* Posts by Norman Nescio

978 publicly visible posts • joined 7 May 2008

UK Ministry of Defence apologises after Afghan interpreters' personal data exposed in email blunder

Norman Nescio Silver badge

It happens to the best of people...

El Reg in email address blunder (24 Oct 2011)

So, very nearly 10 years on, the same problem keeps on happening. We should not blame the victim, we should blame the software design that allows bungles like this to happen. Both email clients and MTAs should work together to query over-long CC-lists, but I recognise that the technical problem is not easy to solve. Setting up an MTA to refuse to forward an email with more than a set number of CC (or even direct) recipients is easy (deciding the 'set number' isn't), but if an email address is actually a mailing-list address, you can still (embarrassingly) send an email to all the inboxes of an entire organisation with a single entry in the To or CC field.

My email client tells me if I have an empty subject field. It does some pattern matching to ask if I have forgotten an attachment if an email contains certain keywords and lacks an attachment, so I think it is reasonably possible to have a client that warns on a long CC-list. Similarly, an MTA could put an email with a long CC-list in quarantine and send a message back to the sender asking if they are sure it should be sent. Really sensitive stuff could require two separate accounts to agree to release an email from quarantine.

Relying on fallible humans to get it right every time is a recipe for disaster. Lives really are at stake.

NN

You want us to make a change? We can do it, but it'll cost you...

Norman Nescio Silver badge

Re: Lines of Code - negative defects

Goodhart's Law

Any observed statistical regularity will tend to collapse once pressure is placed upon it for control purposes.

Restated and generalised by Marilyn Strathern as:

When a measure becomes a target, it ceases to be a good measure.

Boffins unveil SSD-Insider++, promise ransomware detection and recovery right in your storage

Norman Nescio Silver badge

Re: Bin dun before...

I get something like it by using the NILFS2 filesystem. It has some downsides (no ACLs, for example), but I have been using it for years. Convert checkpoint to snapshot, mount snapshot read-only, recover previous version of file going back as far as the circular buffer allows. Of course, it might not be suitable for your particular use case, but I landed on it after looking for VMS-like behaviour with file versioning.

It is a pity that btrfs and bcachefs apparently can't do the same. I would love to be shown to be wrong.

NN

Compromise reached as Linux kernel community protests about treating compiler warnings as errors

Norman Nescio Silver badge

Lack of warnings...

...means you can now concentrate on finding the really subtle problems.

The fact that a compiler is 'happy' with your code by no means means it is healthy code.

Many, many years ago, I was working on some programs that did quantum mechanical calculations to simulate molecules. I was debugging a set of programs as a result of trying to run them on a different architecture of CPU to the original. One of the subroutines did multiplication of two matrices together.

Now, matrix multiplication is not generally commutative. The ordering of the arguments mattered. So if you have matrix 'A', and multiply by matrix 'B', you will, under certain circumstances get a different answer if you multiply matrix 'B' by matrix 'A'. In other words AxB does not always equal BxA.

So, if you have a subroutine that accepts two matrix arguments, multiplies them and gives you the result, it is rather important that you specify them consistently in the correct order.

Of course, in the thousands of calls to this particular subroutine from all over the program, the order had been mixed up in one or two, resulting in code that compiled fine, but gave entirely borked results.

Lack of compiler errors means the code is free to have deeper problems that ruin your day.

NN

Western Digital unveils 20TB OptiNAND hard drive, pledges 50TB to follow

Norman Nescio Silver badge

Re: Old fart rant inside...

In contrast, in the telecommunications industry, one kilobit per second is 1,000 bits per second, not 1024 bits per second. A good old ISDN 64 kilobit connection transfers 64,000 bits per second, not 65,536. This has caught people out occasionally.

It is unfortunate that certain parts of the IT industry appropriated the SI prefix kilo and redefined it to mean 210 instead of 103. The standard use of kilo- to mean multiplication by one thousand pre-dates electronic computing by some margin. Nevertheless, for some people, kilo- naturally means multiply by 1,024, so it is up to the reader to understand the context and translate/interpret accordingly, which is not ideal, but is the way of the world.

Volkswagen to stop making its best-selling product for Wolfsburg workers: VW-branded sausages

Norman Nescio Silver badge
Coat

Re: Everything has an end

The workers are probably worried about getting the trots from the change to a vegetable-rich diet. Gustav Mahler wrote some songs about it:

Das Lief von der Erbse

Roughly translated: The run caused by peas.

Ich hole meine Mantel. Tschuss!

How to stop a content filter becoming a career-shortening network component

Norman Nescio Silver badge

Re: "That would not be... convenient"

Up to a point, Lord Copper.

British naval food doesn't look half bad... so we're going to try it out for ourselves

Norman Nescio Silver badge

I wonder if it's good for waterskiing?

"AR15.com: Lieutenant Commander Nigel Williams water skis from Type 22 frigate HMS Brave"

Reddit: "Lieutenant Commander Nigel Williams water skis from Type 22 frigate HMS Brave"

The vessel is HMS Brave, but a swift look at the Wikipedia entry doesn't list a Nigel Williams as a Commander, and the possible mix-up with Bob Williams doesn't agree with the alleged date of 1986.

