* Posts by Peter Gathercole

4213 publicly visible posts • joined 15 Jun 2007

After four years, Rust-based Redox OS is nearly self-hosting

Peter Gathercole Silver badge

Newcastle Connection, or Unix United

Well, strictly speaking /../ was a super root with the other systems on the network seen as directories, so you would access files on system-B as /../system-B/usr/something, with the full file tree being available. You did need a common user and group space, of course, so the permissions would work properly.

I only saw the Newcastle Connection running using a Cambridge Ring in Claremont Tower, so I do not know how well it coped with multiple network types, but I there was a serial network driver as well.

The interesting thing about the Newcastle Connection was that it was a library only implementation, meaning that you did not have to make kernel changes to implement it, as long as you had a suitable network device in the kernel. You just needed to re-define the file handling library calls like open, close et. al., and ensure that you linked against the modified libraries in order to use it. If you had access to the source code of the libraries and commands linked against it (or even the pre-linked .o files and suitable libraries) you could add the facility to pretty much any implementation. I saw it on Bell Labs. Edition 7, BSD, Xenix/11 (Microsoft's port of Edition 7 for the PDP11), UniPlus, and I think Durham had it running against Ultrix/11.

I was needing some software for my PDP11, and I was helped by Dr. Lindsey Marshall who copied it from one system on the Cambridge Ring to a tape drive on another, by using a command like:

tar -cvf /../system-B/dev/rmt0 *

Because it honoured all device semantics, you could access devices on another system as devices, something that NFS took years to manage. Of course, AT&T's RFS available in R&D Unix could also do the same, something that I had fun playing around with it later when I was working at AT&T.

The Newcastle Connection was a very elegant system, but when I saw it, it was pretty much restricted to UNIX, although there as a project to write some client support for CP/M using a serial device as the network at Newcastle Polytechnic, but I don't think that the project was ever completed, although I was asked to add a serial driver to the PDP11 I looked after.

UK political parties fall over themselves to win tech contractor vote by pledging to review IR35

Peter Gathercole Silver badge

Re: So why'd you do it then? @Rich 2

The reason why I used PSC as a term is because it does have a meaning in communications from HMRC, albeit not a one in law.

It is currently used to describe the type of company where there is one director, the services are provided by the director, and the shares are all owned by the director.

When IR35 first came in, a company had to have two directors, and it was normal for one's spouse to be the other director, with the shares split in some manner between both people. If the professional services offered were done by just one director, it still counted as a Personal Service Company.

It was never a term that defined anything to do with tax legislation, just one that HMRC used as convenient shorthand for a type of company they wanted to treat separately, even though at the time there was little else in law to differentiate these companies from larger ones.

Peter Gathercole Silver badge

Re: So why'd you do it then? @Rich 2

You've missed the point.

When IR35 was first mooted, and increasingly as it has morphed into what we have today, the premise was that the 'companies' and 'small businesses' were really not companies at all, but a vehicle to be employed by a company with some significant financial benefits. So they introduced the term 'disguised employees' and then deemed that their Personal Service Company (PSC) was not really a business at all, so did not fall into the category of either businesses or companies, and thus are not in scope for his statement.

In addition, for tax purposes, self-employed and employed by a PSC are completely different things, even now. So they can very easily claim that they are supporting the self-employed while taxing the hell out of a PSC.

The problem they have is differentiating a PSC from a larger company with more employees. As far as corporate law is concerned, there is not a lot of difference between a PSC and a small employer/SMB. There are some accounting and audit differences once you get over a certain level of revenue, but most of the tax/PAYE/dividend rules are largely the same for joe_blogs_it_systems Ltd, and the domestic larger IT consultancies like Capita, Deloitte, NTT, PWC, Earnst and Young etc.

So they want to put rules in place that hit PSCs, but do not affect the larger PLCs. And so far, they've been vary poor at it. Now with the wave of a legislative wand, the treasury want to put laws in place that threaten the engaging companies rather than the PSCs, hoping that the large companies will just turf over the yax and NI while still engaging the contractors. But actually, the large companies are so risk averse that they will just stop employing contractors and taking the people onto the books, but at permie rates not contractor rates.

