* Posts by eldakka

1812 posts • joined 23 Feb 2011

As we stand on the precipice of science fiction into science fact, people say: Hell yeah, I want to augment my eyesight!

eldakka Silver badge

Re: On second thoughts...

Now if we could fit each politician on standing for office with a nose that extends when they lie, that would be a great boon to democracy.

I don't know, it would certainly end up in piercing injuries to the press during press conferences as the nose extends to many metres nearly instantaneously, spearing the journo's asking the questions.

Unexpected risks of using Apple ID: 'Sign in with Apple' will be blocked for Epic Games

eldakka Silver badge

Re: If you are older than 15 and still playing computer games...

If you are older than 15 and still playing computer games...

...then you seriously need to grow up. End of.

Tell that to the people who make millions of dollars a year through e-sports, that is, playing computer games.

Indonesia starts taxing Minecraft, Skype, Zoom and Twitter

eldakka Silver badge

Re: How would the tax be calculated?

Ten percent on what?

Many of the companies on those lists provide subscription-based streaming services, e.g. Netflix. Therefore I'd imagine it'd be 10% of the subscription fee.

But yeah, for those that don't charge a subscription but use advertising ... maybe 10% of the revenue earned from Indonesian customers?

Microsoft to charge $200 for 32 GPU cores, sliver of CPU clockspeed, 6GB RAM, 512GB SSD... and a Blu-Ray player

eldakka Silver badge

Will games be released for the cut down version only, two different versions or will the developers have to have one extensible version that either takes advantage of the improved performance of the full system or can degrade it's configuration to match the reduced performance of the cut down version?

Since both the Xbox and PS are now basically just PCs with PC processing/GPU cores (plus a few custom extras that differ betwen the consoles), I'd say it's the latter (one version that can run in multiple detail level modes) to make cross-console-PC ports simple.

eldakka Silver badge

Re: Can we finally just accept that these are PCs in all but name now?

or updating an O/S

Once I got over the initial excitement of my Xbox 360 and started playing CoD only once a week or so, then every weekend when I turned it on to play CoD, some sort of update was required before it'd allow online play.

If I played every day it wouldn't have been "every time I turned it on", but would still have been at least once a week.

As for the rest, I have my PC in the lounge room plugged into a 55" TV using a long 'active' HDMI cable (that runs under a strategically placed rug so it's not a trip hazard) , as well as a monitor on an articulated arm I can move in front of the couch or push out of the way if I just want to use the TV (for watching TV or for playing computer games on). Wireless keyboard, wireless mouse sit on a shelf under the coffee table with all the 'other' remote controls (TV, media player, stereo, etc.).

I've disabled all O/S updates, so only update it every couple of months when I decide to force an update when I want it to update. Usually kick it off as I head to bed and let it run overnight so it doesn't interfere with any active use time. Since I rarely turn it off (usually just sleep or somtetimes hibernate overnight) it's usually always instantly ready to use, doing other non-OS specific updates (game updates, launcher updates, etc) in the background.

I'm likely to still get a console in addition to a PC, but it isn't hard to hook up a PC to a TV and use it 'quickly' and simply. Don't even have to change seating position or move to using another device if I want to switch from doing work (word processing, coding, etc.) and start playing games on the TV, just switch the TV to computer input, fire up the game on the TV output device, push the monitor out of my eyeline, and away I go (or even keep the monitor there for information I might need while playing the game, manuals, strategy guides, etc.).

Don’t lump us in with Facebook, internet infrastructure companies warn European Union

eldakka Silver badge

Much as some (many? most?) members of the public confuse Google with "the internet" and misunderstand the way things are plugged together, I get the distinct impression that the same is true of politicians, even those who have been put in charge of departments with specific responsibilities.

Considering these bodies also wrongly conflate 'the web' with 'the Internet', are we really surprised they can't just as confused with platforms/apps?

Zero. Zilch. Nada. That's how many signs of intelligent life astroboffins found in probe of TEN MILLION stars

eldakka Silver badge

I remember Steven Tingay from the excellent BBC Horizon's documentary Cosmic Dawn: The Real Moment of Creation. Specifically because I thought that I wouldn't want to argue with him at an astronomy conference, as he looks like a rugby player that could throw you across the room.

Northrop Grumman wins $13.3bn contract with US Air Force to kick off Minuteman III ICBM replacement

eldakka Silver badge
Coat

Re: Pleeeease.....