It's still a great picture, though.

Microsoft does and doesn't want you to know it won't stop you manually installing Windows 11 on older PCs

Norman Nescio Silver badge

Re: Crashes?

It has been going on for a long, long time, as this absolute classic book, published in 1954, makes clear.

How to Lie with Statistics: Darrell Huff; Illustrated by: Irving Geis

Well worth a read.

NN

The Register recreates Apollo 15 through the medium of plastic bricks, 50 years on

Norman Nescio Silver badge
Coat

Re: "Why can't they make the Starliner work now"

Nah. The valves wouldn't LEGO. Geddit? Leggo... Let go.

Ah'll get me coat. Join ya ah'side.

See that last line in the access list? Yeah, that means you don't have an access list

Norman Nescio Silver badge

Re: Firewall rulesets and defaults

The linked Cisco documentation makes clear that any/any/any drop is implicit. So any/any/any permit as the last item in the explicit ACL is effectively penultimate.

I did not make clear enough that the philosophy of block/reroute chosen traffic and let everything else through was not ideal, but at the time it is what some people did, the point being that if you did not put any/any/any permit as the last processed ACL entry you could end up with not passing the traffic you expected. Cisco show this in the example ACL for denying telnet traffic:

Cisco ACL example:Deny Telnet Traffic (TCP, Port 23)

interface ethernet0

ip access-group 102 in

!

access-list 102 deny tcp any any eq 23

access-list 102 permit ip any any

But it is a subtle point that may be lost by people assuming that it is obvious that you set up firewalls to allow only certain traffic and block everything else. While this is recommended practice, some people don't do that (or at least, didn't), and not all use-cases demand that.

I cut my teeth on Wellfleet Routers routing IPX, Appletalk and IP, so I learned to question my assumptions when using Cisco kit as there were always multiple ways to do things including: the Cisco way, the Wellfleet way, the standards-conforming way, and the right way.

Norman Nescio Silver badge

Firewall rulesets and defaults

at the end of the access list: "permit any any".

There can be a good reason for allowing any - any as the last rule in a ruleset. It depends on the firewall defaults: block, or allow.

Back in the day when networking was simpler, one function of firewall* rulesets was to drop, rewrite, or redirect chosen traffic only, and allow the rest through.

I have worked on firewalls where each rule in the ruleset was tested in order**, and if no rule matched, then the traffic, by default, was dropped. In this case, it was important that the last rule in a ruleset was any - any, as without it, traffic that you expected to traverse the firewall in fact would not.

I would not be surprised if whoever worked on the ruleset expected the above behaviour - that is, the firewall by default drops/blocks everything and has to be explicitly told to allow through everything not already matched.

Of course, if allowing any - any was the first rule in the ruleset, criticisms of the competence of the writer are fully justified.

Note that if the 'On Call' writer didn't know this ruleset quirk, they might possibly have made unjustified assumptions about their predecessor.

NN

*Where firewall == router configured with some ACLs

** Linking to the relevant Cisco documentation on ACLs

Cisco:Configure Commonly Used IP ACLs

The IP ACL is a sequential collection of permit and deny conditions that apply to an IP packet. The router tests packets against the conditions in the ACL one at a time.

The first match determines whether the Cisco IOS® Software accepts or rejects the packet. Because the Cisco IOS Software stops testing conditions after the first match, the order of the conditions is critical. If no conditions match, the router rejects the packet because of an implicit deny all clause.

Who gave dusty Soviet-era spacecraft that unwanted lick of paint? It was an idiot, with a spraycan, in Baikonur

Norman Nescio Silver badge

Well, obviously, people have been voting for the wrong corrupt populist autocratic lizards. Got any gin?

(pace Douglas Adams)

When software depends on a project thanklessly maintained by a random guy in Nebraska, is open source sustainable?

Norman Nescio Silver badge

Forking

If FLOSS (e.g. GPL2) stops being maintained by whoever is doing the maintaining, anyone can (as a result of the licence) pick up the pieces, fork the project, and continue.

If closed source stops being maintained by whoever is doing the maintaining, copyright laws prevent the software from being forked and continued for anything other than private use. You'll need to negotiate for rights first to do anything else. So as a company reliant on such software, you cannot spread the cost of continuing without getting the rights to distribute/publish.

Immediately the risk becomes huge. If you are big enough you can enter an ESCROW agreement so you get the source if the original owner fails or decides to walk away: but you really need to get distribution rights as well.

Back to FLOSS: if your company is dependant on a defunct FLOSS project, you can pay someone else to pick up the pieces. There's no licencing issue. You can do it in-house if you have the resources, or you can pay external programmers. You are free to do what you want with the code, and collaboration with other groups who need the same thing to spread the cost is easily possible.

Choosing closed-source is taking on a whole lot of risk, and leaving your crown jewels in the velvet-gloved fist of the software supplier. Choosing FLOSS means you have the means to control your future use of the software. Whether you choose to use that control or not is up to you.

