* Posts by just_me

39 publicly visible posts • joined 1 Feb 2011

We know this sounds weird but in future we could ask fiber optic cables: Did the earth move for you... literally?


More info and article ref'd not that original

There are better technical articles that predate the one referenced here.. and they don't have a paywall..

One at (dates to 2014):




google ref - they may be 'filtering'.


RE: Measuring rotation - Ring Laser Gyroscope

There is also something known as Fiber Optic Gyros (also a MIT project) - also known as FOGs. The Ring Laser Gyros tend to be a bit fragile(more than they claim in shock/impulse), have experience with the Honeywell HG1700 IMU. Not the quietest RLG. To avoid optical resonance lockin on the injected laser signal, the laser assembly is rapidly rotated back and forth at about 450Hz.

FOGs tend to be a bit simpler, smaller, quieter. MEMs gyros are also another interesting gyro source (least accurate of RLG and FOGs). Many commercial drones (and OTC drones) are aided by simple MEMs gyros.

Russian-trained spy whale spooks Norwegian fishermen


Russians under every bed?

Last time I checked... Russians speak ... um Russian, not English. The harness is in English, and there is a St. Petersburg, Florida in the United States. St Petersburg, Florida is also the location for several marine research institutes.

Suggestion; Pause, take a deep breath.. install brain.. get a cup of coffee or tea.. and think about it. No there is not a Russian spy hiding under your bed, in your closet, in the attic.. or..?

Transcript leak: Inside Facebook's secret crisis meeting, where Zuck and Sheryl race to save social network's rep


>Hi everyone. So the reason I wanted us all here was to…

>Well, last week, as you know, I gave an interview to some Harvard Law professor.

>So we all thought this was a good idea because he's not a journalist and wouldn't ask precise questions.

Seriously? Wow.. Attorney types particularly Law Professors tend to be very precise. If you don't feel their question is precise, they probably already got out of you what they wanted(particularly in court). This is why a person representing themselves in court is often considered a fool. Looks like Zuckerburg is a bit disconnected from reality here.

This transcript 'leak' must be a joke.. just couldn't be this 'choice'!

Excuse me, sir. You can't store your things there. Those 7 gigabytes are reserved for Windows 10

Black Helicopters

> All that telemetry needs enough cache space, when it cannot be transmitted at once

You are more spot-on than you may realize. There are already temp spaces in C:\temp, C:\Windows\Temp, and for each user: %HOMEDRIVE%%HOMEPATH%\AppData\Local\Temp. So why would another 'reserved' presumably 'hidden' temp of 7 GBytes be needed?

Microsoft has repeatedly tried turning on the snoopware/Telemetry despite people using menus and the registry to say 'NO' repeatedly. Even deleting the binaries etc doesn't make the setting permanent - because... "They're ba-aack" (this is with Windows 7, 8, 8.1 - with Windows 10, you have already signed up to the beast and have 'the number of the beast tattooed(hidden) on your forehead - JK,.. maybe). The most recent time with Windows 8.1, if you allowed the install of the 'update' that re-enables Telemetry, deleting the patch will not turn it off/disable it. It also looks like part of Telemetry has been inserted into Windows File Explorer - it make a lot of weird connections to file shares, even if you aren't using Cloud services - see "netstat -aon", cross check with process id numbers (tasklist). This occurs shortly after start-up and logging on.

Mozilla's creepy Mr Robot stunt in Firefox flops in touching tribute to TV show's 2nd season


Re: Extended Support Release track

Don't bet on ESR not supporting "studies" or "experiments". Look at 'about:config' search on the category 'experiments.'.... what do you see??

Munich council: To hell with Linux, we're going full Windows in 2020


Re: Not sure about Office?