Please don't tell me that this update means they are going to install Win 10 in the missiles.

Just thank your lucky starts that since Boeing isn't involved its not going to get MCAS.

AT&T’s CEO has a solution to US broadband woes despite billions sunk into the problem. You’ll never guess what it is

eldakka Silver badge
Flame

Everybody agrees - in fact, agreed a decade ago - that a move to fiber optic cables is the inevitable next evolution of communication.

Everyone, that is, except for an Australian Liberal Government who gutted a planned optical fiber rollout and replaced it with using existing, obselete, in many cases due for replacement anyway due to age and wear and tear, copper and co-ax cable.

Digital pregnancy testing sticks turn out to have very analogue internals when it comes to getting results

eldakka Silver badge

Re: This device is far less unreasonable than it seems.

In most cases where there's a pregnancy then a nice clear line will develop, but sometimes it can be faint, or sometimes people will see a positive reaction where there isn't one.

This is why one should always use 3 (from different manufacturers) of such a cheap device when doing a pregnancy test.

Never trust the results of a single strip.

'A guy in a jetpack' seen flying at 3,000ft within few hundred yards of passenger jet landing at LA airport

eldakka Silver badge
Alien

Re: hah

And I'm sure with the alien tech they have at Area 51, if incorporated in such a device, would make 270 miles a trivial distance.

China trolls Trump with tech export rules changes that could imperil TikTok sale

eldakka Silver badge

Re: but he's a late comer.

Who else but trump can go bankrupt in a business where "the house always wins"?

eldakka Silver badge

Re: Irrelevant

Since Tiktok can be banned & cutoff access to the US with the stroke of a pen.

If by "stroke of a pen" you mean the president signing legislation that has passed both the House and the Senate, then sure.

If you mean via executive authority alone, then it is doubtful the president has that sort of long-term authority, short term emergency declaration, sure, but unlikely permanent/long-term.

Relying on plain-text email is a 'barrier to entry' for kernel development, says Linux Foundation board member

eldakka Silver badge

I thought Sarah was talking about how developers share their work on the kernel, not how how each developer should write said code..

But how does @dboyes share their code then? They are writing the code on this remote high-latency system. And do they then submit that code to be included in the kernel?

I'd imagine right now, they write their code on that remote system, then just use a command-line email client on that remote system to send the code they've just written to the LKML. And likewise to receive any responses that may have code changes in it.

If they have to use some sort of GUI HTML-ised application that only runs on x86 windows PCs, which this remote system isn't, how are they now going to send that code? They'd have to copy to their local system (scp/sftp etc.), then fire up that HTMLized client, and then submit the code - and vice versa if someone in the LKML suggests enchancements, they'd have to copy it out to that remote machine before using it. And that assumes tehy have a compliant local system that can run this sugested GUI for the messaging system.

If you think Mozilla pushed a broken Firefox Android build, good news: It didn't. Bad news: It's working as intended

eldakka Silver badge

Re: Seemes to work ok after upgrade.

Do you use firefox sync?

Could it be that users who use sync keep their bookmarks, whereas users who don't, don't?

Chromium devs want the browser to talk to devices, computers directly via TCP, UDP. Obviously, nothing can go wrong

eldakka Silver badge

Interesting. Seems like this proposal could negate most of my organisations security.

This is what I think was meant by King's response:

In response King quipped, "It’s not the super dodgy, poorly maintained native software that I’m worried about. It’s the super dodgy, poorly maintained server software that is now one XSS away from hostile socket connections."

Right now, my organisation has 10's of millions of dollars in firewall appliances, gateways, multi-tier application infrastructure (which is another 10's of millions worth of developer time to create all these multi-tier applications) not to mention a couple-dozen staff who manage and operate and secure that infrastructure.

The multi-tier applications are set up such that there is no direct access to databases to the internet, thus no SQL-injection-type attacks can be made 'raw' from the internet. First stop for outside communications is hitting web applications inside the gateway environment. These don't have any access to the database, that still lies several firewalls away. These apps use various application to application protocols (corba, webservices, message passing/queing) to do fixed-function communications deeper into the application environment. These deeper components sit several firewalls deeper and can only accept those fixed-function and limited protocol communications (i.e. no ssh is allowed in) from the application servers in the gateway. These backend app components also can only perform fixed-functions calls back to the database. Therefore to be able to do arbitary SQL communications with our databases, you'd have to:

1) penetrate several layers of firewalls to gain control over a server in the gateway (since the apps running on it can't do arbitrary calls to their backend, you can't do that by just taking over the apps on the box). Youd have to gain shell access to the box.