Of course, if this happened, the tax take would actually go down, so one wonders whether this may end up being an own goal!

Alternatively. we may actually see a rise in the number of IT professionals engaged through the large consulting firms, which would probably benefit nobody other than the shareholders of those firms!

Peter Gathercole Silver badge

Re: Smoke And Mirrors @DontFeedTheTrolls

Actually, your statement about assessment, although true, is not the only thing it changes.

It also changes who the obligation to pay tax and national insurance sits with.

If a contractor is deemed inside of IR35, then the engaging client, or one of the intermediaries between the client and the contractor's company has to pay the PAYE and NI to HMRC, not the contractors company. This is a huge change. This obligation also exists if HMRC challenge the IR35 determination for a contractor. If the contractor was deemed outside, and HMRC challenges it, it falls to the company that performed the IR35 determination to pay for the back tax and NI HMRC deemed is owed.

It is the risk of the IR35 status being overruled by HMRC that has the client companies running scared, as if a client with a significant number of contractors suddenly has to pony up tens of thousands of pounds per contractor, the financial risk becomes very significant, even to banks and insurance companies.

And it is then the case that if it wanted to challenge this in the court, the court costs will also be significant.

I expected some of the larger companies to try to defend their position against HMRC, but it seems like HMRC have persuaded them that the risk is too great to take the chance. So it's really HMRC sowing FUD with engaging companies, with no real idea of whether they will follow through with their threats!

From the contractors side, it has been argued that if a contractor stays in the same role, and accepts that they are inside IR35 when they had previously self assessed themselves as outside, that gives HMRC a lever to chase back tax and NI for the whole of the time the contractor has been in the role as the previous assessment was obviously incorrect. This has contractors running very, very scared, as very few of them are likely to have the money to pay this readily available. This is why contractors are looking to leave their current contracts before the end of March next year.

And this is all happening before we even know that the legislation will hit the statute books (it's still draft legislation!)

Beware the trainee with time on his hands and an Acorn manual on his desk

Peter Gathercole Silver badge

Re: Ah the good old days @me

Bugger. I really ought to either read my posts more carefully before submitting it, or not read them after the editing time has expired.

It was an early version of ADFS that we had, which allowed the support of hierarchical directory structures on a hard disk, not ANFS. It may have also had ANFS, but I think I first saw that on a Master128.

Unfortunately, memory is fading on this time in my life!

Peter Gathercole Silver badge

Re: Ah the good old days

Hmm. have to go back to my documentation. I don't remember setting links on the system board itself, I'm pretty certain it was on the keyboard for the model B, but you may be right about it not being the normal switch block, but links on the other side of the keyboard. I'm pretty certain you could put another 8 switch block, allowing you to set addresses from 1 to 254. 0 and 255 were special, and the documentation talked about having a special router node, numbered as 255 IIRC, probably a system 3 or 4, allowing multiple Econets to be linked together.

I only set up one network with about two dozen stations, back in the early '80s. My network was mostly model B's with a couple of Master 128s added at a later time, and I believe one of the first Econet Level 3 fileservers (with a very early version of ANFS) sold, with a 10MB hard disk, and another model B acting as a print server. The fileserver was so new, there was no printed documentation on it!

I'd take my BEEB apart if I had it with me, but I'm away from home at the moment.

Peter Gathercole Silver badge

Re: XWindows

This could be prevented with the correct use of xhost to close down access to the X server, and if you had a shared filesystem could also be controlled quite easily using Magic Cookies.

And of course, if you are really careful, you use X protocol tunneling in ssh, although there are ways of subvirting even this.

Peter Gathercole Silver badge

Re: No one has mentioned Elite?

The ultimate controller IMHO was the BitStik high precision joystick. The throttle was a twist on the joystick, and the extra buttons could be used to change the view.

Peter Gathercole Silver badge

Re: Ah the good old days

* represeented an OS or sideways ROM command, not just Econet.

Basically, when the CLI parser saw a line starting with a *, it offered it to each sideways ROM in the system in the order of priority (I think it went from 15 down to 0), and if none of the sideways ROMs claimed the command, the OS checked against itself, and then looked at the currently active filesystem to see whether there was a command that matched in the current directory.