Something went wrong but we won't tell you what it is. Now, would you like to take out a premium subscription?

Norman Nescio Silver badge

To be fair to the numpties, it's common for login screens not to specify which part of the credentials is incorrect. The idea is that any hint makes life easier for intruders. But "An error has occurred" is a stupid way to tell the user that the credentials are wrong.

Amen.

I use a particular service once every few weeks, and every time, it fails to allow me to log in. I have to use the reset password option every <insert expletive for emphasis> time. I know that the password I type in is correct (as I have it written down from last time*), but no, password reset or I'm not getting in. I know the username is correct, as that is the email address to which it sends password reset emails.

Another of life's little irritations.

NN

*Yes, yes, I know. If I lost access to the service it would not be the end of the world, and the username and password are unique to that service. Anyone finding my credentials will be able to fail to log in in the same way as me, and be unable to try and log in on any other service. I also know that some systems force you to change the password from the one sent in the password reset email. This one doesn't. But in any case, I've tried both changing it and not changing it, and neither option works.

Global pharma firm GSK opens Pandora's Box of its SAP system to find 28,000 variations on a process

Norman Nescio Silver badge

There's an xkcd for standards which applies to 'standard' processes as well, although multiplying up to 28,000 of the things is impressive. Anyone who looks at a standard tends to think of a variation they need (want) and following that, it is a short step to multiplication of 'solutions'. Saturday Morning Breakfast Cereal makes essentially the same point about 'definitions' as applied to Social Sciences, but it is, in my experience, a generally applicable point.

As for BPA analysis, it suffers, like code from premature optimisation. As Donald Knuth famously said in his 1974 ACM Turing Lecture:

The real problem is that programmers have spent far too much time worrying about efficiency in the wrong places and at the wrong times; premature optimization is the root of all evil (or at least most of it) in programming.”

Donald Knuth, Computer Programming as an Art (Communications of the ACM December 1974 Volume 17 Number 12 1974)

Removing flexibility from a process is a premature optimisation. The art of a good analysis is to leave the process flexible enough to cope with its anticipated use-cases (including the rare ones, and reasonable variations), while being standard enough to benefit from efficiencies of scale. If your process is too difficult to use, or can't be used by the users for all the things they need to do, it has failed. There's a great deal more to do than just automating the most frequently used steps and calling it a day. Sadly, that level of facile 'analysis' happens all too often.

NN

FSF doubles down on Richard Stallman's return: Sure, he is 'troubling for some' but we need him, says org

Norman Nescio Silver badge

For those who may not understand this joke, it is based on the notion that Mary, the mother of Jesus, was without sin, so she could be qualified to cast the first stone. Her aim was off though, it should not have hit Jesus, but rather the 'woman taken in adultery'.

The notion that Mary is/was* sinless is Roman Catholic dogma.

*Many people believe that Mary never died, as such, but was bodily taken up into heaven (assumed), others believe she died before being assumed. Lots of clever people have debated this kind of stuff for centuries, so I'm just presenting the bare facts without comment.

'Chinese wall'? Who uses 'Chinese wall'? Well, IBM did, and it actually means 'firewall'

Norman Nescio Silver badge

Re: Engineering terminology

In control theory, we talk of servo control of a feedback system (servo has the same root as slave, incidentally).

As it is the concept of slavery that is objectionable, then it follows that servo is suspect, and also robot, which comes from the Czech word robota*, meaning serfdom, villeinage, or corvée with an original etymological root from a word meaning slave/slavery. Adoption of alternative forms might take a while.

Finding useful and usable neutral terms to use that are also sufficiently precise and nuanced is a challenge. You only need to look at the history of nomenclature in chemistry to see how long change takes to embed.

*Famously brought into English via Karel Čapek's play Rossum's Universal Robots (R.U.R.) (Rossumovi Univerzální Roboti)

Norman Nescio Silver badge

Aaargh! Ambiguity

And yet again, someone uses the ambiguous term 'blocklist' to replace 'blacklist'. Is it a list of blocks (like in a file), or a list of things to be blocked? It is not obviously the latter. I would prefer the use of 'allowlist' for 'whitelist' and 'denylist' for 'blacklist'. If you are looking to make a usage change, I would have thought people would want to use a term that is phonetically very distinct from the less-preferred term; and 'blocklist' sounds, and looks, very similar to blacklist. Perhaps some think that this similarity is an advantage?

I really hope we can generally agree on a set of neutral technical terms so that everyone who wishes to can contribute to IT without fear or favour - it seems to be the decent thing to do.

We have never given census data to anyone – not even the spy agencies, says the UK's Office for National Statistics

Norman Nescio Silver badge

Covert Human Intelligence Sources (Criminal Conduct) Act 2021

The ONS can say what it likes, and the staff may well believe what they say, but the security and intelligence services may well decide that the information should be taken (not volunteered) for their own purposes.

The Covert Human Intelligence Sources (Criminal Conduct) Act 2021 potentially gives the security and intelligence services broad cover to commit illegal acts:

(a)in the interests of national security;

(b)for the purpose of preventing or detecting crime or of preventing disorder; or

(c)in the interests of the economic well-being of the United Kingdom.