2) once you have shell access, you'd have to do an escalation of privilege attack and bypass whitelisting to be able to install software on the box to allow further chaining deeper into the network.

3) rinse and repeat seps 1 and 2 possibly several more times (won't detail any further), that is gain shell access behind more firewalls and escalation-of-privilege to bypass whitelisting and install software to do more chaining.

4) do your attacks against the database.

Sure, our organisations security is penetrable, but it would require a custom attack and (hopefully!) hundreds of man-hours of work to do all the chaining, which gives plenty of opportunities and most importantly time for the security staff to notice something is going on and intervene manually to stop it. It'd be like someone breaking into a bank vault but taking 100 hours to do it, thus getting caught when people turn up for work the next day and notice the crooks attacking the vault. Each organisation attacked would require its own custom attack and dozens or hundreds of hours of work.

But with this proposal, you could write some javascript, insert it (legitimately) into an ad network, and await some dumb (i.e. 'typical', the type of fall for phishing email attacks constantly) user who visits a 'safe' site like the guardian, new york times, anything that uses ad networks, and skip steps 1-3 and go straight for step 4. Thus rendering all those tens of millions of dollars in firewall infrastructure and application architecture irrelevant. With this one javascript, you could probe thousands of different organisations without any extra work. This attack would even bypass typical email-phising protections, i.e. desktop whitelisting preventing documents/applications included in emails from launching at all on the desktop. However, the browser is already whitelisted, therefore anything running inside the browser, like this javascript that initiates TCP/UDP connections outbound from the PC, is also whitelisted.

Sure, this could be mitigated, desktop firewall rules that only allow the browser to communicate with the proxy server, not allowed to hoik off to random internal destinations. Zone off al the PCs into their own zone so they can't access anything else on the network, but then how to you get to your shared drives? Perform legitimate access to the database? I can think of defenses, but most of them would cause lots of pain to the end-users, e.g. not being able to access the internet at all on your desktop PC, having to remote desktop to another server/PC that is allowed browser access, and so on. But I see massive additional costs to organisations in more security work and lost productivity due to having to 'double-handle' internet access. For example, I access the internet everyday, I am a system administrator, so I'm always doing internet searches on how to resolve issues, looking up info on patches, or looking up documentation, etc.

Yeah, I'm on King's side - if I've interpreted the quoted statement correctly - on this.

What happens when holes perfect for spyware are found in the engine room of millions of Qualcomm-based phones? Let's find out

eldakka Silver badge
Paris Hilton

Collectively, Check Point is calling its Qualcomm probe Achilles, 'cause that's a bit more memorable than a fistful of CVEs.

That mean's it's time to send Paris in, the slayer of Achillies!

Geneticists throw hands in the air, change gene naming rules to finally stop Microsoft Excel eating their data

eldakka Silver badge

Macro/VB Script?

I'm surprised someone hasn't written a standard Macro or VB Script "Open Gene data file", so you just open Excel, press the hotkey to activate the Macro that imports a prompted-for file and does the formatting as part of the Macro. Then that Macro/VB script can be shared out and be a "must-have" 'plugin' for Scientists doing Gene-work.

Canon not firing on all cylinders: Fledgling cloud loses people's pics'n'vids, then 'Maze ransomware' hits

eldakka Silver badge

Re: "...offers 10GB of long-term storage space for people's personal photos and videos"

Because you'd expect their back ups to be more robust than yours.

But do they have backups? I mean, if they had backups, why were they unable to restore the 'lost' images?

Cloud != backed up.

Cloud != replicated mult-site data.

Those are typically additional services on offer from the cloud providers, for extra charge.

Selected quotes from Canon.image FAQ

Q. Will my images be completely deleted once the expiration has passed?

A.Once the 30-day expiration has passed, your original images will be automatically deleted from the image.canon cloud server. The thumbnails of original still images (JPEG/HEIF/RAW) will remain after the expiration, however. If this service is not used for 1 year, though, all of your images, including thumbnails, will be deleted.

Q.Can the expiration of original images be extended?

A.You can change the expiration of up to 10 GB of images to long-term storage. Select the images, and forward them to 10 GB storage from the menu. Note that if this service is not used for 1 year, all of your images will be deleted. Click here for details about the storage period.

