelemlynmor").
52 posts • joined 6 May 2010
I thought the leading Welsh party was Shrflyrnpchthryiacflwan (pronounced, "Dferfrywnnshpfaludnionfaelemlynmor").
Total agreement, here. And this snippet: "Apple's developers deserve to be paid for the hard work..." tells me you have experience in the black arts.
As an exercise in frustration, I tried standing up a Snow Leopard VirtualBox on my MacBook running Yosemite (to keep Rosetta around). Ostensibly legal, I never got it working right. I figured it would be easier running a Hackintosh VM on Windows and gave up the effort.
One sure way to make me read an article, twice, in its entirety, is add an asterisk with no matching footnote, to wit:
"...But a 1966-style Russian linesman* ..."
Presumably, there is more to learn about a certain Russian linesman from 1966, but not from the Reg! I don't care about IoT soccer balls or Russian linesmen, and now I'm writing an angry letter about them! This was intentional, right? Thanks for stoking my OCD.
My work space is pristine. My neighbor's is a cluttered mess. By your "sure sign" rule he should be the more productive one. However, my MacBook (with a pristine desktop) holds an order of magnitude more technotes, case notes, checklists, config files, code snippets, how-tos, best practices, manuals, etc., etc.
Guess who people go to when they want something done.
Da–I mean–right on. The Russian game was to cast democracy as a disorganized, chaotic mess, as much for domestic consumption as its effect on the States. Regardless of who won, it was win-win for Putin. He gets to show Russians how superior it is to be run by a strongman, and cause America to doubt its own institutions.
I hear newscasts on both sides talk of how Russia "hacked" our election. They didn't hack the election, but they did hack our culture. They certainly tried to hack our election computers. They had about as much success as they did hacking our power grid. Not a call for complacence, but certainly a call for computer illiterates to stop overreacting and making policy in a panic.
Personally, I think the old hand ballots scaled well. That was ruined by a small number of Palm Beach morons who couldn't manage to puncture a pre-scored index card. Sorry, for saying, "moron". I'm no better than the trolls. I blame moose and squirrel.
Network latency is a double-edged sword. Sure, relatively high latencies (say, >80ms) can spoil the VDI experience with jittery screens and jerky mice. But even lower latencies (<20ms) can wreck transaction heavy, fat applications and drive them into the data center, so they live closer to their servers.
In standing up our own cloud service, our biggest revelation was the cost of VDI, both in licensing and hardware. MS license terms are confusing (intentionally, in my opinion) and lead to over-provisioning. And those fat apps–in aggregate–had a thirst for SSD storage that shamed our servers.
We run a load of VMware machines and the RAM is mostly hot-swappable.
I'm not a coder, but I read a lot of code to gain insight into problems I'm tasked with fixing. I've learned to identify developers by their peculiar spelling and grammar quirks. For example, "thier" in a comment line indicates Andy wrote that particular routine, while "there" when he means "they're" points to Bob. And, if the code contains proper grammar and missing joins in an SQL query, of course it's Carl!
Bless their hearts. I love them all.
...just call a Japanese product "nippy?"
The biggest fiction is that Russian meddling in US politics and media is something new. Russians (then Soviets) routinely planted false stories in third-world press and patiently waited for them to be picked up by the AP, UPI, AFP, Reuters, etc. for an appearance of legitimacy. With RT they simply cut out the middle man. Google and other aggregators then give RT equal play with western news outlets, more even, because sensational stories get more clicks.
Ditto. I worked for a genetics research company that employed several Slavic geniuses (no sarcasm). No one else touched the "Russian" code because it was indecipherable. They probably felt cramped by non-Cyrillic character sets limiting their options for single character variable names.
Yeah, I hate those Canadians.
...knows those monoliths were knocked over when they were trodden upon by careless dwarves.
Let's take a moment to recognize the crowning glory of material science: Corning Corelle dishes. These laminate glass wonders are as close to indestructible as anything you'll throw or drop (of course the rare failure is catastrophic and spectacular). I wish more stuff were made out of it.
I don't see how GPU driven password crackers are a legit threat. They might be able to try a million combinations a second, but most authentication mechanisms disable the account after a set number of failures or introduce an increasing delay between attempts. Or, does the doomsday scenario require the crackers be in possession of the encrypted string, in which case they can plow through candidates offline until they find a match? The latter presumes an earlier breach of security and knowledge of the encryption algorithm. Either way, I'm staying away from "aaaaaaaa", "aaaaaaab", "aaaaaaac", "aaaaaaad", "aaaaaaae", and "aaaaaaaf".
Comparing apples and oranges is not futile. It's quite easy. Whilst both are delicious, sweet, round and grow on trees, they taste quite different. Apples can be baked in pies, but oranges cannot. Apples come in a variety of colors, but oranges are almost uniformly the same color (a kind of reddish-yellow).
This article safely reinforces the worst prejudice of storage admins, which is the belief they can do their job and remain ignorant of the applications that run on their systems.
I'm a DBA (Sybase, Intersystems Cache) and a storage admin (ZFS, NetApp) for a cloud company. As a vertical market software vendor, I also deal with our premises customers' myriad other storage systems (EMC, Compellent, Hitachi, etc.). I've seen a lot of good and a lot of bad. The storage system, more than any other component, determines application performance.
