Re: 'Legacy' does not = 'obsolete' or 'bad'
Until eventually, the one remaining 105-year-old COBOL programmer owns 50% of the government IT budget.
573 publicly visible posts • joined 9 Oct 2013
Not really, no. I mean you might be right - when Putin goes, there might be an almighty free-for-all, or worse. What I'm saying is, even if there is a relatively orderly transition, the uncontested nature of Putin's personal power will not automatically carry over to the successor. The successor will need to transact with other factions to secure their support. Putin can do what he likes, even if the oligarchs think it's a bad idea. I don't think the successor will have the same freedom. They will have to be the "guy we can do business with" for a while, just like Putin was when he first came to power.
Conceivably, they might be able to get money for it from somewhere else. Like being paid by a hostile government, or a competitor of the company being attacked. But for sure, putting M&S offline for a couple of months is a worth a lot more money to M&S than to Kim Jong Un or John Lewis.
If someone can prove that you can make yourself less of a target by preemptively committing to not pay ransoms, then laws might be unnecessary. It seems like it could work. The recent attacks all seem to be targeted and bespoke to some degree, not like the old ransomware worms that were completely indiscriminate; there is some effort involved on the part of the attacker. In the absence of any possibility of being paid a ransom, the question will be whether any other revenue streams could justify that effort.
Colossal Cave Adventure was the game, though apparently Colossal Cavern was the unimaginative name of a real cave that partly inspired it. Presumably named as such because Big Hole was already taken.
Even if the guilty parties have managed to burn their earlier paper trails, they surely cannot claim ignorance after the problems were made public by Computer Weekly in 2009. Prosecutions continued for 6 years after it was public knowledge that there were problems with Horizon.
Another recent case involving Home Bargains, this unfortunate person accused of stealing toilet rolls: https://www.bbc.co.uk/news/articles/cdr510p7kymo
And another from last month: https://www.bbc.co.uk/news/technology-69055945
The latter story mentions Budgens, Sports Direct and Costcutter as other users of Facewatch.
Of course they don't really care about the plight of the downtrodden Scots. It's just something they think would destabilise or weaken the "old fox".
By the way the UK Defence Journal did not do the research, they've just summarised it in a short article. There is a link in the article to the paper by the Clemson University media forensics group.
I should add... if that isn't the case already. Here's an interesting article:
https://ukdefencejournal.org.uk/dozens-of-pro-indy-accounts-go-dark-after-israeli-strikes/
The Iranian internet blackout following the recent Israeli bombing revealed that 4% of the twitter discussion on Scottish independence was directly contributed by the Iranian Republican Guard. Scottish independence is a very minor sideshow in terms of global politics, and the IRGC is surely far from the biggest player in the game, so online debate is quite possibly mostly bots and troll farms already.
123GW certainly sounds like a lot, and I wondered how it compares to the US' overall industrial energy usage. So I tried the US Energy Information Administration. It turns out they think a sensible unit to measure such things is quadrillions of BTU. At that point I lost interest in my own question.
(When I regained the will to live, I worked out it's the equivalent of 100 million typical US homes.)
These jets will never attack anything further away than Cape Wrath, and they have adequate range for that.
A dozen Typhoons would be useless to an F-35 OCU. Pilots have to be trained, and that requires aircraft.
I think the RAF's view is that what weapons they can carry, and how they could be refuelled, are immaterial, because these planes will never leave the OCU. They're being bought purely to save money for the training unit - cheaper to buy, fewer maintenance hours - and will never expect to face anything other than a simulated enemy. The "nuclear-capable" bit is just for political consumption.
I don't think banning is a reliable solution, given it's easy to just sign up again with a new throwaway email address, and perhaps Tor if the Reg blocks IPs. Better I think to let them keep their identity, but don't give them the veneer of respectability that comes from the coveted silver badge, when almost everything they post gets 10x as many downvotes as upvotes.
It would be some improvement to change the rule for the silver badge to require a net 2000 upvotes, with each downvote subtracting 1 from the total.
A while ago I did post a suggestion here that maybe there should be some revised badge rules for these blatant shitposters. No idea if anyone even sees the old discussion forums any more, even though they still work... I can't see any way to navigate to them from the main site.
Exemption? Perhaps you misread Blazde's original post. There was never any claim that anyone is exempt from business rates. The actual point was the unfairness of a system that ties business taxes to property rental values. If you're selling over a counter, you need to put that counter where the customers are, and that's where rents and therefore business rates are highest. If you're shipping parcels, you're free to go where the rent is cheaper, so you'll get lower business rates. Undeniably, the system gives a disadvantage to business models that involve selling face-to-face in a high street shop.
The e-commerce firms don't avoid them entirely, they just pay a lot less. Business rates are based on the rental value of property, so a business based on warehouses in the middle of nowhere is bound to have an easier ride than one based on high street shops.
One of the things Fred Brooks advocated in The Mythical Man Month was parallel technical and managerial career ladders, with equivalent rungs being equal in terms of prestige and compensation. Like most of the conclusions in that book, still relevant 50 years later and still just as widely ignored by almost all companies.
Isn't it the phone keypad that's upside down? Phones have 0 after 9 because of how electromechanical phone exchanges worked a hundred years ago, when zero really meant 10.
Numeric keypads are still common on larger laptops that have the space to accommodate them, and personally I still find it useful. (I find the "innovative" placement of insert/delete/home/end/PigUp/PigDn on most laptops more of a frustration.)
Conversely, there is a reasonable choice of desktop keyboards without it. Even a Unicomp Model M!
I didn't see it directly linked in the article, but Raymond provides a gallery of the icons here:
https://devblogs.microsoft.com/oldnewthing/20250507-00/?p=111157
It's possible - though not necessarily easy - to quantify this sort of thing in a way that the bean counters can understand.
First, how likely are we to be on the receiving end of a successful cyber attack? Let's say 5% of companies like us have been hit by cyber attacks in the last year. That means there's a 5% probability that we will be a victim in the next year.
What's the impact if we are? Let's say, for the sake of argument, we expect the loss of business, loss of reputation and recovery costs will total $100m.
Thus in an average year, we lose $5m to cyber attacks. That immediately sets a ballpark for the kind of money it would be reasonable to spend on defence.
Suppose the "enhanced monitoring" option reduces the likelihood of a successful attack in any given year from 5% to 4.9%. That's saving you $100k/year. Does the enhanced monitoring option cost less than $100k/year?
Of course coming up with the numbers to put into this calculation is a challenge. Though it becomes easier if you treat them probabilistically rather than trying to nail down a specific number.
The above is very much a broad-strokes illustration of the principle. If you're interested in this sort of thing, I recommend this book:
https://www.amazon.co.uk/How-Measure-Anything-Cybersecurity-Risk/dp/1119892309