And from their Terms of Use:

7. Content Storage

Members may upload and store Image on storage (a) under the Service (the “Storage (a)”). The Storage (a) has the maximum storage capacity limitation set by hosting service provider(s) employed by Canon for the Service. Storage capacity or period for Storage (a) is available on the website or in apps for the Service. Image is stored in Storage (a) for a maximum of thirty (30) days from the day the Image is uploaded. During the thirty (30) day period, a Member may, at its sole discretion, move the Image from Storage (a) to storage (b) under the Service (the “Storage (b)”). IMAGE THAT IS NOT MOVED FROM STORAGE (A) TO STORAGE (B) DURING THE THIRTY (30) DAY PERIOD WILL BE FIRST INACCESSIBLE TO RELEVANT MEMBERS AND THEREAFTER AUTOMATICALLY DELETED. The storage capacity or period of the Storage (b) is separately set by Canon at its sole discretion. Storage capacity for Storage (b) is available on the website or in apps for the Service. IF A MEMBER DOES NOT ACCESS THE SERVICE BY LOGGING ON HIS OR HER CANON ID ACCOUNT FOR ONE (1) YEAR FROM THE DATE OF HIS OR HER LAST LOGIN, THE MEMBER’S IMAGE STORED IN STORAGE (B) WILL BE FIRST INACCESSIBLE TO RELEVANT MEMBERS AND THEREAFTER AUTOMATICALLY DELETED.

Once the Image is deleted, it cannot be recovered. Members can check the dates for any scheduled deletion of Image on the website and in the apps of the Service.

Struggling company pleads with landlords to slash rents as COVID-19 batters UK high street. The firm's name? Apple

eldakka Silver badge

Re: My heart bleeds

It is a buyer's market for retail space at the moment and landlords will be very aware of that.

Commercial leases are usually taken on multi-year leases, ~5 years is typical. This usually advantages the leasor as it locks in rent at current prices for several years.

Depending on how long the current leases have remaining, and how much the landlord is prepared to burn their bridges with respect to future business after the leases expire, the landlord would be within their rights to force Apple to pay the contracted rate until the end of the lease, which Apple would have to keep paying until the end of their lease even if they relocated.

This isn't a case of a bankruptcy (which could effectively dissolve all such leases and leave the landlords as creditors to a broke company), or even a struggling company that could reasonably ask for a rent reduction. As the article noted, Apple has ~$190billion in cash, not illiquid assets, but actual cold, hard cash on hand. They are not in any way struggling long-term. Their current revenues might be down, but the company is in no danger of going bankrupt for decades with the amount of cash they have on hand, even if their revenues dropped to nought.

Microsoft confirms pursuit of TikTok after Satya Nadella chats to Donald Trump

eldakka Silver badge
FAIL

The post goes on to mention that if Microsoft were to buy TikTok it would conduct “a complete security review”, implement “world-class security, privacy, and digital safety protections”

I'd just like to give a shout out to Windows 10's non-opt-outable1 telemetry!

-------------------------------------------

1: it can be disabled with 'hacks'. There are no set of simple toggles to disable telemetry that can be used by the average user. It's all intenionally burried under mountains of non-approved manual regedits (unless using 3rd-party apps or scripts like ShutUp10).

Amazon gets green-light to blow $10bn on 3,000+ internet satellites. All so Americans can shop more on Amazon

eldakka Silver badge
Thumb Down

Wonderful, just who I'd want running an ISP, an organisation that admitted:

Bezos' most shaky moment came when he was forced to admit that Amazon's staff get access to all the internet souk's data behind the scenes and can use that to decide which new products to sell

This investor blew nearly $300,000 on Intel shares the day before 7nm disaster reveal. Yup, she's suing

eldakka Silver badge

Re: Buying on day of quarterly report

Probably expected the share price to go up. Buy low, sell high, etc.

Someone purchasing nearly $300k worth of shares the day before the investor meeting would raise red flags of insider trading to me.

Sounds like she got a 'hot tip' from someone claiming to be in the know (an insider), which turned out to be garbage. And now she has sour grapes for following an illegal tip that turned out to be wrong.

Amazon and Google: Trust us, our smart-speaker apps are carefully policed. Boffins: Yes, well, about that...

eldakka Silver badge

"We require developers of skills that collect personal information to provide a privacy policy, which we display on the skill’s detail page, and to collect and use that information in compliance with their privacy policy and applicable law," an Amazon spokesperson said in an emailed statement.

