"Then you can deploy your app to Google."
But do you have to?
860 publicly visible posts • joined 13 Feb 2007
First
"(The US FAA don't care for unmanned planes near hurricanes in US airspace, apparently.)"
and later
"Previously the Aussie robocraft used a American naval airbase at Key West, but it's hoped that the new Barbados deployment for the 2008 hurricane season will allow more storm probes than in previous years."
So was the former simply Lewis speculating in his usual paranoid manner (and completely ignoring the latter fact), or did the FAA recently change their stance, and the latter is NOAA spinning the fact that they must now deploy from Barbados?
Window insert/replacement.
Add a camera, and you can still see out, you can switch your boring street view to something on TV or to a landscape of your choosing, and best of all, you can present whatever face you want to the world.
Switch on a Yahoo! advert whenever Google's Street View team are coming through, put up semipermanent "Scientology is a Cult" placards, the possibilities are endless!
Microsoft hasn't made an ODF move -- they've just done some PR. I take their claims about a seriously as I do the new "incarnation" of Dr. Who.
"There is a continuum of thought related to interoperability reaching back many years based on the growth of Microsoft’s enterprise business, all of which has been affected by the regulatory activity in the U.S. and Europe."
Yes, I've heard of that continuum -- it ranges all the way from "embrace" through "extend" right into "extinguish".
Shurley that's the impact of wardrivers?
@Devil's Advocate:
"It doesn't need to care about encryption, as it drills into the payload of every data packet and reassembles the content, thereby knowing what it is"
The only way it could do that is by decrypting the payload. So either it has to care about encryption, or all it's doing is checking headers. Since the first is unlikely, odds are you've been reading their marketing materials, which would tell you that the product cures world hunger if they believed you'd fall for it. I recently got a call from a guy promising that his DNS server software would ensure 100% uptime for my web server.
"It can be done, so don't go saying there's no such thing as a secure computing device."
THERE'S NO SUCH THING AS A SECURE COMPUTING DEVICE!
The best anyone can hope to achieve is to make a device secure enough that only people AS CLEVER AS THEY ARE can break into it, and even to make something that good, you have to be fscking BRILLIANT.
That's why we have property protection (both physical and intellectual) laws. If we really could make a secure computer, or building, we would, we'd put everything in them, and we wouldn't need any laws to protect our stuff.
"... 586 for 1,000 machines running Windows 2000. Servers running Win 2003 had ... 586 unique threats per thousand machines. "
So, same results for 2k and 2k3, or wrong number copied? And what version of Windows 2000 are we talking about?If they're including 2000 Server and Advanced Server in their results, that would likely skew the 2000 rates down significantly.
This article raises more questions than it answers. I'd like to read the full report; perhaps someone could post a link to it?
Your set of requirements for e-voting is impossible to meet, specifically:
* Receipt-freeness: the voter is unable to prove that she voted in a particular way.
* Individual verifiability: a voter can verify that her vote was really counted.
In order to prove that my vote really was counted (and counted properly), the system would have to show the change my vote made in the tally. With that info, I could prove that I voted for candidate X, and therefore get my kickback.
Why is individual verifiability a requirement for e-voting when it's not for paper voting?
As by AC above, but also consider: there is a consistent logical path from Requirements to Interfaces to Abstracts to Concretes. Although we can realize short-term gains by skipping one of these steps, keeping all steps provides a useful overview, metadata for the construction of documentation and to help focus testing and debugging, and checks to prevent or minimize the final project drifting from the requirements.
Why do you think your math teacher always told you to show your work?
and it's NOT Amazon's responsibility to collect them. Like Maine's, where I live, New York's sales tax is actually a sales and use tax. That means that if you live in NY, and don't pay sales tax on something you buy, you need to pay use tax when you pay your income tax. (See http://www.tax.state.ny.us/pit/income_tax/sales_and_use_tax_on_my_income_tax_return.htm)
Re: In a way, they're right ...
Actually, the contract does NOT take place in the PC. A contract only takes place when both parties agree to it, and Amazon doesn't agree to sell you anything until they check your credit card and get their money. So the contract is finalized on Amazon's server.
