Re: A cuppa soup
[quote] Apparently the noise of a thousand squawking penguins going off simultaneously is indescribable...[/quote]
20 posts • joined 26 Jun 2013
Not one mention of "Master has given Dobby socks, Dobby is free!" ... I'm not sure whether to be impressed or disappointed, El Reg.
Technically not a bribe, but best extravagances I remember were from right before the dot-com bubble burst, and our Sillycon Valley department heads were flying everybody in from around the globe, putting us up at retreats, and paying stupid money for us to eat catered dinners at the Monterey Aquarium. That was, shall we say, a lot more motivational than the current environments of "for lunch, stun a pigeon with your briefcase" and "share a hotel room for this conference - we're breaking you down by gender and CPAP usage" ...
"I'll see you in hell!" ... kinda like "Hasta la vista, baby," or even "Bye, Felecia".
I'm utterly baffled about these limits. My Oracle database hit 1TB - back in 2001 on Windows NT 4, and with no sign of getting anywhere a limit.
That's because your 1TB database was made up of a whole bunch of 32-bit .DBF files, almost 100% surely strung over multiple drive letters (mount, er, "reparse" points didn't become a thing until Win2K).
Doesn't Outlook use SQL server as it's backend? I'm pretty sure that even back then, SQL server could go over 2TB.
Exchange (not Outlook, that's the client) does use a tuned variant now, but way back when, it was the JET engine, baby.
And in 2012, we still had that Oracle database running on Windows 2003, then over 200TB and growing by at least 2TB a month.
a) Yeah, Oracle licensing remains as transparent and platform-migration/upgrade friendly as ever /s
b) I always knew paypal had some humble beginnings, but ... /s /s
All it is doing is adding a password to an existing, disabled user without a password (NULL (UNDEF?) vs "blank" vs zero, fankids), and then enabling the user.
Yep, serious hole, Apple blew it off until it got user-level publicity (shame on them). Sad part is it's like the gratuitous "hacker" scene in action movies where somebody taps a few keys and magically pwns the system - you know, the ones we all groan at. Well, truth appears to be stranger than fiction, once again.
But it's NOT creating a new user (possibly with root privileges/sudoer/whatever). That's an entirely different level of stupid.
So the USDoD built SIPRNET (as opposed to MILNET/NIPRNET) and various "high side"/TS networks with all kinds of bells and whistles. The problem with using these dedicated/hardened networks, and what these tools were trying to address, was how to get actionable intelligence quickly to/from the field. The more hoops to jump through, the older the intel gets, and the less useful/valuable it is. (insert misattributed Forrest quote "fustest with the mostest" here)
Labeling the container "INSCOM" in the clear wasn't *quite* as stupid as labeling it SIPR or somesuch, but I can see a lot of scenarios where it would be nice to, while you're really forward deployed, be able to get to tools, and the only thing you need is the local dishwalla (or whatever the Iraqi/Afghan/ME equivalent is) and a suitably hardened IronKey or somesuch.
Ah well, you (hopefully) learn something new every day, hopefully at somebody else's expense :-)
But doubtful. But a great way to slice/dice the data from another angle (pun? intended), agreed.
Surgeons, like everybody else, tend to do their tasks assembly-line fashion ... they either use a particular bot every time (for a particular procedure) or don't use it every time. Robots are a great tool for what they were designed to do - work relatively slowly, very precisely, and within a very small field. For gross (no pun intended) procedures like a nephrectomy, they really don't bring a lot to the table (pun intended).
Citation: did a lot of consulting work with CV (heart) surgeon practice groups (clinics) a few years ago. This was a more than occasional topic of discussion. I also fully realize the plural of anecdote is not data.
So, if I'm interpreting the article correctly, you would need both your phone (maybe another with the app?*) and your photographed item for this to work.
There's now three potential SPOFs - you forget your password, you lose your phone, or you don't have the magic item in question. Will it become like a smart captcha where 8 out of 11 factors gets you in?
If this ever becomes an implemented scheme where I work/shop, I know what my magic item's gonna be:
* Which leads to all kind of hack-written (sorry, no pun intended) spy movie scenes ... "my voice is my passport, verify me" ...
Now that's job creation!
Ninja'd, but thought I'd post the link anyway. Yes, you do spoil us, and yes, I see what you did there.
I sincerely doubt it, the negative PR alone wouldn't be worth it ... but I'm sure they will a) build it into the CODB, b) apply for mucho dinero from FEMA/DHS afterwards, c) use it as exhibit B or C at the next tariff inquiry (if Pai still bothers to have them), or d) all of the above
Yeah, vehicles these days are stupid safe (at least for collisions) versus a couple decades ago. My years in fire rescue yielded (geddit?) a few choice nicknames, such as the Honda Accordion. Very high tech stuff. If you're curious about the latest and greatest, check out boronextrication.com to see how we get you out of those cages ...
And thus, the plot/plot complication for The Martian Returns/Gravity 2 was birthed. Extra points if the plug/cover has "V GER" scribed somewhere on it.
Icon b/c it's oddly appropriate.
"It is the same as going into a cafe and asking for a "Coke"
Not to go off on *too* far of a tangent :-) - but sometimes that becomes genericized past the point of practicality. For example, here in the southeast US ...
"Hey while you're in there, can you get me a Coke?"
"Sure, what kind?"
"Diet orange, please."
If you're taking the opportunity to replace certain systems/subsystems, this is an absolutely awesome time to do a disaster recovery drill ... since that's essentially what you'll be doing for the migration. Unless you are spending severely large monies on fat pipe(s), moving multiple terabytes over a VPN still won't be as quick as other options (sneakernet an array, or even better, set up a replicated backup solution between your office and DC (but seed both devices at the office first) ... once the DC is operational, reverse the data flow ...)
I just wanted to thank El Reg for the earworm this morning ... well played, gentlemen, well played.
Um, not quite.
Drives cannot read uplevel media (for example, an LTO-5 drive cannot read LTO-6 media).
Drives can read and write one downlevel of media, and read two downlevels of media. For example, the same LTO-5 drive can read LTO-5/4/3 media, but can only read/write LTO-5/4 media.
I do not work for LastPass, but I am a long-time paying customer.
1. Before you start bashing a cloud-based password manager, do your research ...
Nothing (except maybe meta-metadata) is stored in the clear in the LastPass cloud. Once you authenticate, the encrypted blob is downloaded and decrypted locally on your system. If you add a site, note, whatever, again, it's encrypted locally and then added to the cloud blob.
Show me a cheap, roll-your-own password solution that supports multifactor authentication, one-time passwords, secure password sharing, and rollbacks, and I will buy VC stock in the company.
2. Downtime this (for me) morning was pretty annoying, no lie ... but in 4 years this is the FIRST time I've ever experienced any hassle ... so for a darn cheap system with an offline fallback, this is pretty darn good. About the only thing I'd ask LastPass product management to do is to put in a "manual offline" option to force using the local copy ... but that has its own security issues as well.
Imagine, if you will, that this technology is able to scale up to, say, be able to be applied to a cargo ship or supertanker. If they can get the propulsion optimized to spec, a 10%+ improvement in efficiency (and translated bunker fuel costs) ain't nuthin to sneeze at.
Well played, well played.
Spawn of Satan because, well, it was a good deception.
Biting the hand that feeds IT © 1998–2018