"

And, it is not just the security and intelligence services - the list of agencies that can apply for Criminal Conduct Authorisation are:

Any police force

The National Crime Agency

The Serious Fraud Office

Any of the intelligence services

Any of Her Majesty's Forces

Her Majesty's Revenue and Customs

The Department of Health and Social Care

The Home Office

The Ministry of Justice

The Competition and Markets Authority

The Environment Agency

The Financial Conduct Authority

The Food Standards Agency

The Gambling Commission

In theory, this is all about running covert human sources in organisations under investigation, such that the source cannot be found simply by their refusal to commit a criminal act; however should the security and intelligence services decide that it is necessary and proportionate to run a covert source within the ONS, then providing a clandestine copy of (selected) data could well be covered by a CCA.

It would be interesting to be told how many CCAs per year (or month) are issued by the above organisations, and what their durations are.

NN

Airline software super-bug: Flight loads miscalculated because women using 'Miss' were treated as children

Norman Nescio Silver badge

Re: I would have thought...

I sure hope the tire speed limit is a nice margin above Vr, otherwise take off will be with burst tires, which will result in a not so smooth landing.

In the linked Boeing document above gives a case study showing:

Scheduled Ground Speed at Liftoff: 199 knots

Rated Tire Speed: 204 knots (235 miles per hour)

and goes on to say

...case study showed that a rotation rate that is 1 degree per second slower than normal can result in a 4- to 5-knot liftoff speed increase. This is in addition to the increase in all-engine takeoff distance associated with the slow takeoff rotation (see fig. 3). This illustrates how a slower-than-normal rotation rate can easily use up what may seem like a large tire-speed-limit margin, especially if paired with a higher tailwind component than accounted for in the takeoff analysis used for dispatch.

Some operators have elected to simply examine the tires after an overspeed takeoff event using the normal tire inspection criteria in Chapter 32 of the Airplane Maintenance Manual. if no damage is found, the airplanes are dispatched normally and no further maintenance actions are performed. Based on many years of service experience, this approach seems to have worked well because very few, if any, tire tread losses have been attributed to an overspeed event. Based on this service experience, Boeing has typically not objected to this practice even though there is no overspeed takeoff capability specifically designed into the tire.

Norman Nescio Silver badge

Re: I would have thought...

I would have thought...

...that normally on takeoff, the pilot would be using everything short of War Emergency Power, throttles to the stops. I would hate to clip an obstacle at the end of the runway because the airline was trying to save a few bob's worth of fuel, and the passenger cohort had more than the normal fraction of bloaters.

No.

Yer average commercial passenger jet's engines can suffer catastrophic consequences if they spin too fast (overspeed), or if the exhaust gas temperature (EGT) gets too high, or they try to push too great a mass of air. You need sufficient thrust to reach Vrotate before you run out of runway (and preferably V2 soon after), but importantly, not so much that you exceed the speed rating of your tyres before lifting off. This means you need to carefully control your thrust to ensure you accelerate enough to reach Vrotate before the end of the runway, but not so much as to exceed the tyre speed rating. The margins can be surprisingly small.

More background details here:

Turbofan Technology:Jet Engine Thrust Ratings

Boeing Aeromagazine: Exceeding Tire Speed Rating During Takeoff

BAA Training: Did You Know about Aircraft Take-off Speeds: V1, Vr and V2?

Cockpit News: WHat do EPR, EGT, N1 and N2 mean

Skybrary: Engine Pressure Ratio (EPR)

Skybrary: Exhaust Gas Temperature (EGT)

Skybrary: N1 Indicator

Skybrary: Rotation Speed (Vr)

Skybrary: Tyres

A floppy filled with software worth thousands of francs: Techie can't take it, customs won't keep it. What to do?

Norman Nescio Silver badge

Re: A Cunning Plan

Strictly, the Common Travel Area (UK, Ireland, IOM and CI) applies only to British and Irish citizens.

Irish information: Citizens Information Ireland: Common Travel Area between Ireland and the United Kingdom

Common Travel Area rights can only be exercised by citizens of Ireland and the UK. If you are not a citizen of Ireland or the UK, you will not be able to exercise Common Travel Area rights.

British information: GOV.UK: Common Travel Area guidance

Under the CTA, British and Irish citizens can move freely and reside in either jurisdiction and enjoy associated rights and privileges, including the right to work, study and vote in certain elections, as well as to access social welfare benefits and health services.

Norman Nescio Silver badge

Re: Lost at Sea

Hmm, you might be the DEC FS tech that told me that story a long time ago. We had 'quite a few' RA81s. I had a very nice visit to Kaufbeuren, including the high-speed drive on the autobahn from Munich, and lunch at the plant, which included beer (!), the explanation being that the German workforce would refuse to work if they could not have beer with their lunches.