While I agree with you in principle, there are some discrepancies in your comment, including real-world problems with your solutions, and overstatements of the problems, Your summary is a good place to start:
>> From 500W desktop PC's go to 10W thin clients
500W desktop PCs? REALLY? All of the desktop systems that we've found for positions which work well with thin clients have had 100-200W power supplies max. The only 500W systems I've even heard about are workstations which have processing requirements that make thin client solutions choke, or home gaming PCs for the suicidally insane. You also forgot to include the 3-4 700W or more servers for running all of those desktops in your calculations. Our real-world experience is that 1 @700W server can host about 20 10W thin clients (a total of 900W) with no noticeable performance hit. This is stil better than 20 low-end desktops (2000W), but it's much less than the 98% savings you imply. It's also important to notice the security RISK you fail to mention which comes along with thin-client solutions: you now have 20 separate vectors of attack against a single machine. Statistically, this significantly increases both the likelihood of an unpatched vulnerability being exploited, and the scope of damage. On the other had, it can also improve the ease and quality of patch management. Finally, before you jump on the thin client bandwagon, you have to ensure that your applications really are compatible with thin client environments IN THE CONFIGURATION YOU NEED. We've run across several "thin-client-compatible" applications that were not compatible enough to actually work in our environment.
I also find this statement to be an oversimplification:
>>Virtualisation and hypervisors take extra CPU cycles and are not required to consolidate applications from many systems to one system.
In a perfect world, with a perfect OS, and perfect applications, yes, that's true. But in this world, I personally have found many applications which WILL NOT work together well on the same box. Good virtualization systems allow you to consolidate such applications onto one box while keeping them from biting each others' toes, while using very few system resources. My company uses all 3 solutions: dedicated servers for high-processing applications, multiple-application boxes where possible, and virtualization for those apps which aren't nice to each other.
>>Just by using existing, proven technologies that require no extra training or new technologies we can solve todays power usage problems.
No, they don't require "no extra training". Even if it's just explaining to users why they don't have a CD-ROM in their thin client, each of the changes you mention do require extra training. No, they don't solve today's power usage problems completely. They at best reduce them to a manageable level. But you're right about one thing: the technologies are available today, and they not only reduce power usage, but they save companies significant amounts of money as well. They're not quite the painless silver bullet you imply, but I speak from experience when I say that any company which is not investigating these technologies is costing themselves money.
Check out the sig line on this e-mail i just received:
*******************************************************************
FOREIGN TRANSFER MANAGER
MICROSOFT SECURITY DEPARTMENT (UK).
M.S.PRO. ZONAL COORDINATOR
Phone Number: +447045756797
Phone:+447024099197
E-mail: claimsdepartment61@yahoo.com.hk
********************************************************************
Notice the e-mail address for the Microsoft Security Department (UK) is a Yahoo (Hong Kong) address. Microsoft wouldn't use a competitor's product, so they must have already bought them. This also proves you fellas didn't actually give Hong Kong back to China like you promised. Now if you don't mind, I'm going to respond to this e-mail with my personal and bank information so they can automatically deposit the winnings from that lottery they say I won. Funny that, I don't even remember entering...
are being left with (more) insecure desktops because of these 38,000 customers with this POS* installed? Surely the right thing to do would be to make the install check for the existence of this POS* and simply not install in that one case (although surely the right thing to do would have been to test the install on a system with this POS* to begin with.) That shouldn't take more than 1 hour to code. Then the update could go out as planned, just not install on the POS* systems.
* Guess which expansion of POS I mean.
'In other news - he was charged with "uttering" threats? So, if he'd bleated them, or sneered them, or yelled them, he'd be in the clear?'
Er, David, "utter" simply means to speak or bring forth. So all of those actions you mentioned are forms of uttering. Perhaps you read "mutter"?
"Northrop Grumman was pleased to announce last week that it had won a $54.9m contract from the US Air Force to fit the so-called Airborne Signals Intelligence Payload (ASIP) aboard the MQ-1 Predator and MQ-9 Reaper aerial wardroids. "
Sounds like they got a pretty good deal on their cellphone contract, there.
why didn't the TSA simply model their system after something like the OFAC's SDN list* to begin with? Did they really think this type of thing had never been done before?
*The US Treasury's Office of Foreign Asset Control's Specially Designated Nationals list is a list of entities which US banks must check before opening a banking relationship or transferring funds. It's got names, addresses, aliases, birth dates, etc. specifically for the purpose of checking if you're e.g, Osama Bin Laden the terrorist or Osama Bin Laden the greengrocer.
"The LinkStation Mini uses a pair of 5,400RPM 2.5 inch notebook drives to perform its magic, making it the only Buffalo storage unit not to run on SATA drives."