Econet was implemented as just another sideways ROM, and also provided a filesystem type.

Acorn did a really excellent job of designing the BBC Micro operating system, something it started in the System 2 and Atom days, and continued on into Arthur and RiscOS on the Archimedes and RiscPC.

The only real problem with the BBC and Econet is that it was completely impossible to secure the network.

There was the concept of a privileged workstation that had higher capabilities than the rest of the network. It was identified as having a station number of 0 (the station number was set either by soldering links on a location on the keyboard or fitting an 8 switch DIL switch in the same location (we used to call them DIP switches, can't remember why). This was read into a memory location when the BEEB was turned on, but unfortunately, the BEEB having no protected hardware, allowed the station number to be overwritten by whoever was on the system. This gave anybody the capability of becoming station 0.

There was a similar byte that could be overwritten with the current user ID, which identified you to the network, allowing you to masquerade as anybody on the network!

So Econet was good in principal, but unfortunately not so good in practice.

This news article about the full public release of OpenAI's 'dangerous' GPT-2 model was part written by GPT-2

Peter Gathercole Silver badge

Not sure I agree about easy to check

If these tools can churn out almost meaningful text given some input, then all it takes to poison social media is for it to be able to produce seemingly consistent, but different text on a subject, and shotgun it across the different social media platforms.

As soon as a casual check from multiple sources appears to confirm a story, others will comment, referencing the other platforms and reinforcing the misinformatiom, it becomes "true" as far as the Internet and many, many of the users are concerned.

Just having one of these things contributing to Twitter threads et. al. on a regular basis to 'confirm' false facts is very dangerous.

I'm interested in seeing what amanfrommars1 says on this.

Remember the big IBM 360 mainframe rescue job? For now, Brexit has ballsed it up – big iron restorers

Peter Gathercole Silver badge

Re: Disposal cost

Was it a 360/67? I was at Durham between 1978 and 1981, and then worked at Newcastle Polytechnic (also a part of NUMAC - Northumbrian Universities Multiple Access Computer) from 1982 until 1987.

When I was there, the 360 was running batch workloads under MVS or one of IBMs other batch OSs, and MTS was running on the 370 doing both batch and interactive work. I only wrote a single program that was executed on the 360 as an exercise in the IBM JCL in the computing course I was on.

While I was at the Poly, the 370 was replaced with an Amdahl 5730 (I think, I might be wrong on the model number) over one weekend. It was painfully slow on the Friday, and quick on the Monday. I don't know how difficult the work actually was, but I'm thinking that they kept the same FEPs and DASD strings, just replacing the CPU, memory and swap cabinets. I'm sure it was not that simple, but I just don't know the details.

Durham also got their own IBM 4370 (again exact model number may not be right) air-cooled CMOS system sometime in the mid '80s, also running MTS.

Peter Gathercole Silver badge

Re: Disposal cost

IBM Hursley is/was a development lab. and thus is not under the IBM UK company, but reports directly to the US holding company. The full company name is IBM UK Laboratories Ltd.

The Hursley site is not full any way you look at it. Some space is leased out to bits of IBM UK (for example, the remains of the UK Software Centre and parts of the TSS Hardware Front Office) is in Hursley. This has happened as other IBM locations in Basingstoke and the South East have been closed.

UK CICS support and training, and some other Z Series support and training is done at Hursley, although I believe that the main CICS development was transferred to Toronto some time back. I think there is also some Storwize/Spectrum Virtualize development still done there, but there is now very little in development work done anywhere in IBM in the UK nowadays.

I also think that Hursley may be one of IBM's UK cloud centres.

Peter Gathercole Silver badge

Re: Disposal cost

You nay have a point, but as there are very few operating System 360 or 370 systems left in the world, the chance of obtaining a near complete example of either is a chance to be jumped at.

Unlike your example of Concord, which would be almost impossible to return to operational status (see the trials of getting Vulcan XH558 to fly again), there is a chance that one or both of these systems may live again.

Both 360 and 370 were hugely influential, both in architectural and construction terms for the whole of the computing industry, introducing the concept of documented near-open architectures, plug compatible peripherals, solid-state electronics, common instruction set across all models, and introducing the concept of backward compatibility that even extends in some degree to the latest z15 systems today.