Our on-site engineer was invaluable. He mentioned his 'baptism of fire', when he had been newly trained on a particular piece of DEC kit (could have been the HSC50), where the training video made it look easy: open up the cabinet, identify the failed card by the indicator LED, replace card, and away you go. In his case, he gets called out, confidently opens the cabinet to find....no indicator LED on any of the cards. A 'while' later, after most of a new HSC50 is sent from Reading, he finally got things working again, and became less trustful of the training videos.

Norman Nescio Silver badge

Re: A Cunning Plan

Prestel is what kicked off the Computer Misuse act 1990: or rather it was the fact that someone accessed Prince Philips Prestel mailbox, and at the time they could only be charged under the Forgery and Counterfeiting Act - which was appealed, and the Crown lost(!). The very public lack of suitable legislation meant the Computer Misuse Act came into being.

Details in the Wikipedia article Computer Misuse Act 1990

Norman Nescio Silver badge

Re: Times change

Which is why operators (or other people with appropriate access) would use a marker pen and draw a diagonal line across the top of the deck. This made reconstituting a dropped deck a great deal simpler.

If the punched cards had sequence numbers, there did exist machines for automatically reordering messed-up stacks.

The illustration in this Wikipedia article on the use of punched cards in programming shows an example of the diagonal line.

5-year-old Fairphone 2 is about to receive a major update to Android 9

Norman Nescio Silver badge

Jolla

Jolla ended software upgrades for the Jolla 1 phone in November last year. It won't run SailfishOS 4, so the last version for the Jolla 1 was 3.4.0 (Pallas-Yllästunturi). It was supported for 7 years.

Jolla Blog,November 26, 2020: The Original Jolla Phone turns 7 today.

Which is not a bad run.

It's still a shame that 7 years is regarded as an exceptional maximum. I understand the reasons: stuck on an old kernel because of binary device drivers that are not upgraded by the manufacturers. Designing and building consumer electronics for long lifespans is hard.

'No' does not mean 'yes'... unless you are a scriptwriter for software user interfaces

Norman Nescio Silver badge

Re: when to use the word "fewer" instead of the word "less"

There are, but not in colloquial British English.

Scandinavian (roughly*) has two words meaning more: mere(non-countable) and flere(countable). I have no idea why the word meaning 'countably more' didn't get incorporated into English via the Vikings.

And Scandinavian (roughly*) does have two words corresponding to less - mindre and fewer - færre.

*details differ between Danish, Icelandic, Norwegian, and Swedish. Don't know about Faeroese.

Norman Nescio Silver badge

Re: Lewis Carroll would like a word...

I suspect not. I believe it comes from a shortening of the word refrigerator (note the lack of a 'd') which has a Latin root in the word frigus, meaning chill,coldness. Ecclesiastical Latin pronunciation gives the 'g' a 'dj' sound, which leads to it being spelled in English with a 'd' to distinguish it from words with a hard 'g' in the middle, like magnet, regulate, cigar, bogie, sugar.

Classical Latin pronunciation would be frig, to rhyme with brig.

Norman Nescio Silver badge

Re: French vocab

<pedant>

Since Germany has only existed since the unification in 1871*, three hundred-odd years ago they would have been Saxons, Bohemians, Silesians, Prussians, Bavarians, ...). They would probably have spoken a German dialect, though.

</pedant>

*Wikipedia says: Prior to 1803, German-speaking Central Europe included more than 300 political entities, most of which were part of the Holy Roman Empire or the extensive Habsburg hereditary dominions.

Norman Nescio Silver badge

Re: when to use the word "fewer" instead of the word "less"

I attribute the popularity of "impact" largely to people not knowing whether they should use "effect" or "affect", and going for something else entirely in order to avoid the risk of making themselves look stupid.

And thereby failing entirely: at least with effect and affect you have a 50% chance of getting it right, with impact you have a 100% chance of looking stupid.

Norman Nescio Silver badge

Re: when to use the word "fewer" instead of the word "less"

I affirm the affecting effect 'impact' has on my affect. It discombobulates me so much, I become mensurately bative in my miseration. I have to work hard on being plaisant.

(With apologies to Jack Winter)

OVH data centre destroyed by fire in Strasbourg – all services unavailable

Norman Nescio Silver badge

Hardwood in fires

Well, yes and no. With sufficient ventilation hardwood burns quite nicely: just ask any wood-burning stove owner. With insufficient ventilation, it takes a while, but will make hardwood charcoal, which is 'rather brittle', so not something I'd like to trust to structurally.

But the FPSE people do have a point: hardwood chars nicely, and char is rather a good insulator, so a structural element will form a layer of char on the outside while maintaining good strength inside for a long time. Which is why the Chinese used (impregnated) white oak re-entry shields for some of their recoverable surveillance satellites (Fanhui Shi Weixing).

Astonautix: Fanhui Shei Weixing;Recoverable Test Satellite.

The capsule for the FSW, like that of the US Discoverer/KH-1 spy satellite, was mounted heat shield-forward on top of the launch vehicle. The ablative impregnated-oak nose cap covered electrical equipment. The spherical aft dome contained the recovery parachute. The film reels for the camera were located in an intermediate compartment.

StackExchange: Puzzler - which spacecraft(s) incorporated real wood structural elements?