Nowhere do I see in that statement regarding provacy policies adjective on those policies like:

  • relevant
  • accurate
  • reasonable
  • enforceable
  • understandable
  • binding
or their synonyms.

Reply-All storm flares as email announcing privacy policy puts 500 addresses in the 'To' field, not 'BCC'

eldakka Silver badge

Even if you didn’t want to rely on a hosted service you can buy the mailing list software to run on a local machine.

The sad thing is you don't even need to buy the software.

LibreOffice does it for free. It (mail merge) is a built-in feature.

And if you already have MS Office, it also has mail merge built-in for no extra cost on top of the existing MS Office license.

And I find it hard to believe that any organisation wouldn't have at least one of those 2 suites already, at least in limited quantities for interoperability purposes in case they did have to deal with someone who only accepts MS Office or open formats.

Irony isn't dead... Facebook sues EU on data privacy grounds for requesting too much personal data

eldakka Silver badge

Due to the commercialization of US healthcare, the only way to realistically afford said healthcare is if one is either stonking rich or has insurance. Therefore many companies offer health insurance packages as part of employment which, amongst other things, is extra control an employer has over an employee, as it ads a level of fear in employees of losing their access to health, therefore providing incentive to employees to toe the company line or else get fired and lose access to healthcare. This also has the additoinal benefit (for the employer) of giving them a reason to obtain personal data from the employees under the guise of providing the health insurance. Therefore in the US a company may have obtained massive amounts of personal data in the guise of providing such services.

I'm assuming that this healthcare information is in part at least what they are referring to could be subject to thus data request.

Battle for 6GHz heats up in America: Broadcasters sue FCC to kill effort to open spectrum for private Wi-Fi

eldakka Silver badge

Re: With so few homes using TV antennas, I could see the FCC getting away with this

So why are the broadcasters fussing about it? That spectrum is certainly not being used to deliver satellite TV

As per this nexttv article:

Broadcasters use the 6 GHz band for auxiliary (BAS) operations--"sporting events, breaking news and special events" and says the FCC's proposed interference protections--limiting it to lower-power, indoor operations--miss the mark, particularly since some camera transmitters used to relay footage back to stations also operate indoors and at low power, so they would be in the interference line of fire even with those limitations on unlicensed devices.

Also, as per your previous post:

However, if your 6G WiFi signal is strong enough to get you good internet connectivity if you are sitting out back on the patio, then its strong enough to interfere with an incoming TV or other broadcast using that same frequency.

Even if the previous statement showing it's not used for broadcast didn't exist and it was used for that, well it would be a consumer of a 6GHz WiFi signal self-interfering with an incoming 6GHz signal. In which case it is the consumers choice to forego (interfere with) the broadcasters incoming (to their residence) 6GHz signal in favour of their own use of 6GHz. So, consumer choice, use 6GHz Wifi and lose 6GHz broadcast reception (assuming the automatic frequency coordinator doesn't work) or use 2.4/5GHz WiFi and get the 6GHz broadcast signal.

Finally, why do you keep referring to it as '6G'? 6G would imply it being the successor to the mobile telecommunications (aka cell aka mobile phone) standard 5G, which is not 'G' for gigahertz, but G for Generation. 5G is the 5th Generation of the mobile telecommunications standard, nothing to do with frequencies at all. 6G, as you keep referring to it as, would imply the 6th Generation mobile telecommunications standard, and does not signify the 6GHz band, which is what we are talking about here.

Intel couldn't shrink to 7nm on time – but it was able to reduce one thing: Its chief engineer's employment

eldakka Silver badge

Re: Ummm...

"Kelleher previously oversaw Intel's manufacturing work, including the ramp up of its disastrous 10nm node." So, the person responsible for the 10nm disaster is in charge of 7nm and 5nm. Right.

I don't think it means what you think it means.

She was in charge of operations, not RnD:

She is responsible for corporate quality assurance, corporate services, customer fulfillment and supply chain management. She is also responsible for strategic planning for the company’s worldwide manufacturing operations.

She was in charge of the manufacturing in terms of building new fabs, scheduling and organising conversions of existing fabs (e.g. migrating a 28nm fab to 10nm), maintaining fabs, keeping them running (getting the consumable chemicals etc.), building new fabs as requred to meet manufacturing demands, etc. The physical infrastructure of fabbing.

RnD say "these machines can do 20k/month with a defect rate of x", but when she puts them into a fab, they only do 5k/month with a defect rate of 10x ... She can't build fabs to meet demands if the technology given to her (the litho machines developed by RnD) are complete shite and can't hit their specifications.