Your comments put a question as to your claimed 'accomplishments' or which architectures you worked on. For example;

Your arguments for 'tar', there is no option 'y'. However the command:

"tar -xvfz dev/os3/archive/dimsungapp.tar.gz"

Would work - however someone who has worked on Linux and or Unix type architectures would know that. The 'tar' command listed above would extract to current directory unless the files in the 'tar' archive are full path. BTW; tar stands for 'tape archive' - it also has the ability to write to a file as well as a tape drive ie /dev/rmt0, /dev/scsi/0/rmt0... etc depending upon OS variant and generation. After you have extracted the contents of a tar archive, you would not need to copy the tape archive to another directory as in;

"cp dev/os3/archive/dimsungapp.tar.gz /dev/os3/opentext/datatech.pkg"

Or did you mean to copy the contents of the current directory where you extracted the tar file to that new location? That would be;

"cp -r . /dev/os3/opentext/datatech.pkg"

Though considering that install packages 'pkg' are self contained compressed items, I don't see why the need for putting it into or extracting it from a 'tar' file - as well as compressing the tar file. You could install the package directly.

Your comment that sudo is a weird name for a installer(install program) is complete bullocks. 'sudo' is a way to run something as an administrator when you currently aren't. Some people think it stands for 'Super User Do' or run as a super user. In reality it allows you to run a program as any other user than your current user id (provided you have the correct creds). A better way to think of it is 'Set UserId and Do'. The rest of the line following sudo is the actual install command for the package - however also invalid. The tar and copy being unnecessary. 'apt-get' normally doesn't install from a file name, therefore your example below is invalid;

"sudo apt-get install /dev/os3/opentext/datatech.pkg"

Would actually be

"sudo apt-get install datatech.rpm"

NOTE: the suffix is actually rpm for packages handled by the Advanced Package Tool, and it will actually do a download and install. If you want to install a package from a file that has already been downloaded.. it is a different command.

StargateSg7, I think you cobbled up some crap that you thought would fly by people and then threw it out there; nope -doesn't work.

BTW: Most Linux's have a GUI interface for their package managers.

Tech VCs sue Uncle Sam over President Trump's immigration chill


Re: Oh - comma - Really?!?

To qualify under this rule the individual would have to demonstrate a shareholding of at least 10% in a business no more than 5 years old with at least $250k investment from US VCs. That's hardly H-1B territory, it says nothing about salaries and US citizens still have the advantage of no immigration issues at all and potentially lower costs (i.e. "Mom's basement").

Those requirements are for owners of a VC business, or partners of a VC business - not potential slave laborers (or engineers - cs & ee) who are brought here and paid below standard rates with the intended consequence of having the principals retain more of their capital that gets converted to shares at the end when the business goes IPO.

Credit reference agencies faulted for poor patching


Re: If Experian failed to patch...

--snark on--

They need to hold off announcing it because they need to check with multiple 3 letter organizations to make sure that they did not do the hack to obtain information (that they are not supposed to have), for which they don't have a warrant for (because they have no right to the info, no probable cause and therefore would not be able to obtain a warrant). It also give time for those same 3 letter organizations to organize a cover up of the break so it looks like nothing happened (even though they got caught with their fingers in the proverbial cookie jar).

--snark off--

House Reps grease the wheels for hundreds of thousands of robo-cars on America's streets


To allow the auto industry to have robo-cars without built-in override controls is plain stupid. The auto industry has come up with brain dead fobs that allow replay attacks to open your car, even potentially start your engine. They allow global lookups of VIN vs fob-code which allows thieves at compromised dealerships to steal cars (See "Mexico Jeep dealership san diego vehicle theft" using Google), you can attack your cars CAN bus through the entertainment system as well as vehicle monitoring ie OnStar.

Fine; if they want to do this, they must abide by FAA (Federal Aviation Administration) guidance and requirements on software for mission critical applications. After all, the software is mission and safety critical and a software bug can result in death. To build software to FAA requirements might make them think twice. The car manufacturers are too worried about 'reducing' their costs.