The FSW did have an oaken heatshield. I saw one on display at the bicentennial airshow (Richmond, Sydney, 1988). This craft was launched on 1987 August 5, and was previously known in the west as China 20, then variously called FSW 0-9 or FSW 0-10, depending on whose chronology you refer to. Cospar 1987 067A, NORAD 18306. The oak was charred, and some broke off when display attendants moved the spacecraft. They simply vacuumed most of it up so that the charcoal didn't mess the carpet! I was able to photograph both the exterior and interior (equipment had been removed).

Norman Nescio Silver badge

Re: What is the most frightening sound in a server room?

I had a very similar experience at about the same time. The on-site DEC engineer pointed out the RA81s would be out of warranty if their temperatures exceeded a certain value, so the Ops Manager got the loading bay doors open* and 'a number' of large fans running. No loss of service (it was some VAXclusters and an IBM mainframe clone) and no hardware loss.

NN

*I'm pretty certain he had the building main entrance open, and the multiple security doors through to the machine room open as well to get airflow through - in through the entrance, out through the loading bay, with people stationed to prevent unwanted visitors.

Norman Nescio Silver badge

Re: hopefully Digital Ocean, will be next.

Sodium?

Nah. FOOF

See Also: Things I Won’t Work With: Dioxygen Difluoride

The rest of Derek Lowe' blog: In the Pipeline: Tagged with - Things I Won't Work With is an entertaining read.

Third time's a harm? Microsoft tries to get twice-rejected encoding patent past skeptical examiners

Norman Nescio Silver badge

Re: Are you saying I could...

Repack all my thousands of JPEG photos with this new compression algorithm with zero loss of detail compared to the original JPEGs? As in pixel-for-pixel identical but smaller file size?

Yes.

The white paper, linked to above, on page 2 says:

In terms of compression performance, key results are:

  • Lossless JPEG transcoding reduces JPEG size by around 16% to 22%.

It uses the Google Brunsli jpeg repacker algorithm.

A medium level description of how it achieves this is in this conference presentation:

SPIE Optical Engineering + Applications, 2019, San Diego, California, United States: JPEG XL next-generation image compression architecture and coding tools

Search for "4.13 JPEG recompression" on the page

The legacy JPEG format has been thoroughly explored18,19 over the years and most of its inefficiencies are addressed in the JPEG XL recompression format:

• more robust DC coefficient prediction is used

• AC0x and ACx0 coefficients are predicted on the base of neighboring blocks

• Huffman entropy encoding is replaced with ANS and Binary Arithmetic coding

• frequently used ICC profiles, Huffman code tables, and quantization tables are encoded as template parameters

• context modeling is used to separate entropy sources

• similar to the approach described in Section 4.8, DCT coefficients are reordered in a such way that more blocks have longer series of zeros at the end. The index of last non-zero coefficient is encoded explicitly, which is more efficient than limited RLE.

Those improvements enable 16% size savings on average in a corpus of 100 000 random images from the Internet. For larger photographic images, the savings are in the range 13%–22%, depending on the JPEG encoder and quality settings.

If you want very low level details, look at "Annex M - Lossless JPEG1 recompression" on page 127 of this document (labelled as page 135 if you follow the internal link in the contents)

arxiv - Draft International Standard - JPEG XL Image Coding System

NN

Norman Nescio Silver badge

Re: JPEG XL

"it is a [completely unnecessary] upgrade to the ubiquitous JPEG"

As an 'end-user', you are completely correct.

However, if you are serving images from a central server, saving storage and bits/second adds up. The average individual doesn't care, but an organisation curating a large set of images can save on storage costs; and if serving images out to a large number of viewers, can benefit from the bandwidth savings - a per cent or so on a bottom line of millions of dollars/pounds/euros is worth having.

You don't have to stop using JPEG. There are, however, features of JPEG XL which might be of interest to others.

  • You can transcode existing JPEG files reversibly to JPEG XL without any generation loss. JPEG XL files are smaller, as JPEG XL stores the JPEG data more efficiently
  • A lot of work has gone into removing JPEG artefacts (which show up badly in JPEG at high compression levels) suck as blockiness and colour-banding
  • The maximum bit depth is 24-bit (integer) or 32-bit (float), with up to 4,100 channels.
  • JPEG XL is not so cpu intensive as the video-codec based still image compressors.
  • JPEG XL allows animation (like GIF) - but if you want to encode video, it is better to use a dedicated video-codec, as JPEG XL doesn't try to work in that space - no inter-frame prediction, for example.

So JPEG XL offers the same, or better capabilities as JPEG, GIF, and PNG. No-one is going to force you to change, but some people might like the ability to choose and benefit from some of the optimisations and development in image compression technologies since JPEG.

It's absolutely fine that you don't want to use JPEG XL. You have that choice, and choice is good. The problem is that Microsoft's move to patent software in this area could well remove the ability to choose for many people (at least until the patents expire), and give Microsoft a revenue stream founded on work that was intended to be open and royalty free for all.

If JPEG fits your use case, that is great, and no-one is saying you can't continue to use it. JPEG XL might fit other people's use-cases better, and I think giving people the ability to choose to use it is a good thing.

