In the homeland of Tolkien
Does no one remember it is Sauron who wields control over the Palantir?
430 posts • joined 16 May 2007
My M1 MacBook Air with 16GB RAM smokes my i9-9700K with 64GB RAM, and significantly faster on single-core and nearly as fast on multi-core with my i9-9900K (those are 95W CPUs, not 6W like the i9-9900 non-K).
The SD card manufacturers are powerless when faced with Amazon's stonewalling on the issue of counterfeits (Amazon actually had the audacity to turn their failure to police their marketplace into a revenue opportunity by creating a paid program for brands to blacklist fakes).
SanDisk estimates over 30% of all SanDisk products sold online are counterfeit. Apple did the same with chargers on Amazon and a whopping 99% were fakes, often with dangerous corner-cutting on product safety that could put lives at risk.
I stopped buying electronics on Amazon a long time ago, and get them from B&H Photo in the US, or in the UK John Lewis and Park Cameras.
Indian governments were willing to overlook China's occupation of Indian territory since 1962, but the brutal attack this year (with nail-studded clubs!) combined with China's wolf-warrior "diplomacy" has permanently turned India into an enemy. While India's GDP is piddling in comparison to China's, due to decades of crony-capitalist faux-socialism, it still has a young population that is not aging like China's and is a huge market that will now be off-limits to the kinds of high-end products China wants to break into. What's more, the Indians are now developing their own 5G technology in-house at Reliance Jio that could prove to be a formidable competitor to Huawei in the future, as telecoms networks are being eaten by software and software is something India is good at, unlike hardware.
Play stupid games, win stupid prizes.
It's just the process of extracting them is incredibly polluting, which is why US rare earth plants were closed, they were happy to ship the pollution to China. Australians for one are not particularly loth to rape the environment for a quick buck, and the Register's own Tim Worstall explained why China's rare earth monopoly is not the trump card it thinks that is:
So Mr. Frank was responsible for Intel CPU design at a time when it was floundering? Granted, a lot of this is due to losing its lead in semiconductor fab process technology to TSMC and Samsung, but that still doesn't inspire confidence, this guy is no Jim Keller of DEC Alpha and Apple A-series fame.
I set up an IPsec/IKEv2 VPN on an OpenBSD box a friend installed in his home network, for purposes of circumventing Netflix's geofencing of content, because of course they blacklist most cloud provider IP address ranges. The one day the machine burned out due to a thunderstorm and that was that.
Amazon is not-so-slowly but surely moving towards it own Graviton2 SOCs for AWS, even if they are not yet as tightly integrated, and I would very surprised if Apple didn’t have a data center variant of the M1 (or perhaps the M2 that will inevitably follow for higher-end MacBook Pros, iMacs and Mac Pros) for its own extensive data center operations (running Linux, BTW).
"Britain, like most of the Western Five Eyes spying alliance, is increasingly alarmed by Russian and Chinese indifference to the rules-based international order when it comes to cybersecurity matters."
That's pretty rich from a country that spies not only on the Russian and Chinese, but also on Brussels (including compromising Belgacom's telephone network) and Germany.
I am slowly transitioning from macOS to Linux, and my new laptop is a 2019 LG Gram 17. Very nice laptop, apart from the ho-hum keyboard (still way better than Apple's garbage keyboards, but that's not saying much). The 17" screen is 16:10 (25600x1600) and an absolute pleasure to work with, as befits a LG. Not a speed demon, but perfectly competitive with current laptops apart from 4000 series Ryzens for multithreading.
For starters their equivalent of the ASA doesn’t let carriers market shitty DSL as “full fibre”, and most broadband connections are DOCSIS cable or fiber. I went from 1Gbps symmetrical to 72/20 theoretical (32/16 real) when I moved from San Francisco to London.
Cassandra was written at Facebook by Avinash Lakshman, one of the authors of Dynamo at Amazon. DynamoDB is essentially the external version of the in-house Dynamo tool that predates Bezos' famous API directive.
As for ScyllaDB vs. Cassandra, if you are starting from scratch, why would you incur the overhead and GC pauses of Java if you don't have to? There's a reason why Facebook doesn't use Cassandra for anything critical in-house, even though they originally developed it.
The A13 in the soon-to-be replaced iPhone beats all Apple's laptops other than the highest-end 16" MacBook Pro. I can only imagine what the A14 in a thermally less constrained body can achieve, and I suspect the "low-end" laptops mentioned will actually be superior in all respects (speed and battery life) to the Intel ones. All apps submissions the App Store have been sending a LLVM Intermediate Language variant that can be retargeted to any architecture supported by LLVM, including arm64. Obviously, poor coding practices and assumptions can still cause the code to work incorrectly, but I would think the transition will be better than the PPC to x86 one was.
The single most important measure would be to ban non-EU control of the press (a certain Australian-American press baron comes to mind) or non-EU political campaign-finance contributions. The US does not allow foreign nationals or corporations to control its media and telecommunications firms (or airlines, for that matter), nor does it allow campaign contributions from non US persons.
Denial of service is one threat. All the others can be addressed with end-to-end encryption, which is becoming the norm on the Internet and should already be for sensitive government operations. Telephony for the general public is practically unencrypted, but that's because our spooks like it this way and have made sure that encryption remains inconvenient if not illegal, and thus they are responsible for this vulnerability.
As for standards, they are built on a baroque foundation of legacy telco crap designed by C-team standards committees, leading to grossly vulnerable protocols like SS7 (in addition to the laughable lack of security, the network also crashes if it is pushed above a certain traffic threshold). In practice, because they are so sloppily specified, interoperability requires access to the other vendor's equipment, which they make sure is not available to potentially disruptive new entrants. In the case of 5G, the 4G already deployed is predominantly Huawei, and since modern networks are essentially software-defined, they can mostly be upgraded but Huawei will do so only if you stay with them.
It would be best if 6G were totally software-defined to work on white boxes and got rid of the legacy ITU cruft, but chances are low.
As for telcos monitoring their network traffic, the author's naive faith in their technical competence would be charming if it weren't misplaced. Read Bert Hubert's excellent paper on how they have been so hollowed out technically through outsourcing:
I use a Ubiquiti USG as my firewall for the convenience of a single management pane of glass. This is completely unacceptable.
In the short term I am going to block them in DNS, and in the slightly longer term I am going to have to get another OpenBSD box with PF in transparent bridge mode to block them.
Biting the hand that feeds IT © 1998–2021