I think I might need to contact my state senator and house representative about this and make the above suggestion. Someone has to bring some sense into this.

NASA's Curiosity puts cat among the climate pigeons: Lack of CO2 sinks water theory


Re: Carbons not the only greenhouse gas

umm.. this posting is still running as 'current'?


Hotter than it should be? How about being significantly closer to the sun, how about being effectively tidally locked? How about NOT having water, but sulfuric acid? Remember at 400ppm, that translates to 0.04%, 97% translates to 970,000ppm.


All of the water that is in the gas phase is active. This can be related through partial pressures or even humidity level (% humidity). As a gas, water is very simply a greenhouse gas - no complexities. Water changes from a greenhouse gas to a much more complex behavior when it condenses into clouds - becomes rain etc. The process releases a significant amount of energy in the phase change, much more than raising its temperature from 0C to 100C (over 5 times the amount). Therefore water is also capable of transporting 'heat' energy to the upper atmosphere to be radiated as blackbody radiation into space through evaporation followed by condensation. Clouds also reflect from IR to visible light radiation (yes, IR is part of the EM spectrum that includes what we humans can see as visible - just sits on the longer wavefront end). This reflection includes reflection from the sun back into space, as well as IR radiation from the ground back to the ground. Carbon Dioxide and Water as a gas work by absorbing IR radiation - not reflecting. Water is the 'wild child' in the equation, and can't be dismissed so easily.


You forgot that water is a greenhouse gas too!


Re: Carbons not the only greenhouse gas

Umm... CO2 is not the only greenhouse gas! (Newsflash for those who are swallowing the political line). Top 3 greenhouse gasses, from strongest to weakest are: Methane(CH4), Water(H20), Carbon Dioxide(C02). - you can even look that up!

You can even bother to look these up below:

Concentration of Methane is in parts per billion, not parts per million - so it doesn't even factor in.

Carbon Dioxide is currently listed around 400ppm.

Water is highly variable - but at 37% humidity and 70degrees F, or 21.1 degrees Celsius - comes in at about 9,200ppm.


Water is both a significantly stronger greenhouse gas AND comes in significantly higher concentrations. So much so, that Carbon Dioxide is a non-player.

I think you may have meant to say 'flat earth' not 'static earth', because the 'Climate' always changes and to believe otherwise would mean you believe in a 'static earth'!

Windows 10 S forces Bing, Edge on your kids. If you don't like it, get Win10 Pro – Microsoft


Re: Meh, I give it a few months

It may be sooner. I think there was some sort of court order to the effect that Microsoft was not allowed to block or cause the functionality of software from other vendors to be reduced on the windows platform. It was out of a lawsuit on web browsers ironically - Netscape v Microsoft.

Thumb Down

Me thinks we have been down this road before .. the scenery looks very similar though not exactly the same. Something about Netscape. If you can't really innovate, lockout or bundle to block newcomers or competition. Something about Microsoft not being a monopoly? Any company that can take the tactics it did to force Windows 10 down people's throats is a monopoly.

Sysadmins told to update their software or risk killing the internet


Umm.. article is not completely accurate.

The article is not completely accurate and almost reads as if DNS records are 'encrypted' by a new key that makes any use of the record impossible if the client does not have the new key. This is inaccurate. A reading of DNSSEC would have been a good idea.

DNSSEC sends out the standard DNS records, however there is an additional 'signing' portion, which is signed by the new asymmetric key. The actual record DNS is still in clear-text.

The only problem can occur when a DNS server caches or resolves requests as in a corporation. A problem occurs if the client machines in the corporation are expecting DNSSEC, but the corporate DNS server does not speak DNSSEC. If, on the other hand, the internal corporate client machines don't expect DNSSEC, there would not be a problem with DNS record look-ups. The only risk would be the potential spoofing of DNS records - which is the current case (and why DNSSEC was brought about). NOTE: It would be a good idea to do the update though.