NN

Norman Nescio Silver badge

JPEG XL

JPEG XL really, really needs to be patent/royalty free, because it is a very well thought out upgrade to the ubiquitous JPEG. Not least, it allows lossless conversion/transfer from the original JPEG format into the new JPEG XL format (obviously the original JPEG was not lossless), while decreasing the file size, which seems a bit like magic.

It incorporates techniques from FLIF* (now to be deprecated in favour of JPEG XL), which allow progressive downloads, so you download only as much of the data as needed to produce an image in the size and resolution you require: i.e. you can use the same source file to deliver a thumbnail or a highly detailed multi-mega-pixel image.

When I last looked JPEG XL had not gone though all the necessary committees, but the file format is agreed (frozen), so it won't change.

Rent-seekers on this incredibly useful image format upgrade should be extremely strongly discouraged by all legal means necessary.

ISO/IEC JPEG WHhitepaper on JPEG XL

Reference Software

Cloudinary Blog (Jon Sneyers): How JPEG XL Compares to Other Image Codecs

72 Slide presentation (Google Drive) - JPEG XL "The next-generation “Alien Technology from the Future” (Last updated Feb 26, 2021)

*The FLIF developer says: "All the good stuff from FLIF went into JPEG XL. In lossless compression, jxl is slightly better than FLIF, while it decodes faster. I stopped working on FLIF and I think JPEG XL can do everything FLIF can do and more."

A borked bit of code sent the Hubble Space Telescope into safe mode, revealing a bunch of other glitches

Norman Nescio Silver badge

Re: And the others ?

Since Hubble is widely believed to be a prototype for a line of inward-pointing spy telescopes, are all those worn out too ?

Actually, it is the other way round. NASA chose to use a 2.4 metre mirror in Hubble instead of the originally suggested 3 metre mirror as "changing to a 2.4-meter mirror would lessen fabrication costs by using manufacturing technologies developed for military spy satellites."

Reference: NASA: The Power to Explore: Chapter XII - The Hubble Space Telescope: page 483

The 2.4 metre mirrors were initially used in the Keyhole KH-11 Kennen series of surveillance satellites. - these pre-date Hubble.

"A perfect 2.4 m mirror observing in the visual (i.e. at a wavelength of 500 nm) has a diffraction limited resolution of around 0.05 arcsec, which from an orbital altitude of 250 km corresponds to a ground sample distance of 0.06 m (6 cm, 2.4 inches). Operational resolution should be worse due to effects of the atmospheric turbulence."

NN

Talk about a Blue Monday: OVH outlines recovery plan as French data centres smoulder

Norman Nescio Silver badge

Re: Shipping containers?

Thank you for the clarification.

Having read elsewhere that the facility had wooden floors (!), which I can't quite believe, the concept of wood inside a metal container with holes in strikes me as 'bold' design for a data centre.

More pictures of the burnt out SBG2 in this article:

DataCenter Knowledge: Fire Has Destroyed OVH’s Strasbourg Data Center (SBG2)

A comment in that article says OVH have started swapping out C13/C14 power supply cables due to possible insulation defects. Perhaps they have an insight into the cause of the fire.

Tweet with video of damping-down operations:

https://twitter.com/abonin_DNA/status/1369538028243456000

I'm really interested to see any investigation report.

NN

Norman Nescio Silver badge

Shipping containers?

I wonder if the fire-resistance of the data-centre was affected by the design: the data-centre was basically stacked shipping containers.

DataCenter Knowledge: Design: OVH Deploys "Container Cube" Data Center

I thought as much seeing the pictures taken by the Sapeurs-Pompiers (Great name!)

In principle, putting things in metal boxes sounds pretty fire-resistant, but once you start cutting holes in them for the D/C infrastructure, you might be building a giant brazier. I'll be interested to read the results of any investigation, if they are made public.

NN

UK draft legislation enshrines the right to repair in law – but don't expect your mobile to suddenly be any easier to fix

Norman Nescio Silver badge

Letter of the law

I'm afraid this will demonstrate the considerable abilities of people/companies to comply assiduously with the letter of the law, while riding a coach and horses through the spirit.

There is a huge difference between 'availability of parts' and 'designing for repairability that is cost-effective and practical'. Sometimes there are arguably good reasons for designing complex integrated parts (like modern car headlight assemblies), and sometimes there may not be. I don't mind a phone being a couple of millimetres thicker and a few grams heavier if I get an easily replaceable battery and screen - but other people, apparently, do. Getting hold of foreign language keyboards is unreasonably difficult for laptops (there are, or were, sellers on eBay, but more official routes were difficult or impossible to find).

Sometimes you need special tools and/or jigs, so even if the part costs pennies, the equipment needed to replace an old part successfully costs a fortune, or is unavailable. Sometimes there are valid health and safety reasons why user-repairs are discouraged.

As others have pointed out, the embodied energy/carbon of an item makes repairing a good long-term option. I am unreasonably irritated that the vacuum cleaner hose for a Miele vacuum cleaner costs more than buying a new cleaner in the sales/special offers. The part is theoretically available, but I object to paying a king's ransom for a plastic tube that will most likely fatigue fail in same way as the original.

