"And how is that going to be easier than tapping the order into your iPad?"
It won't make the fridge-maker any money.
16449 posts • joined 16 Jun 2014
"Bring back those happy days when any Ford key would open any Ford"
I'll see your Ford and raise you a Subaru. Having got to the destination I reached down to turn off the engine and found the key was missing. It had fallen out of the lock onto the floor with the engine turned on and running.
After that I realised I could start the car in the morning, take the key out with the engine running, lock up and go back into the house until the engine had warmed up and defrosted the windscreen.
"It does have the big advantage that it's mechanically impossible to have the fog lights on without the headlights"
AIUI the theory about fog lights is that by mounting them low you don't end up looking down the beam to the same extent that you do with headlights and that the backscatter doesn't, therefore, dazzle in the same way as headlight backscatter does. Not that I've ever found that convincing in practice.
But it does imply that the correct operation is to have headlights off when you need fog lights.
"Variations in where Reverse lives on the gear stick "
Years ago we organised a student field trip. I drove to the site in my car. And waited for the rented mini-bus to arrive with the students. And waited. And waited.
Eventually it turned up. The driver had never driven a Ford before, missed a turning and drove on for miles before working his way back because he couldn't find reverse.
"Electronic handbrakes still need a button that lets you put them on / take them off."
Have you investigated how to release it if it fails?
I did that a while ago before I bought my current car. It involved breaking into a weather-proofed sealed unit and unwinding some humongous number of turns with a special tool from the toolkit. Because you'd now broken the weather-proofing you then had to get the whole expensive unit replaced. And good luck with keeping the car in place whilst unwinding it if you were parked on a hill.
I bought something else.
It's far more convenient to blame the Norks, Russkies or whoever than blame MS for building stuff with holes in it and the NSA for not only discovering those holes, not (at least presumably not) feeding the info back to MS, not only that but building exploits for the holes and not only that but also letting the exploits leak out.
No, nothing to do with MS or the NSA; strictly down to the Norks.
"it boiled down to a case of aesthetics."
We had an architect with a fetish for putting windows right up to the corners of the building on both walls. Presumably it made it look as if the building was being held up by magic when, of course, everyone knew the external walls weren't load-bearing and the building was held up by pillars just behind the windows and blocking the light. Presumably in architect thinking it's better to be stupid and look clever rather than be clever and look ordinary.
"oh the system supplier wont allow you to citing that their system is a medical device, not a computer system"
Which makes a big difference because it carries certifications against it in its original state and it costs time and money to recertify it in its patched state. It's time that whole arrangement was looked at again. Should certification lapse after some interval unless equipment has up-to-date patches?
"This is the NSA we're talking about."
This is some NSA staffer's home computer, not a work computer. Given what he seems to have been up to I doubt he'd venture to ask a grown up.
It's entertaining to imagine to conversation though:
"I have a machine at home. I want to install a cracked pirated version of MS Office on it an also play about with some of our own software on it. How do I secure it?"
"Just come with me to the security office."
"They know the timeline of everything he was doing with his computer, and with the DEFAULT SETTINGS downloaded the NSA's treasure trove (the presence of which on his computer is on the NSA guy and the NSA itself)"
Could you point out to me just where this timeline or everything is mentioned? All I can see are a few dates when the AV was run and found malware. In fact they specifically say that they don't know when some things happened because the AV was turned off? They also say that an archive containing samples of suspicious material was sent back. This is what AV systems need to do to get early detection of new variants. Given that a supposed security pro dumb enough to get infected didn't turn the default off what chances are there that there'd be enough community-minded folk dumb enough to be infected would turn the early warning system on if it was defaulted to off?
"No. It's a bunch of non-executable letters. Source code."
From TFA (my emphasis):
"The archive itself was detected as malicious and submitted to Kaspersky Lab for analysis, where it was processed by one of the analysts. Upon processing, the archive was found to contain multiple malware samples and source code for what appeared to be Equation malware."
I read this as indicating that the archive contained both binaries and source and that it was the binaries that triggered the detection and subsequent upload of the entire archive. No need for the AV to have recognised the source.
"If you poled the entire UK then 90% would be against Scottish or N. Irish independence - doesn't mean the country is totally united"
I'm not convinced by that. I think if the Scottish independence vote had been UK wide it might well have been Yes that won.
"their abilities to change the behaviour of cops and people has been repeatedly called into question"
I don't see changing behaviour as being the essential function. I'd regard them as being a source of evidence of what the behaviour actually was. Of course evidence means the expensive business of putting together and presenting a court case. If someone was wanting them to change behaviour they were just trying to save money. It looks as if they still are.
"They can fine Microsoft all they want, but it's no longer physically possible without approval from a local data custodian in Ireland."
Is this actually the case? The only thing I've read on these lines is about this arrangement being put in place in relation to the new DC in Germany. It's possible they've rolled this out elsewhere and I've missed it.
"Logan is joined by Muzaffar Auhammud and Muzaffar Auhammud, Pirabarlen Cheenaramen, Nitin Mutkawoa, Codarren Velvindron, Anoop Seburuth, Yashvi Paupiah, Akhil Maulloo, Sheik Meeran Ashmith Kifah, Yasir Auleear, Nigel Yong, and Rahul Golam, and their work so far has resulted in a crop of patches and commits:...
That's a respectable workload for three people"
This is more than three people, especially as one of them appears to be two.
"it should always go to firstname.lastname@example.org which is aliased at the main server to whoever's employed to handle it."
1. Assumes that company policy allows names to be set up in this way.
2. Assumes someone is (still) employed to handle it.
BigCos, especially BigCos intent on becoming LittleCos (tto many of them these days) can be their own worst enemies.
Biting the hand that feeds IT © 1998–2019