You could argue that this is all available under emulation, but until you are in the presence of one of these things quietly rumbling away in a machine room, you don't really appreciate how big they were!

What I'm surprised about is that IBM Germany of UK have not themselves provided any resource, as even they don't have a 360 or 370 in their Hursley (UK) computing museum (not sure about Germany). Mind you, even to them these machines are ancient history, as I doubt that any hardware engineers from this era are still working for IBM. I only have vague memories of working on these types of machines from my time at Durham University, using both an System 360/65 and a System 370/168, and I'm getting towards the end of my working life.

Running on Intel? If you want security, disable hyper-threading, says Linux kernel maintainer

Peter Gathercole Silver badge

Re: Desktops and browsers @LordVader

This is not really the case. Yes, much of the code is in signed RPMs or DEBs, but that only goes so far.

There are many other routes to get code on your system, which include Perl CPAN modules, browser extensions, desktop extensions, Java and Javascript running outside of a browser, and pretty much any high capability scripting language, especially those that allow the use of online code repositories, of which there are now plenty.

The flexibility of having client side code execution comes with many, many security implications, many of which are not even obvious unless you look at how these features are implemented.

Also, using a browser to execute complex applications is becoming much more normal with the G-suite, Office365 and all the other cloud based services. It soon won't be a minor piece of functionality, but the norm, as it is on Chromebooks now.

Peter Gathercole Silver badge

Re: Same process = no problem @Traveller

Whilst in general I agree, it is now the case that within a browser, each tab is run in a separate thread, with protection between the threads (there was an article about this in Firefox a few months ago).

As each tab could be running client side code downloaded from different servers, each in their own thread, it is necessary to have some degree of protection to prevent code in one tab getting information from another tab (imagine if you are doing some online banking in one tab, which could be spied on from a tab running some 4Chan or LOLcats pages in another).

So it is not safe to have hyperthreading turned on even inside a single process.

In addition to this, as most OSes schedule at a thread level, not a process level, it is practically impossible to have hyperthreading turned on in one process and not in another. Maybe on a core-by-core basis, but then you have all sorts of core affinity problems, and that does not solve any problems!

I'm not Boeing anywhere near that: Coder whizz heads off jumbo-sized maintenance snafu

Peter Gathercole Silver badge

Re: Rs 6000 powerful but tiny

Should have bought a RS/6000 model 930H. Same machine in a rack (with quite a lot of empty space, which you could populate with I/O drawers containing disk or 5.25 format tape devices). You could also put a UPS in it. Much more expensive, though.

Still did not make it a mainframe, although on most integer and all floating point calculations it beat the pants off contemporary mainframes. The leap in speed that the RS/6000 introduced really gave the industry a bit of a kick up the pants, although HP responded quite quickly, with IBM and HP introducing new systems to leap above the over seemingly every quarter for a few years.

And then came the Alpha...

Some assembly required as Dream Chaser mini-shuttle's empty husk arrives in Colorado

Peter Gathercole Silver badge

Re: Sierra Entertainment

Surely it would be Roger Wilco from Space Quest.

Pass me that broom!

Chemists bitten by Python scripts: How different OSes produced different results during test number-crunching

Peter Gathercole Silver badge

Re: Stating the bleeding obvious part #261

I upgraded a system from Windows 95 to Windows ME so that I could get some 3D drivers to work for some graphics card that did not have them for Win95, but did for WinME.

I actually found it pretty stable, especially once whatever game was running took over the system.

Peter Gathercole Silver badge

Re: Fixing the symptom…

On a UNIX-like system, the i-node order matters not one jot. Each directory entry contains a file-to-inode mapping, and the directory file is what is accessed when you look at a directory contents, and the i-nodes appear in any order.

On almost all UNIX-like systems, when you look at a file in a directory, the named entry is looked up, and then if more than just the name is required, the i-node number is fetched from the directory entry, and the i-node read to get the rest of the required information (which is pretty much everything about the file other than it's name).

If your OS has it, you may be able to use the ncheck (ancient UNIX command predating fsck, along with icheck and dcheck) utility to read the inodes in sequence.