NOTE: There is another scenario that would be of concern for a corporate DNS server. On an outward facing corporate DNS server sends records ie. for authoritive MTA, there would be a problem when the systems of other corporations are expecting DNSSEC on a MTA lookup, while the target corporation is not updated to talk DNSSEC. For the most part though, most corporations do not advertise/map/expose their internal hostname-address mapping outside of their internal subnet, except for machines on their Demilitarized zone.

Net neutrality blowback: Cities say no. Court says whoa. Trumpster blames Canada for not going slow

Big Brother

The article was pretty good until this point: "There are two groups happy with the effort to rescind the rules however: cable companies and Trump advocates." Really? Troll much as an author? Not all of those who voted for Trump agree with the reduction in Net Neutrality as well as the increased invasiveness of ISPs into our internet access records.

Instead of considering that there may be people on the other side of the isle that disagree with Pai's actions, you decided to play wedge politics and split everyone into your vision of good and bad. Trump bad everyone else good. Remember that Trump does not control all the minds in his cabinet. He trusts them to know what they are doing and delegates the responsibility to them. That also means that it may be possible to push Trump to dismiss Pai. If people from both sides of the isle voice their displeasure to Trump, he may take action to remove Pai, the quicker the better. It will take the voices of his supporters to accomplish this because that it his support base that got him into office and if he sees that it is eroding, he will take action to protect it.

So what do you want to do? Protect Network neutrality or continue to find causes to gripe about the election? Choose.

Google to cough up $20m after Chrome rips off anti-malware patents


Re: Specatcularly tedious patent

And an obvious one. Lets patent two processes on a computer system, handing the sub-process the handle to a video stream and starting it an RSH (restricted shell) while handing it the id for a window sub-frame for display.

Patented freeking obvious!!! Been doing stuff like that since I started back in the early '80s. There may be prior art - I know of a fairly large company who has been doing this for 3D display, not video and not for 'anti-virus' purposes. They have been doing it since pre 1995.

Shock: Apple patents the phone book


Re: How is this obvious?

The Dell M6800 that I am typing on does something similar - already. This is not the newest model either, and it is capable of having a cell phone module installed in a slot - connecting to an antenna array.


The USPTO has gone off the rails.

Pence v Clinton: Both used private email for work, one hacked, one accused of hypocrisy


Re: Drink the f up.

I'm here with my beer in hand (actually large pub style glass). Not that light beer type - tend to a Double Barrel Ale, Newcastle, at minimum a hard cider... and then once properly readied - the arguments!

Note: theRegister; You need a beer glass that also contains a darker amber or even a Guinness.. that beer looks light.

On last day as president, Obama's CIO shrouds future .gov websites in secret code

Big Brother

Someone forgetting how https actually works?

While it may not be sinister, and has the opportunity to make communication more secure, there is also another problem buried in how https works. Part of setting up a secure connection requires your browser to send its public key to the server to use to send back the symmetric encryption key to your browser. This key does not change except sometimes when your browser gets 'updated'. That public key is the same key used when setting up https connections to all other browsers. This information allows those tapping networks to track where connections are being made and by whom without having to be directly attached to your connection. Just look at the key being used to set up the SSL connection - See Diffie-Helman key exchange of example.

I hope browsers are going to start using a different public key for each website.

Euro politicians are hyping the terror threat to steal your privacy


Re: Privacy

Doesn't look like you read the full decision and referring documents. looks like you looked at wiki for it. Did you bother to look at Griswold v Connecticut? Decisions often refer to previous decisions, building upon history. So here are some dates for you Griswold v Connecticut - 1965, Roe v Wade - 1973. There is also Eisenstadt v Baird 1972, Lawrence v Texas - 2003.

In Griswold v Connecticut, look at the writings of William O. Douglas.


Re: Privacy

Umm Roe v Wade is right to abortion, not right to privacy - but it used the affirmed right to privacy as part of its argument. Right to privacy under 14th amendment was affirmed in Griswold v Connecticut - 381 US 479, in 1965.