US IT staffing biz accused of abusing student visa program now forced to stop advertising only to immigrants

eldakka Silver badge
Flame

The workers went unpaid if they weren’t hired and Samal forced them to submit phony sick and annual leave requests so he wasn’t obliged to pay them a salary. He also took 401k retirement contributions from his workers and banked them in his own accounts.

What a piece of shit.

Garmin staggers back to its feet: Aviation systems seem to be lagging, though. Here's why

eldakka Silver badge
Coat

How is Garmin going to navigate it's way out of this?

Google search trends used to calculate floating prophylactic prices

eldakka Silver badge
Coat

The more you worry about what’s going on below the belt, the further the price drops. Now to short the market

I'll go long ...

An axe age, a sword age, Privacy Shield is riven, but what might that mean for European businesses?

eldakka Silver badge

Re: SCCs

An SCC is a civil contract between the EU entity and the foreign entity it wants to shovel data to, that exists outside of (or hand-in-hand with) the inter-governmental Privacy Shield-type agreements. They do not depend on or require such inter-governmental agreements to function - in fact you'd use them in lieu of such inter-governmental agreement. Therefore the concept of SCCs as a civil contract was upheld (or perhaps more accurately, not overturned).

However, the court also recognised that they are civil contracts between the business entities. As such, they are not binding on the governments (of either end), and as civil contracts they must exist within and can be overriden by local laws.

One of the clauses of an SCC requires that the non-EU entity the agreement is with to notify its EU partner if and when the laws of the local country (that is, at time of contract signing or if the local laws later change to make it so) override any SCC contractual provisions that impact privacy of the data. In this way, a, for example, US company if served by an NSL (National Security Letter that usually have criminally enforceable secrecy) doesn't have to tell the EU partner that it has been served with such, but it does have to tell the EU entity that it cannot abide by certain clauses - or the entirety - of the SCC, thus effectively terminating the contract. Although in this example, the fact that an NSL could be served, that the law allows for such, under which a non-US (hell, even effectively US) citizen has no rights, no standing, no recourse to US courts to fight it, is grounds to invoke the clause 5 (from the decision):

141 It follows that Clause 4(a) and Clause 5(a) and (b) in that annex oblige the controller established in the European Union and the recipient of personal data to satisfy themselves that the legislation of the third country of destination enables the recipient to comply with the standard data protection clauses in the annex to the SCC Decision, before transferring personal data to that third country.

There were two prominent US laws (actually a law and a Presidential Executive Order(EO)) that are the prime reasons for overturning Privacy Shield, Section 702 of the FISA, E.O. 12333, and since the mere existence of that law and EO is sufficient to overturn Privacy Shield, they necessarily also nullify SCCs with US entities. This doesn't affect SCCs with non-US entities, which would be taken on a country-by-country basis.

This is why some of the commentary says that SCCs are still valid, because they are. But they overlook the fact that SCCs with US entities are not valid.

Cisco restores evidence of its funniest FAIL – ethernet cable presses switch's reset button

eldakka Silver badge

Re: Either way

But as to why someone would want a locking tab protector... give it a few years and the patching and re-patching activity will have woven 24 of the 48 cables into a kind of rope. If you then need to withdraw a foot or so of one strand of this rope in order to reach a different port or socket, say a new bank of sockets has been added during renovation works or because the original space was under specified, then you have a choice of

This is why I keep a roll of tape (the narrow-width office-type, not duct-tape) on top of my switches at home. When I unplug a cable, if I'm going to pull it I'll wrap some tape over the tab. This is for 'hobbyist'/home/office-type work. I imagine doing it at scale (say an entire 48-port switch like you noted) would be quite tedious taping that many tabs.

UK.gov admits it has not performed legally required data protection checks for COVID-19 tracing system

eldakka Silver badge

Re: "No evidence of data being used unlawfully"

Absence of evidence is not evidence of absence.

Just because they haven't found evidence, even if they are actively looking for it, doesn't mean it hasn't happened. It just means they don't know it has happened.

Black hole destroys corona

eldakka Silver badge

Re: Does it follow a pattern?

I've been asking for these,

Most of the data from the observatories is publically1 available, therefore rather than waiting for someone else to do the work you want, maybe you should go and analyse the data sets yourself? Many discoveries - like Fast Radio Bursts - were originally found by trolling through old data and noticing something different.