Peter Gathercole Silver badge

Re: Fixing the symptom…

The order of files in a directory is not always the sequence of creation. Several filesystem types keep the filenames in something other than a date ordered list. In this case, it will be the order that the directory structure is traversed.

JFS2 on AIX keeps the entries in the directory structure sorted according to a particular collating sequence that is set by the base language that the system has (and re-sorts it every time a file is created). GPFS uses something like a B-tree structure in a meta-database for the directory entries. I have seen some other things, but can't remember any more off the top of my head.

And please note that some collating sequences are not [A-Z][a-z} sequence like ASCII. I remember when iso8859 became common, and the collating sequence for this is something like AaBbCc.. etc, so when doing sorts and particular transliterations (using tr) you get some very unexpected effects.

Mission Extension Vehicle-1 launches to save space from zombie satellites

Peter Gathercole Silver badge

Re: FAB

I know that it was done for a feature film, with better budgets, but all of the Zero-X model making and filmography was absolutely superb for the time, and still stands up to some pretty close scrutiny when using freeze-frame on large TV's from DVD today, something that was never imagined at the time.

COBOL: Five little letters that if put on a CV would ensure stable income for many a greybeard coder

Peter Gathercole Silver badge

Re: Legacy items on your CV

It's not that difficult as long as you know you both know the greek alphabet with the additions like Quad, Floor, Lamp etc. All of the functions have recognizable names.

I'm sure than anybody listening in would have been mystified, however.

Peter Gathercole Silver badge

Re: You know it was mostly created by guys...just saying @Esme

My first job in 1981 was in the DP department of our local government.

In the team was a Manager, who was a man, two Data Analysts, both women, four Programmers, one of whom was a woman, and a Data Prep team, who also acted as the operators, all six of whom were women.

So out of 13 people, the men were a minority 9 to 4. And I think that most of the Data Prep. team were paid more than me and the other junior programmer (a man), so the salaries weren't skewed towards the men either (with the obvious exception of Manager, of whom there would only ever be one).

Peter Gathercole Silver badge

Re: CBM64 - COBOL compiler

I have to ask who actually thought COBOL on a C64 was a good idea!

I know that there were versions of Pascal for various 8-bit micros, but putting a compiler on a micro that does not really have the ability to do concurrent input and output to a filesystem.

The best I found on an 8-bit micro that the Acornsoft Pascal that was sideways-ROM based, so you could edit in memory, then compile in memory without either the editor or the compiler occupying any of your (rather precious) memory. It would also allow you to read the source from a file so that you could maximize the size of the program, but doing this from ECONET was terribly slow, as it would read it one character at a time with Acorn NFS (ECONET Level 1 or 2) as shipped with the original Model B with Econet. ANFS worked better, but raised PAGE by several pages.

I wrote a buffering system that used the RS423 and cassette buffers to read 256 bytes off the net at a time which speeded things up hugely!

Actually made our lab. of BBC micros a useful teaching tool for Pascal as well as structured BASIC and it's main reason for being, as a Computer Appreciation lab.

Peter Gathercole Silver badge

Legacy items on your CV

I have one line on my CV that mentions that I had learned APL when at University between 1978 and 1981, and I recently (less that six months ago) got a phone call from an agent who was desperate to find someone who even knew what it was for a role in Sweden (I think it was for Saab Defence).

He said that he would put me forward if I wanted, as the client did not want to train someone from scratch, and that the rate was very good.

I declined, as I was not looking for a contract abroad and even though I loved working in APL, it was 40 years ago dammit!. But it does show that sometimes keeping legacy things on your CV can throw up opportunities.

Peter Gathercole Silver badge

Re: My first programs were in COBOL

Long turnaround of card decks is why I used to check the RC of the compile in the JCL. I would speculatively put a test run in the same deck as the compile, so that if it compiled successfully, I would get at least one cycle's worth of debugging.

And if it didn't compile, the test was never run, preventing me wasting any machine time. The only thing that was wasted is the minuscule amount of energy moving a slightly larger card deck around.

I'm sure the managers didn't understand conditional execution in a JCL stack, because they kept checking that I wasn't wasting system time.

Peter Gathercole Silver badge

Re: First language @big_D

I echo your comments on RPG/II.