-- was looking for icon 'tip'n a top hat as they head to the door... settled on nutty prof.

Linus Torvalds won't apply 'sh*t-for-brains stupid patch'


Firmware - Driver relation

While Linus Torvalds' actions may seem childish, sometimes one must embarrass those who keep resurrecting stupid ideas. Sometimes it is the only way to get someone to stop pushing a pet idea that just doesn't work right.

Firmware defines the interface a driver must work with. They are intimately connected. If the firmware goes through a rev, it is possible that an interface that the kernel driver has to work with changes.

Figure this: A board using an FPGA as the interface controller sitting on the edge with the PCI-E bus. The firmware gets downloaded to the FPGA (sometimes flashed locally onto the card, sometimes going into video ram that loads the FPGA on a reset). If I change the code for the FPGA, I can easily change how the card interfaces with the PCI-E bus, where controller registers are located, how the card's memory is mapped to the bus, etc.. and therefore changes how the kernel driver talks to the card.

If I don't tie them together, it is possible to have a disconnect with the firmware version and the driver version that is supposed to work with it... causing hard to diagnose breakages. Who and how would the 'magic' combinations of firmware rev and driver rev be tracked?

SGI (when it was a real company) would keep the firmware drivers for the graphics cards with the OS builds (the ole Onyx and Onyx2 RE series). Several other large companies have done the same.

WTF? because separating the two is really a face-plant moment.

FCC swivels to online privacy, gets bitten in the ass by net neutrality


A slight thing that is not mentioned, but is incredibly important. According to the article, the modem's MAC address is the closest thing to the POTS telephone number for Internet communication, not IP addresses. They use that to conclude that ISPS don't have greater visibility and control over user web information. This is absolutely and categorically incorrect. Who has the mapping between the IP address and the modem's MAC address? The ISP does. It has to know to which modem to route the IP traffic to the last 'mile', so it maintains a map between home modem MAC addresses and network IP addresses. On top of that, the ISP also needs that table so that people don't connect some old modem and get service without paying for it, as well as controlling the network speed the user gets based upon what network access tier they are paying for. On top of that, all traffic from the ISP's network goes out through their routers (and any sniffers, filters etc that they apply).

Sneaky Microsoft renamed its data slurper before sticking it back in Windows 10


Re: Updates listed?

I assume the Win7, Win8 updates you are worried about are the Nag/Auto update to Win10 patches. The list I have so far is; KB3022345, KB2952664, KB3021917, KB3035583, KB3068708, KB3075249, KB3080149, KB3102429,KB971033 - This is the list I use for my machines, so it includes MSFT's "telemetry" patches as well as the Win10 update patches.

I also have KB3102810 on the same sheet - I would need to double check why I have this included in the list. I tend to look for these and hide them. There is also a registry entry "AllowOSUpgrade" that should be 0. Key location is "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\"

Crummy Samsung gear no one wants, now no one can get – well done, Apple


5,946,647 - Regular Expressions anybody?

It looks like in patent 5,946,647, that Apple took upon itself to patent acting on pattern matches of Regular Expressions.. like the regular expression for Phone numbers in free-text.. What the ...!!!! There is quite a bit of prior art.

It also looks like Microsoft's Intellisense may also be prior art - initial work was 1988 in Columbia. There is even prior art on data structure extraction dating several decades earlier.

US government fines Intel's Wind River over crypto exports



Isn't AES which is the DOD encryption standard, actually Rijndael, which is Belgian in origination? Looks like some more clueless bureaucrats at the helm here.

Suspected Chinese NASA spy smuggled smut not state secrets



The nom-de-plum "Captain DaFt".. more appropriately "Captain Daft".