* Yeh yeh, gravity is attraction only, blah blah blah escape velocity, blah blah blah, lots of magic numbers, complex equations mean must be true etc etc etc. Science is never wrong and so on.

Oh, you are one of those2, so obviosuly you won't go and do the research yourself, because you have no idea what the hell you are on about.

------------------------------------------------------

1. The small amount that isn't is usually just embargoed for 6 or 12 months so the researchers paying for or allocated the observing time for their project can have the first stab at the data to write their papers and publish first.

2. being those people who lack the educational background and intelligence to understand the concepts, therefore since it is outside their real-world experiences call it 'magic' and blame the science and the scientists for their own lack of understanding and claim it's all a conspiracy theory. Then they go off and propose their totally illogical, inaccurate, unsupported, mathematically wrong, factually wrong theories to boost their own self esteem and try and feel smart because they just aren't.

Seven 'no log' VPN providers accused of leaking – yup, you guessed it – 1.2TB of user logs onto the internet

eldakka Silver badge
Coat

Ah, so these aren't Virtual Networks that are Private. They are Networks that are Virtually Private.

Report: CIA runs secret cyberwar with little oversight after Trump gave the OK, say US government officials

eldakka Silver badge
Coat

“our government is basically turning into fucking Wikileaks…"

Well, they have ben trying to fuck Wikileaks for a while now ...

Rust code in Linux kernel looks more likely as language team lead promises support

eldakka Silver badge

Re: Is there a reason we need YAPL?

Ergo yes it is a problem caused by the language because it does not happen in this other language.

It is not a problem caused by the language.

The language allows it to happen, but "allows" is not synomonous with "causes".

The language allows a bad coder to do bad code. A good coder will not make those mistakes.

Just like a bad craftsman might lose a finger to their chisel, whereas a good craftsman won't. Are you going to blame the chisel for causing the bad craftsman to lose their finger?

eldakka Silver badge

Re: "the actual error is still the result of a developer making a mistake"

Fair enough, certainly sounds safer than C/C++, but that wasn't my point. I was replying to @DrXym who wrote (emphasis mine):

"... how many are caused by the language ..."

Double-frees, null pointer deref's etc. don't occur because the language made someone do it. They occur because a developer wrote a double-free or null-pointer deref in the code, the developer made an error, not 'the language'. That's the statement of a poor workman blaming their tools.

Just because a language does whatever you tell it to do is no reason for blaming it for doing what it was told to do ...

eldakka Silver badge

I have a question around the Human Resources aspect of going to Rust.

If a kernel module was submitted in Rust, and had issues, how many current kernel devs would be able to debug it in Rust, versus if it was a C/C++ module?

Are there enough skilled Rust kernel developers vs skilled C/C++ developers? Are you reducing the pool of relevant skilled developers by going to Rust? (Although if you get a huge decrease in errors, debugging time, and increased productivity due to not having to chase as many errors, that could cancel it out.)

How many current devs would be excluded from kernel development because they aren't interested in learning Rust? Say those who do it out of personal interest and have no need in their work life to learn Rust (e.g. in the twilight of their careers, or are mainframe developers that don't need Rust) therefore aren't keen on having to pick up a new skill set to continue the kernel development they've been doing for decades? Although I imagine it'd probably take decades for the kernel to convert fully to Rust - if ever - therefore devs in those positions would still have stuff to do, but only if they don't want to work on new and groovy kernel projects which may be in Rust.

eldakka Silver badge

Re: Is there a reason we need YAPL?

Go and look at the CVEs for the kernel and note how many are caused by the language - double frees, null pointers, buffer overflows etc.

That's not caused 'by' the language. The language doesn't write itself. It's caused by developers making codeing errors, using the language badly.

It is fair to say that the language makes it easy to make such errors, but the actual error is still the result of a developer making a mistake.

Detroit Police make second wrongful facial-recog arrest when another man is misidentified by software

eldakka Silver badge

Wait, what? It took no less than a judge to dismiss the case vs the police drop the case and let the poor fella go?

That was pretty much my reaction too.

I can sorta (though I don't think it's acceptable still) imagine an arrest warrant being drawn up and auto-filled as it were.

But surely between the actual arrest and before charges were formally filed, someone would have thrown a human eye over the evidence and released the wrongfully accused suspect without charge?

Top Ubisoft execs eject after staff complain of 'toxic' workplace environment for women at Canadian studios

eldakka Silver badge
Coat

Male staffers openly displayed pornography in front of their female colleagues,

Wait, isn't that being inclusive? Wouldn't showing it only to male colleagues be sexist?