I left Uni. in 1981, having been formally taught PL/1, APL and 6502 assembler, and having taught myself C on UNIX editions 6 and 7 on the PDP11/34 that the School of Maths (computing was still considered a mathematics discipline at the time at Durham) operated for fun and research projects.

I fell in to a job at the Borough Council at my parents home town (allowing me to move back with them), and was put through a crash self learning course for RPG/II on a Sperry Univac 9/30, and initially found the language confusing (the implied loop cycle, something I appreciated later when I started using awk), limiting, and very difficult to code anything complicated other than read-a-record, do some calculations, write a record (either to a disk file, or to the printer).

A year later, having been told that I did not merit a pay rise, even though I had explored many of the more obscure features, nothing had changed my basic opinion, and I remember calling RPG/II a jumped-up macro assembler (which, in hindsight was actually flattering to it) to the Borough Treasurer when he was trying to claim that it was actually a very high-level language (his claim was that the compiler did all the work so the programmer did not have to). I pointed out that the compiler had very little work to do, as the limited set of operators were not that different from the machine instructions, and the condition codes mapped into the processor condition registers almost exactly. All it needed to do was keep track of variable names and any exception processing.

I was so angry that I actually said something along the lines of the fact that he wouldn't recognize a real high-level language if he saw it, but he at least did not fire me straight away, but let me find a new job and work out my notice.

IT workers: Speaking truth to douchebags since 1977

Peter Gathercole Silver badge

Security?

If a lowly student had sufficient access to the compiler to be able to hex-edit the binary, I suggest that the collage should have found a better way of installing the compiler!

Or use an OS with better protection.

When I worked as a support tech in a UK Polytechnic in the early '80s, on the systems without hard-disks, students could check out tracked numbered copies of the application disks (and were given a stern telling off/threat of being kicked off the course if these copies were not returned). If a copy was altered/damaged, it was simple enough to either re-image the disk, or destroy it and make a new copy.

This approach was checked with copyright auditors, who accepted that as long as no more copies were in use as were purchased (and that this was sufficiently well tracked), they would not complain.

Peter Gathercole Silver badge
Gimp

Ah, the Moderatrix

I used to word my comments with an eye on getting her to jump in to the comments on a story.

Fond memories.

The D in Systemd is for Directories: Poettering says his creation will phone /home in future

Peter Gathercole Silver badge

Re: Some of us ... @Jake

One of my personal major achievements was getting Redhat 4.1 (not RHEL) running on a pre-Thinkpad IBM L40SX (80386SX at 20MHz) in about 1997, it was the only laptop I had at the time. I had to do the initial boot off floppy, and load all of the rest of the packages over SLIP from a desktop system running the same version. as it did not have a CD ROM drive and pre-dated USB. I think that it also only had an 80MB disk, which was a bit of a squeeze.

I even got XFree86 running!

Peter Gathercole Silver badge

Re: Good encapsulation, Dr S

IBM learned about registries all the way back in the 1990's.

AIX implemented a registry called the ODM with AIX 3.1 on the RS/6000. It went down like a lead balloon with almost every technical user of AIX criticizing it (including many people in IBM itself!)

Nowadays, although it's still there for some things (like device configuration and software inventory tracking), almost everything else is using flat files.

This is what experience shows us works.

IBM hears the RISC-V kids partying next door, decides it will make its Power CPU ISA free, too

Peter Gathercole Silver badge

Re: "it's a RISC-like architecture that grew out of PowerPC"

They've gone back to POWER branding.

There has a hiccup with PowerPC around the PowerPC 620 processor, and most of the current processors are derived from the Apache 64 bit POWER processor (also known as RS64) developed for the Power AS/400 systems at Rochester, Minnesota, not Austin. Texas.

Power4 was a converged processor that provided supersets of both PowerPC and earlier POWER processors. The last PowerPC branded processor, the 970 and it's FX, GX and MP variants was itself derived from Power4.

Peter Gathercole Silver badge

Re: Complements the RISC @Michael Wojcik

I have a copy of that document. I was quoting it from memory, as it is at home, and I was away when I wrote the post.

