Goodbye, good riddance
Genuinely think Calibri is among one of the worst mainstream fonts out there. Not sorry to see it go. Can’t put a finger on it. Just ugly, looks bloated. Arial all the way.
43 publicly visible posts • joined 10 Mar 2010
Whether they add a caveat to it or not, this is functioning as a medical device and should be registered as such.
Massive implications eg if it diagnoses a melanoma as benign; game over for the patient with no repercussions for Google.
There is a reason medical devices are regulated. Google is playing doctor but with no oversight. Totally irresponsible.
Linux user by day but still keep a W10 partition on the laptop for the odd job (has Office / Illustrator / Visio etc …)
Latest saga was me trying to log into a OneDrive account and being presented with a “login to windows” dialog that would _not_ go away.
Found the right regkey/gp to disable this f*****g “experience” but then it wouldn’t let me log into OneDrive! Error code suggested I needed to re-enable my f*****g “experience” and tie my account to a f*****g online profile before I could use it.
Gave up whatever I was doing.
Windows is a dying lame duck
Re bending network cables
Funnily enough there’s some truth to it; depending on the length of the portion before the bend (its electrical rather than physical length if we want to be exact about it) we can set up a standing wave and even see a reflection leading to attenuation (destructive interference) of the signal (or constructive, if lucky…). That’s the principle behind various types of antenna including J-pole and some more eclectic varieties …
And this is exactly why SRI is so important & needs to be enforced across all browsers as standard... and flag any sites that don't do this.
More fundamentally, the idea of uncontrolled/3rd party resources being pulled in on client-side without any checks at all is just ludicrous in this day and age. This is precisely what happened in BA's massive keylogging hack, and I'm sure loads of other high-profile examples are just a search away...
Does anyone else see "you're using adblock, please disable to continue" and then take great pleasure in saying "ah well, your loss" before closing the page? Especially those ones that have you manually click through 1024 "vendors" (presumably just to fuck you off)?
One exception I'll make is sites that state they will only show ads that, by default, don't track me.
I've often thought about sticking everything through a proxy for accurately logging everything and then totting up the data at the end of the month.
Call me old school, but I do £10 for 3GB mobile data and it's pretty much only for emails and emergencies.
Anything from *.doubleclick.net? That would be invoiced to Google as a proportion of the £10 for the month.
I've worked with a couple of people over the years who have claimed my or someone else's work.
Best one was a presentation I went to where MY slides were being presented by our contractors as THEIR work (with my name removed, of course). It wasn't anything particularly "novel", just a new process for automatically deploying keys or something. But I sat there wondering, heck, I wonder what else they've ripped off...
> "to the best of our knowledge, nobody came to any harm or suffered any detrimental effects as a result of this breach"
Sorry but F off, this has just come to light - how are you possibly in a position to say that? Who knows how long this has data has been freely online / available for? Arse from elbow issue going on here.
Charlatans.
Shame we can only sue for "actual" damages in this country, I was in the area just a few weeks ago and am livid.
This is the key point. I remember some time ago being introduced to a company's SAP infrastructure and all the contracted devs / SAP support folk would speak, sotto voce, of these "interfaces" that all had special codes: "interface 17" and the likes. It wasn't for me to know anything more, I was just to know it was an "interface" and its number was "17".
Fast forward and I figured out that an "interface" was just a batch process that brought some files in via FTP. As was to become apparent to me, these were decrepit little cesspools of filth, where files would end up being put on there in a very specific structure and set of filenames before the next application could come along and read them off the box.
It's probably still running in exactly the same way - I dare you to "improve" it.
Look up Privacy Badger by the EFF. It's cross-browser, open source and developed by a trustworthy organisation.
"Privacy extensions" by dubious third parties give me the heebie-jeebies.
I oftentimes find myself in awe at the sheer breadth of which systemd has been slathered across everything in sight. Just the other day I was doing some work on CentOS box and came across timedatectl. What's that, I hear you ask? Why, another pointless "utility" you're forced to use to abstract the ln -s that would allow you to set localtime.
I'm waiting for RC 1.0 of etch-a-sketchctl, it can't be far off.
Thankfully I don't deal with systemd on my home PC's.
The masochist in me wants to see some of this code. Especially where AIOOBs aren't being caught. The other part of me wants to see it just to give me an ego boost.
There is something intensely gratifying about seeing CIO's fucked over by outsourcing.
No doubt though, the blame will be pinned on the (non-technical) PM than the shitty devs who don't know their arses from their elbows.
This irks me. "You haven't got the right letters after your name, so are not qualified to have an opinion".
My first degree was in music. I now work as a software engineer. I've met people who tell me they've "done" CompSci. And they know fuck-all. The most solid programmers I had the fortune to work with to date studied biochemistry and medieval history respectively.
Anyone who has studied at undergraduate level will attest that it does not matter what you study (bar vocational degrees such as law or medicine), It's your attitude to learning that matters. You get taught HOW to learn. I went to university thinking I'd learn everything about my subject. On graduating, I left knowing just how little I know, but with the confidence to know I can pick up any damn book and learn a subject just as well as anyone else.
Incorrect. IP != MAC, end of. Unless it's done out of band there is no way they're getting MAC of source / return.
Run wireshark and take a look for yourself, note all traffic to / from your gateway will have a source / dest MAC corresponding to your GW HWADDR / MAC.
Common theme with these press releases is towing of the "sophisticated attack" line. This is no exception.
Why is it never "our procedures were crap, we got owned by someone who just put some bits and pieces together that they bought off eBay and tried their chances"?
Tell me exactly why you think it was a sophisticated attack and I'll maybe, just maybe, let you use the word.
On a related note, I wish companies were obliged to give a precise account of technically, exactly why an issue occurred in the first place.
I ended up borrowing a Kinect for a few days and got it hooked up with Pd (open source Max/MSP) via a little OSC magic in no time - there are a couple of good libraries available.
This dude sure looks impressive on stage, but it looks like this piece has been basically pre-determined, sequenced really, with the role of the gestures changing as the piece trundles on. Pushing through a few instructions via MIDI on demand, when one has already decided it's going to be, say, a block of A minor on diapason, principal and 2', is trivial.
Meh. Move along.
Yes, there's the option to 'Leave messages on the server' - but learn to read.
However as Ken rightly said, there's no easy way of restoring the mails if deleted from the server, unless you've got some way of untar'ing your maildir mails (*having converted them from Thunderbird's native implementation of mbox, for example) straight onto your mail root.