(Of course, pron shouldn't be showing at this* type of work at all anyway!)

* 'this' type of work not being porn-related employment. It would be perfectly acceptable to show porn at work if the work was porn-related obviously, such as a porn filming studio or business that runs pornhub for example.

If the Solar System's 'Planet Nine' is actually a small black hole, here's how we could detect it... wait, what?

eldakka Silver badge

Re: Great just what I need in 2020

Fair point.

The bushfires were bad, with an effect that will be felt for several years of regeneration and re-building.

But Brexit is going to be the gift that keeps on giving (in a bad way) for decades to come.

eldakka Silver badge
Coat

Re: Great just what I need in 2020

First, COVID-19, then a one night stand getting pregnant. And now a black hole. Great.

First, bushfires, then ...

IBM job ad calls for 12 years’ experience with Kubernetes – which is six years old

eldakka Silver badge
Coat

Ah, but if a 'years' worth of experience == 1 work-year of 40 hour weeks, then maybe they are after workaholics who did 80 hours/week on Kubernetes - working 2 jobs, or lots of overtime on one job, or working 1 job and self-studying/tinkering at home for another 40 hours/week - making it 12 work-years.

Heir-to-Concorde demo model to debut in October

eldakka Silver badge

Re: Great timing

Treat the flight as a hotel room, instead of sleeping overnight in a hotel, then travelling through the next day.

That's part of how I backpacked around Europe 15 years ago, using overnight sleeper trains to get between (relatively) distant points within Europe.

The problem doing this with current aircraft though is that noise curfews at either or both of the source and destination airports might not fit within that pattern.

LibreOffice community protests at promotion of paid-for editions, board says: 'LibreOffice will always be free software'

eldakka Silver badge

Good luck trying to convince middle managers that LibreOffice can be used in an "enterprise" environment now it has the word "personal" in the about dialog.

But I think that's sorta the point. LibreOffice wants enterprises to use the paid for Enterprise edition rather than the free Personal edition.

Hey, Boeing. Don't celebrate your first post-grounding 737 Max test flight too hard. You just lost another big contract

eldakka Silver badge

Still I think it's a function of the banking laws as to whether a 'charge back' or 'reversal' is even possible.

While it can be a function of banking/consumer laws, it is also a feature offered by the credit card companies independant of (as long as it complies with) those various laws. Well before any such consumer/banking laws existed, it was in the terms and conditions of credit card companies to their users and requirements of payment processors/providers of the credit cards to be in compliance with the terms and conditions of the CC companies. It was one of the ways they enticed people to using CCs over things like travellers cheques, bank transfers, direct deposits, etc., it was an aded feature, a safety net the companies themselves offered and was often oncorporated later into individual countries laws. Therefore even if it isn't enshrined in law, it is enshrined contractually between the CC provider (Visa, Mastercard, American Express, etc., and the banks provding the CC under those umbrellas) and the business offering that payment option and the CC holder using that payment option.

eldakka Silver badge

Re: One question

My confidence level on the MAX will improve if the entire Boeing Board, President and VPs, including the upper echelon of the FAA are on a test flight of a MAX flying from the east coast to the west coast and back -- y'know, just to be sure.

That would do nothing for my confidence. Why? Because:

1) the aircraft will be hand picked from the fleet, gone over with a fine-toothed comb by the best Boeing Enginners, Compliance inspectors and pilots;

2) It will be flown by the finest test pilots who have hundreds of hours of experience in flight-testing the MAX. They will be entirely up-to-date with every little niggle of the aircraft. They will have experience with all those niggles, as they would be deliberately activated in the testing regime those pilots undertook.

3) since all the issues with the MAX could ber overcome with experienced pilots having knowledge of the MAX's full flight envelope and undocumented (at the time) flight control systems, points 1 and 2 above would make it a perfectly safe aircraft, even if a pre-software-fix MAX was used.

No, what I would need would be a dozen lat-minute randomly-assigned (so Boeing can't send in their best to evaluate/fix the aircraft or assign preferred pilots before the flight) flights on 3rd-rate airlines with green pilots. Like say in Pakistan where they have just de-registered 150 pilots (about a 1/3rd of all Pakistan-registered commercial pilots) because they had all cheated on pilot tests, they'd gotten others to sit their exams for them or cheated in the exams.

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2020