Even if the FBI/CIA/NSA looked.. they could not detect the steganographic data. That is because the data being hidden is encrypted FIRST before being hidden in the low order bits of the image data/video frames. Encrypting data causes the data to look completely random (if using good encryption). If the FBI doesn't have the key, they can't see the data and it looks like low order bit noise in imagery data that normally has low order bit noise. Being nearly 'white noise' in characteristic after encryption, statistical analysis may fail. (though the FBI might take the approach of comparing the porn to the noise behavior of commercial encoding systems for video/jpgs, which may NOT be white in their behavior - maybe more like pink noise. This could mean that the existence of 'white' noise in the low order bits might flag that steganography was being employed to hide something.)

Spanish boffins increase GPS accuracy by 90%


This was accomplished over 10 years ago

This is definitely not new. I know of at least one company who did work on this over 10 years ago. There are also many articles about using Inertial (gyro + accelerometer) aided tracking with GPS. One company that I know of is Cubic Defense Applications Inc. Look up "GPS denied tracking" on Google. The inertial devices being used were not high cost/expensive. They were MEMS devices...

A history of personal computing in 20 objects part 1


Babbage difference engine, better example

While Babbage was never able to build the complete engine, there are two in existence. They were built from Babbage's drawings. One is currently located near Silicon Valley @ Computer History Museum (http://www.computerhistory.org/babbage/). It is a bit noisy, but it does run. Much more interesting than the segment thereg showed.. which is basically two digits of the machine (probably one of his prototypes Babbage was using to try to get money to build the full machine)

The other one (full machine) should be at the Science Museum in London.

'Stop-gap' way to get Linux on Windows 8 machines to be issued


The keys are not controlled by the owner.

If UEFI was intended to protect from malware, the user could enter their own keys for what they want to have boot. This is not the current approach.

"This is dangerous misinformation and you are plainly not someone who has current knowledge of malware. There is malware active and in the wild that works by altering the boot process and which would be protected against by Secure Boot. For example, look at the Alureon family of Malware which infects device drivers and the disks MBR. A significant and widespread piecce of malware."

So how did the malware get into the machine in the first place. It didn't get in through the boot process. The boot process is altered as part of the infection. What will happen is that the machine that gets infected will turn into a 'brick' and won't boot. You will not even be able to run anti-virus on the machine to fix it, if you shut down before detecting the infection. How did that prevent the malware infection? I can now see a large number of really pissed of 'brick' owners. True, you could try to re-install the OS and everything that was installed.. but how many people out there have OS install disks as opposed to the vendor 'fix' disks?

The way to prevent malware infection is at the point of infection. Fix the programs that are running, use qualified knowledgeable programmers instead of cheap off-shore labor. Take the time to test. Run boundary checking and fuzzing software against critical CIs..


UEFI is a lockdown technique, NOT designed to prevent malware.

Most if not all malware does not compromise the computer through the boot process. It compromises one or more of the running processes on a running computer to 'own' the target. The computer is already running at this point. UEFI only protects boot, not the running OS. Therefore the UEFI is NOT an anti-malware technique. The real purpose is to take ownership of the computer away from the person who actually bought it. Effectively the EULA that states that you are only 'leasing' the software is now being extended to the hardware.

The additional effect is that Microsoft can put a 'check' of the booting OS DLLs to see if any of them are non Microsoft blessed. While this 'may' prevent some malware.. it also allows Microsoft to enforce what gets run on the operating system. Want a non-Microsoft blessed software product.. forget it unless Microsoft wants to allow it. Want that custom driver for that special piece of hardware? The developer has to get their OS kernel DLLs blessed by Microsoft, with probably appropriate fees paid to Microsoft.

Presently there is a 'work around' and a non-enforce option on the hardware. How long will this last? ARM has already been completely locked for Win8 compatible versions. Will Windows 8 boot require it to be turned on to boot? Then instead of just selecting which OS to run on boot, you have to change hardware settings first then boot.. or if Linux or something else.. disable it first before booting. The question also occurs, what happens if Microsoft breaks and you need something like Knoppix to fix it?