Not so. The LinkStation Mini DOES use SATA drives (see http://www.buffalotech.com/files/products/LinkStation-mini_DS.pdf) This is not surprising, as 2.5" SATA drives have become the norm in the laptop world.
When you buy a dozen eggs, you don't get 16. When you buy 100 CDs, you don't get 128. When you're going 30km/hour, you're not going 32,768 meters per hour.
The only reason "kilobyte", "megabyte" and "gigabyte" have been used to represent 1,024, 1,048,576, and 1,073,741,824 bytes respectively is because it was and is illogical and impractical to package RAM in quantities of 1,000, 1,000,000, and 1,000,000,000 bytes. It was easier to refer to 1,024 bytes as a kilobyte rather than 1.024 kilobytes. THAT's where the inaccuracy is. Hard drive manufacturers (bless their kind souls) have been maintaining the purity of the decimal prefixes all this time, bearing the full brunt of your petty wrath.
.'..scans can be generated in "as little as 10 seconds" and have "potential peak throughput levels of over 400 people an hour"...'
10 seconds per scan is 6 scans per minute or 360 scans per hour = well UNDER 400 people per hour (10% is certainly statistically significant). Are they expecting people to double up? Actually, that could be fun -- see what poses you and your (travelling) partner can do (fully clothed, of course) in the booth!
If you go by the page for the video video mentioned above, 2 seconds per scan is 30 scans per minute or 1800 scans per hour = WAY ABOVE 600 people per hour. Perhaps in this case they're assuming that the operators/passengers are too slow?
'If they took security "seriously", would they have perhaps not incorporated said bug in the first place?'
Yeah, right. Because people (epecially programmers) are perfect, and it was a deliberate decision to incorporate that bug.
Yeah, right. Because programmers are never under heavy pressure by management to "get it done and out the door yesterday."
Yeah, right. Because programmers are in full control of the compilers and run-time environments that their management decides they will code to, and of the configuration of their clients' systems, so they can ensure that they work as claimed.
yeah right, either you've never written a line of code in your life, or you've written buggy code.
"I love the way John _has_linked_ to a page all about the film, yet _still_manages_ to misspell the films title!"
I believe that you'll find that tense misalignment is a grammatical error. Try "has linked...has still managed" or "links...still manages" -- or follow Sara's example and use "has linked...while still managing".
PS - Don't mess with Sara. She's the best Vulture Central's got (and surely vastly underpaid)!
PPS - To those which hate the constant pedants' wars: I agree, but pedantry is like crack to some of us -- specifically those of us who actually cling to the horribly unlikely dream that someday humankind will create a language (or anything, for that matter) that is logically consistent and easy to use.
"We want to ask questions like: Does an ISP block peer-to-peer just because its peer-to-peer? Or are there ISPs who are willing to say 'We're not going to block P2P if we know it's good P2P'?"
So they admit to loading the question with the presumption that a P2P app should have to prove it's "good" P2P. How about this question?
"Does an ISP have an obligation to provide its customers with the bandwidth they're paying for, with full disclosure of any limitations or restrictions or logging of IP addresses and/or traffic or data mining or association with monopolistic royalty collections agencies (or snoopy government agencies)?"
The space you wasted telling your audience OF IT PROFESSIONALS that:
"DNS lookups are one of the most basic and common tasks on the internet. They translate human-friendly names such as theregister.co.uk with machine-readable IP addresses like 212.100.234.54."
would have been much better used with a list or link to a list of affected servers, or of those systems which use real crypto.
'Billy Hoffman, manager for HP software' security labs, added: "Companies will say: 'We can Web 2.0ify your existing applications in 15 minutes - we've got a wrapper'. These people are charlatans, and you should punch them in the face. They are taking your back-end database tiers and moving them to the parameter."'
So is HP actually advocating criminal violence, or is Hoffman providing personal advice here? Oh, and ditto on 'parameter s/b perimeter'. One doubts that a database of any significance could be efficiently stored in one parameter.
"It is not a spy-sat as such since it is pointed at our own country a lot of the time."
That's like saying an assault rifle is not a weapon as such, since it sits in a gun rack a lot of the time. The key is that part of the time where it's not pointed at Canada. If you switch off the cameras every time it's pointed elsewhere, you may have a point.