There can be a real need for multiple LUNs in a database, even though they ultimately sit astride the same physical disks. Separating data from log I/O in RDBMs is axiomatic. The OS kernel may effectively serialize I/O to a single LUN whereas multiple LUNs have multiple software channels. In other words, you are clearing a software not hardware bottleneck. There could be other considerations in regards cache policies, tiering, etc. that justify multiple LUNs.
No way those were Photoshopped. The last moon landing was in 1972. Photoshop didn't come out for another 18 years! Man, do your research before making wild accusations.
Technically, it's "sex" not "gender".
One electronics shop was looted, and afterwards counted 32 more HP tablets than they started the day with.
or, in other words, piloerection. And it's only Thursday.
Surely the firearm that goes with incest is the Kentucky long rifle!
Bet Brian Kernighan is miffed.
The Brits tried to pull a fast one and turn Jerusalem over to the Arabs before they were scheduled to bug out. Didn't work too well. There was considerable animosity between Israelis and Brits at the time. The only reason the latter did anything to benefit the former was Truman twisting their arm.
Why is it every alarmist warming scenario piles on an endless chain of positive feedback loops? If the realy world worked that way, the first dinosaur fart would have cooked the planet millions of years ago. Finally, we have a model that considers a possible negative feedback, and guess what? Things aren't so bad after all.
Good one. Best use of "I for one welcome..." leitmotif in a long time. I vote we retire the category.
Sadly, not much can be done about the Aussie, but the source of the leak is another matter. If it turns out to be an American, well, treason is still a hangin' offence in these parts.
In high school I discovered I could get two TRS-80s to talk together by cross-connecting their cassette tape drive cables. The first machine thought it was writing a string to tape, but it was really read by the second machine, which thought it was reading a string from tape. I cooked up a BASIC version of Battleship to demo the concept.
There's also fault tolerance (FT) which is a very high level of redundancy, such that software is unaware of any failure. I'm thinking especially of Tandem. And then there's business continuity (BC) which is like DR but focuses less on the disastrous aspects. I'm thinking near line storage or data replication. The lines can blur but you really need prudent amounts of both. You don't want to fail over to the bunker just because one disk goes bad. And your RAID6 array doesn't help when it's under water.
All those "thumbs up" icons are making feel very uncomfortable.
I've always felt I was a lesbian trapped in a man's body.
I was so frustrated by 4.0 performance on my steam driven 3G that I downgraded it to 3.13. Not a hard process, but you can't restore apps, settings, etc. from backup. To stay on 3.13 you have to set it up as a new unit. I lost Exchange, VPN, etc. settings, not to mention Angry Birds progress.
Now I read of relief in sight. Crap.
BTW, iTunes won't let me restore from backup, even after a firmware upgrade because it's a different machine. I think I'll relax and read The Register until I calm down.
When the data you're protecting is all in an object or relational database, the DBMS usually offers another form of replication. Database replication basically consists of replaying the primary's transaction logs on a secondary system. This is an attractive option because replaying transactions instead of physical device I/O prevents many types of corruption and maintains transactional integrity. The secondary system can be used for report generation as well or other read-only uses.
Technically, it might be a verb, but it sounds wrong to my ears. If we all agree to never use it as a verb, eventually (after a hundred years or so) the OED will delist it.
Let's dialog it some more.
I haven't even figured out what a dutch lobster is. Now this!?
I guess your profile would be low if you're alway horizontal.
Once the Web gets deduped, my 9600 Baud modem becomes viable again.
Reminds me of the joke about the Texan who passed away and was too large to fit in a casket. They gave him an enema and buried him in a matchbox.
For me, at least three of those films were emotionally scarring. Didn't stop me from showing it to my kids, but still.
The Taliban came after, fought, and displaced, the Mujahideen. The people we armed to fight Russian invaders were Mujahideen. Taliban largely sat out that fight, or were too young.
Isn't that how Catherine the Great met her end?
As a vendor SE, I had the misfortune of attending a meeting of LA Times execs after they all received their Newtons. The meeting was constantly interrupted by, "hold on!...(scribble, scribble)...okay, go ahead...hold on...(scribble, scribble)...". My comment about witnessing the human equivalent to XON/XOFF flow control was not appreciated.
Those in the room with Tandy Model 100s had no problem keeping up. Ah, the Model 100, stalwart of newsrooms everywere, that's a computer you should memorialize.
Tombstone, to represent beloved gear of day gone by.
...if IT stands for Interspecific Transgendered.
How many ToughBooks does Panasonic sell of any model, and how can the thieves expect to unload all that gear? Obviously a pro job, so they had to have an end game. Frankly, I'd be more worried if they spent nine hours playing with the laptops and then left them in the warehouse.
Something of the future that isn't constructed of ISO containers! I wonder if they are fully compostable.
Is his pride anything like Navin R. Johnson's special purpose? I mean, was he holding it in his lap?
Surprised you Brits missed the significance of the red X. Clearly the X is the Cross of St. Patrick and Steve's mug replaces the Crosses of Saints George and Andrews. Hats off, and salute your new Union Jack (thumb-side down, of course)!
I think superimposing the X-Men logo on Steve's hypnotic stare gives him a certain Prof. Xavieresque mien. Fitting for someone with the ability to produce shiny gadgets that control minds.
Parents and pornographers both have an interest in keeping kids away from the stuff. The latter if only because kids don't have credit cards. The former because they bought the damn computer to do homework on.
This kind of initiative is usually quashed by prudes under the misaprehension that a porn-only TLD somehow promotes the stuff.
Biting the hand that feeds IT © 1998–2018