I will stop ranting on this topic for now. Triggered, I was.

I suspect a law will require some tweaks to get it working effectively.

NN

NASA shows Mars that humans can drive a remote control space tank at .01 km/h

Norman Nescio Silver badge

Re: Butler's Landing

Despite reading a fair amount of classic Sci-Fi written by people of unsound opinions to modern sensibilities, I too have not read any of Octavia Butler's work. Which is a shame. The first thing that comes to mind, much like John Brown (no body), is the 'Butlerian Jihad' from Frank Herbert's oeuvre:

"Thou shalt not make a machine in the likeness of a human mind," the creation of even the simplest thinking machines is outlawed and made taboo

There's a few people who feel that way about AIs in general.

Of course, give the sandiness of Mars, the pattern matching mechanism in my mind could well have been weighting anything to do with Arrakis for the Butlerian idea to float to the top of the maelstrom of my thoughts. Hmm. Weight. Float. My mind is not being logical.

NN

You only need pen and paper to fool this OpenAI computer vision code. Just write down what you want it to see

Norman Nescio Silver badge

Re: A rather large piece of paper for a fair test

The problem is not what it 'sees', the problem is an inadequate representation of what it is 'seeing'.

If one were to take many apples, and attach a similar size label to each with different words on them e,g, 'screen'; 'keyboard', 'mouse', 'cpu', a human would see a set of apples with labels on them. The AI might well report the image as being 'a computer', or if less clever, a collection of objects like a fire-screen, a piano-keyboard, a small furry creature and an AMD Zen processor. The problem is not the size of the label, but the almost context-free processing of the information it is gaining from the analysis of the image.

Allowing a hand-written label to override what is actually there simply does not make sense. It doesn't look like the AI will easily acquire the necessary domain knowledge on its own, either.

I haven't bought new pants for years, why do I have to keep buying new PCs?

Norman Nescio Silver badge

Cognitive decline

I'm very scared of cognitive decline as I get older - I would not be surprised if I am already showing symptoms: so my issue is how long I can support myself on all this technology. I look at one of my older relatives who has trouble driving an iPad, and mixing up the WiFi password with the PC account password and the Gmail password and wonder if/when I will get to the same state with the then current technology.

My father was simply Not Interested, and paid bills by cheque at the bank, and never used the web or sent an email in his life.

So I need younger victims who will be able to support me (and understand my IT set-up) as I get older. Their experiences will contribute to future columns like this one.

<glum emoticon>

If Google and Apple won't help us, we'll sort it out the Linux way: 21 companies form Mobile Native Foundation

Norman Nescio Silver badge

Re: Smack!

Haven't we already told you, "native" is a naughty word?

Just use 'endemic' instead.

It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info

Norman Nescio Silver badge

The entire certificate based 'security' edifice is a sham. When was the last time you checked that all the CAs your computer is set up to trust are actually organisations you want to trust?

All Transport Layer Security does is give (limited) guarantees that people you don't trust cannot tap in and read data in transit between source and destination. It says nothing about the trustworthiness or not of the destination, which should be assured in some independent way.

When the padlock appears in the address bar, what does the fact that the connection is secure, verified by e-Szigno Root CA 2017* tell you about the site you are sending data to, and how worthy is that CA of your trust?

One of my banks used to act as its own CA, and the only way to do online banking was to install their root cert on the devices you wanted to use. Unfortunately, they gave up that approach.

It is a shame that no-one has come up with a way to make a web-of-trust easy to use. Centralised 'trust' authorities have well known problems.

NN

*Or TUBITAK Kamu SM SSL Kok Sertificasi - Surum 1. There are plenty of other examples.

NASA sends nuclear tank 293 million miles to Mars, misses landing spot by just five metres. Now watch its video

Norman Nescio Silver badge
Joke

Re: Wind

What on Mars is "Mind-bloming"?

GitHub will no longer present a cookie notification banner – because it's scrapping non-essential cookies

Norman Nescio Silver badge

Re: GDPR scope

Thank you for the corrections and clarifications.

One thing to note, the GDPR "was among 69 EU legal acts incorporated into the EEA Agreement by the EEA Joint Committee in Brussels on 6 July 2018."

Ref: EFTA: General Data Protection Regulation incorporated into the EEA Agreement

The regulations entered into force in the three countries of the EEA on 20 July 2018.

Ref: EFTA: General Data Protection Regulation (GDPR) entered into force in the EEA

The practical effect of this is that when you say, "When it comes to the data subject, the test is whether he "is in the Union".", from 20 July 2018, is for practical purposes "the Union and the three EEA countries (Iceland, Liechtenstein and Norway)".

Background: EFTA: How EU Law becomes EEA law.

NN

Another reprieve for exhausted IT admins: Looks like there are no whizzbangers in Windows 10 21H1

Norman Nescio Silver badge

Re: Good

Nah, they'll just flesh out support for the x64 architecture*

*where x="Nintendo "