Big Bang secrets hidden in hundreds of petabytes of tape


Looking up the drive itself: IBM TS1140..

It looks like the good old TK50 drive.. and same drive size (double height 5 1/4).

Spec per drive: 800MBps burst (yea, nice.. what is continuous rate)..


ah.. native transfer rate 250MBps on the actual data sheet. WORM cartridge?(Write Once Read Many) 600Watts?? (bottom of spec sheet)??

It does make you wonder. The size of the drive does not take into account size of tape media storage and size of the the jukebox to load and unload tape. Ok.. so compare numbers... lets say against the Iomega Prestige USB 3.0 hard drive 1.5TB available for just over $200 @ frys (and includes hardware encryption - data throughput is at least 200Mbit/sec - interface is 5Gbit. The size is 1/2 of a TK50.. but 1/10th of the IBM TS1140.. and gets power from USB interface-- much less than 600 watts).

The highest density media for the IBM TS1140 comes in at $406/tape for JY media, $246/tape on JC media (4TB - media).

To me, it doesn't make sense. I can place 10x1.5TB drives in the space of that tape drive alone. I can also place 2x1.5 TB drives in the space for each tape cartridge. I don't need a jukebox for the hard drives. Power footprint will probably be lower on the hard drives (can power down/spin down modern drives). Massive RAID will easily dwarf the bandwidth and access times available from a tape system. Space footprint for equivalent storage will also be lower with hard drives - don't have the jukeboxes, and the cabling and controllers using hard drives will roughly equal the cabling and controllers needed for the jukeboxes and tape drives.

Need I also mention, 1 IBM TS1140 has a list price of $42,995? Yes that is about 43 thousand dollars. I haven't even priced in the jukeboxes. Considering that the tape media roughly matches the price of the hard drive of the same capacity... pricewise, spacewise, powerwise, capacitywise, speedwise -- it doesn't make sense.

The truth about Apple's mind-boggling low tax rate


"Here's the rub: how on Earth can you pay your quarterly taxes on your profits before you've reached the end of the accounting year and totted up your expenditure and actual winnings? Well, quite, you cannot. So, one answer is that the taxes that Apple paid, actually coughed up the cash for, in 2011 are based on the profits that they made in 2010."

I suggest the author stay away from discussing anything financial. All corporations in the United States are required to pay estimated taxes through the year. The estimated taxes are NOT based upon last years taxes paid. They are based upon most recent quarter revenues and expenses. Calculations are run quarterly if not more often. This is why they often have large expensive software systems to track financial accounting. (see Costpoint for example) It allows a company to see what their outstanding tax liability is during the year. There is also a penalty in the United States, if you estimated tax payments are under actual by a percentage ( I think the number is something like underpayment by 10%). Small businesses and self-employed individuals often have similar rules.

LightSquared hits FCC right where it hurts


Lightsquared = Dillusional

Lightsquared License was for satellite - low power.. now they want to change their license to allow higher powered ground systems - with the associated problems filtering out the signal. They complain that it is against their constitutional right?? what right? To change the license by litigation?

GPS systems allow a wider band than needed for multiple reasons.. primary one is Doppler. If you are moving, the GPS frequency is shifted proportionately to your velocity (Doppler shift). Some GPS receivers are mounted on devices traveling more than 600mph/960kph. The other reason is the tighter you make a band pass, the more you attenuate the signal you are interested. There is no 'perfect' bandpass filter - particularly at the frequencies involved.

Oracle uncloaks 5TB tape


Is price competitive?

Lets see. Current price that I see for T10000 @ 500GB capacity is about $137.95 each. I can get a 1TByte hard drive for under $100. If I have to restore from this, I don't have to 'wade' through the tape.

If they don't get their price at a useful price-point, forget it. I'll just use a RAID assembly with removable drives and archive the hard drives.