Peter Gathercole Silver badge

Re: Complements the RISC @martinusher

It's quite debatable whether POWER is really RISC, although IBM came up with a couple of really bad bacronyms - "Performance Optimization With Enhanced RISC", and "Reduced Instruction Set Cycle-time" (this one is seriously bad, and goes back to the RISC System/6000 days, when IBM actually thought it could redefine RISC).

The POWER ISA has more instruction types and addressing modes than many CISC designs, although it does run instructions at or near the clock speed (or faster when you consider super-scalar execution), and does have a large register set, which are, or were, some of the defining concepts for a RISC processor.

The Reg chats to HPE's HPC man about NASA's supercomputers, lunar ambitions and Columbia

Peter Gathercole Silver badge

Public cloud supercomputing

The thing that many people forget is that supercomputing is as much about the interconnect speed and latency as it is about the basic CPU grunt.

Public cloud can stand up vast amounts of CPU resource, but if you can't shunt the data between the nodes fast enough, significant computing problems that rely on stepped iteration between many parallel compute engines will stall every communication phase of each iteration.

This is the reason why Cray have the Aries Interconnect, and IBM developed their HFI, each running elegant and complicated node-to-node topologies like Dragonfly.

Many people think that fat tree Infiniband is the bees knees when it comes to interconnects, but these people just don't understand the total combined bandwidth of these more esoteric interconnects.

The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they're typed over the network

Peter Gathercole Silver badge

@carl0s

If you use password authentication with SSH (rather than keys), the password will pass, all-be-it encrypted, across the network.

Some organizations prefer this over public/private key pairs with passphrases, because it gives them some control over the frequency and strength of the password used, as it can be expired and checked at the time it is changed. If you use keys with passphrases, with bog-standard SSH, you cannot expire a passphrase, and I've not seen a passphrase strength checker in the SSH implementations I've seen.

You also have the problem if the private key leaks, even if you change the passphrase on the primary copy of the key, the stolen copies will still have the old passphrase associated with them.

I know you can (and should!) get round these weaknesses by using some form of network key repository with auto key regeneration (to allow keys to be aged), or at least using ssh-agent, or maybe even Kerberos (I've used Kerberos, but not the Kerberos support built into OpenSSH), but many organizations think that just implementing SSH is enough. I've never rocked the boat by suggesting anything better, but then again, I've not been in early enough for most of the projects I've been working on to get it accepted early enough.

Another sign of the End Times: Free software guru Richard Stallman speaks at Microsoft HQ

Peter Gathercole Silver badge

Re: "RMS isn't opposed to money or profits or charging for sorftware -"

I think the term "Free Data" is not appropriate here, because it could be seen as running completely against data protection legislation.

We need a term that says that the data is not encumbered by the systems it is stored on, not one that implies that data should be available to everyone (which is implied by drawing parallels with Free Software).

Unencumbered data maybe? System agnostic data?

Interested to hear other peoples thoughts.

The time a Commodore CDTV disc proved its worth as something other than a coaster

Peter Gathercole Silver badge

CDTV disks (and cover CDs) may have been hybrid disks with audio, video and data on them.

In fact, given the way that the CDTV worked, I suspect that this probably was the case.

Peter Gathercole Silver badge

Re: Any key

Mine is "Keyboard not present. Press F1 to continue"

SpaceX didn't move sat out of impending smash doom because it 'didn't see ESA's messages'

Peter Gathercole Silver badge

Re: Which way is Right?

"The enemy's gate is Down"

Ender reference. Excellent.

Windows 10 S to become a 'mode', not a discrete product

Peter Gathercole Silver badge

Re: ... Microsoft Store ...

The next step will be for Microsoft to mandate locked boot loaders to prevent systems supplied with Windows 10S from being used with Linux or ChromeOS.

They have form (in the original Surface with Windows RT).

Can't bear to part with that well-worn copy of Windows 7? Microsoft might let you keep it updated an extra year

Peter Gathercole Silver badge

Re: The cost of Win10 is far too high.

It's funny. Many years ago, I remember Emacs advocates being shot down in the forums for having to perform keyboard gymnastics to get anything done.

And now we have shortcut key sequences being recommended for Windows 10....

Irony, much?

My god, it's full of tsars: A gun-toting Russian humanoid robot is on its way to the International Space Station

Peter Gathercole Silver badge

Too close!