I think if you re-read my comment, you might see that I covered that under the "compelling features" argument -- unless you're actually claiming that UK operators bid so much that they don't believe they'll ever turn a profit on those 3G licenses. Then I'd say I covered that under "incompetent management." I'll explain more in depth if you ask nicely and spell my name correctly ; )
"So [Google] inflated the bid for no reason other then to force Verizon to pay more, which in turn will show up as a higher cost to me if I chose to be a Verizon customer."
That's what you got from this article? Funny, but I got the exact opposite impression. Yes, Verizon is paying more for the C block than Google offered, but Verizon could have easily chosen NOT to bid that much.
No rational company would bid so much that they could not offer either a) competitive pricing, or b) compelling features, or c) both a and b.
So either Verizon made the choice to bid as much as they did because they have a plan which they believe will be competitive (and hopefully compelling as well -- that's where I guess 4G comes in), or because their management is not competent enough to make the right decisions.
Given that Google claims to have had a plan to develop the spectrum (and the fact that they bid amounts above the open access limit suggests that either they did have such a plan or that their management is incompetent -- see above), I see nothing more here than Google having 2 different motivations for bidding on the spectrum, and acting on both of them.
My guess is that Verizon chose to bid as much as they did because it allows them to bring out and fully test their 4G network with no impact on their existing customers and with no messing about with existing equipment. I think if you take those costs into account, Verizon will have no reason to raise prices on anyone except to charge for any additional features. Whether those features are actually compelling to consumers is all that remains to be seen. If they're not, you always have the option of choosing to not be a Verizon customer.
(Besides, even El Reg has tacitly admitted that Google can't be evil. See the Evil Google icon below? No? My point exactly ; )
The vast majority of existing content is recorded in < DVD quality. No amount of processing is going to add compelling detail to these shows.
Most new shows recorded in HD don't have details which require anything over DVD quality. Those which do usually suck in terms of quality of content.
The only HD content I've seen which is even remotely compelling is a very short list:
Planet Earth
Blue Planet
Now I love those shows, but I'm not spending @$300 just to watch
them in HD.
BD adoption should not be measured in terms of players sold anyway, as PS3 skews those results. There's no definitive way to tell if a PS3 is being used as a Blu-Ray player, a gaming machine, or both. So the only metric that matters is disc sales. As long as the content is not compelling, that metric will be relatively low.
@Joe Bloggs -- the other 10.4 million will be ones that were sold before this year. The 29.4 million figure is the total number of households which own a device, as stated in the article, not the annual sales. Paris's reading comprehension is quite stellar, too, no?
'We asked why Karoo had not made the trial opt-in if the service is so useful. "Well, we could do it either way," the spokeswoman said. "We'll be listening to customer feedback."'
Yes, you could do it either way. That possibility was inherent in the question. The obvious point of the question was, why didn't you do it the more logical, customer-friendly way in the first place?
Please use the above paragraph as a template response next time a "spokesperson" thinks it's sufficient to reword your question as an answer.
"On a side note: why doesn't a search for string 'wikipedia.com' invoke this 'teleportation' feature?"
Probably because Wikipedia's actual site is wikipedia.org (wikipedia.com is just a redirect). Obviously, Google feels that when you search for a site, you should know the address of the site you're searching for ; )
No icon because I'd like an "evil google" icon, but they don't do evil, so there couldn't be such an icon...
1. The patent is for the complete device, as evidenced by the title, and further by the full application. So unless you've seen a phone WITH slide-out keyboard AND trackball AND dual-orientation screen, then, no there isn't prior art -- and thus if the patent were granted, they wouldn't be able to sue for infringement on parts of the system. Seeing as RIM are the only ones using trackballs at all on their phones (that I know of -- other examples?), and haven't yet used slide-out keyboards, I don't see why the device WHEN CONSIDERED AS A WHOLE is not novel, although I also don't see whom they'd need protection against, either.
2. Yes, Simon, RIM is Canadian, but the patent app was filed by their US legal branch with the US PTO, which is why all the other commentors have their panties in a bunch (but see 3).
3. Finally, this is a patent APPLICATION, not a granted patent. Wait to see what the US PTO do with it before whingeing, please.
...but they are being treated as such by the courts, and THAT's the problem.
IP Addresses identify a node on a network. When combined with ISP logs and accurate date/time information, they may even be able to identify an account with which that node is associated. But they DON'T indicate in any way what individual is using that node (or indeed, how that node was accessed.)
The only consistent way to handle IP addresses would be to mark them as non-personal data AND make it illegal for any entity (public or private) to in any way claim that they do indentify an indivual.
So what are the odds we get logically consistent action from a goverment?