My thoughts are that Fedor sounds too much like Fagor, the gun-toting autonomous robot in Earthsearch!

Lenovo ThinkPad X390: A trusty workhorse that means business but it's not without a few flaws

Peter Gathercole Silver badge

Re: Interesting

I bought a T400 from Ebay a wile back, and that came with an Ericsson mobile broadband module (I'm pretty certain it was an ex-Vodafone machine, from the audit labels). Putting a Three PAYG SIM in it just worked on Linux. Popped up as a network in the Network Manager, and required almost no setup (apart from selecting the provider) at all.

Unfortunately, I let my SIM expire as well, which is a pity since Three don't do PAYG SIM packages the same way they used to. I used to be able to have a credit balance that I could activate in appropriate chunks depending what I was doing. Even with no activated credit, I could log in to the My3 admin site via the mobile network, which was all that was required to keep the SIM active.

Nowadays, the chunks are just too big for the occasional use, so I now end up setting my phone up as a pop-up Wifi access point if I need access while fully mobile.

At the time, it was Ubuntu 14.04, but it is also recognized with later versions.

We checked and yup, it's no longer 2001. And yet you can pwn a Windows box via Notepad.exe

Peter Gathercole Silver badge

Re: Is this why a "notepad" app doesn't come with Android? @wayne

Not at all. Google want you to use it's Web or Cloud applications instead, which is why there is no native Calendar app, and only a basic Contacts application shipped with Android. Phone makers often add their own, but they are very rarely compatible with those supplied by the other phone makers.

(Using the Web based apps also ensures that you keep data services on so that your device is track-able, as well)

I look back at the baked in set of applications that used to be in PalmOS with a great deal of fondness. Always there, always work the same, always compatible with the last PalmOS device you owned.

Hey dudes, we need to start living together in Harmony: Huawei puffs up new distributed OS

Peter Gathercole Silver badge

Re: And of course, "no details."

Ubuntu Touch is struggling on as a community port of Ubuntu under the name UBPorts. So far, they've managed a complete new release that looks good and runs pretty well on my Nexus 5, together with moving the application repository to their own control from what Canonical abandoned.

It will be interesting t see whether they will keep Unity as the display layer. I must throw them some money to try to keep the effort going.

Talk about unintended consequences: GDPR is an identity thief's dream ticket to Europeans' data

Peter Gathercole Silver badge

Flawed in so many respects

Neither utility bill nor birth certificate prove identity. And many people have neither a driving license nor a passport, and many young people I know are opting to not learn to drive. And I don't think that my doctor would recognize me. because I've seen them about 5 times since I registered 20 years ago, and mostly saw a locum when I did!

Truth is that the UK needs an ID card, with some biometrics. The driving license system would be a good place to start as mentioned in a previous comment, or maybe what has been installed for IABS or the plastic visa card for immigrants, but it would have to not have the additional government uses hung on like the last attempt, and most importantly, would have to be paid for by the government as a fundamental right, rather than having a charge like the last ID card scheme.

Trying to make a government backed, voluntary ID card scheme chargeable guaranteed that it would never be universally taken up, and taken with the flaws and lack of definition and purpose of the backing database doomed it to fail.

Googlers hate it! This one weird trick lets websites dodge Chrome 76's defenses, detect you're in Incognito mode

Peter Gathercole Silver badge

Re: O RLY @jake

Whitespace is insane.

I'll bet the writers at my alma mater used a macro pre-processor to actually write the programs, though.

Back in my day though, the languages that were taught there were PL/1 and APL (and people learned C of course, as they were a very early Unix adopter).

Y2K, Windows NT4 Server and Notes. It's a 1990s Who, Me? special

Peter Gathercole Silver badge

Re: All hash prompts look the same

Was obviously a real old UNIX admin.

The official way of shutting down (to single user) a UNIX edition 6 or edition 7 system on PDP11 was slightly different, but not a lot.

From a root session it was "kill -1 1" which sent HUP to the init process that would switch the run level to single-user mode. In single user mode, there was just the shell on the console running (and just maybe init itself).

From there, you would issue several sync commands to flush any unwritten disk buffers, and then power down the system. It was all documented as the way to do it!