> where do you put your heat pipes?
Could they not be attached to an external wall, like people do today with air con units?
Agree we will never meet the 2050 deadline though.
29 publicly visible posts • joined 27 Sep 2014
It should be obvious to all that hydrogen-based heating is (edge cases aside) uneconomical.
We're really going to take our renewable electricity, turn it into hydrogen, then set fire to it, giving you maybe half of the original energy back as heat? Or we could, you know, run a heatpump which returns *3 times* the orignal energy as heat.
Yes, we need fatter pipes and larger radiators, and somewhere outside for the gubbins to live. The fact that new houses today are still being installed with microbore pipes that cannot be used by heatpumps should be a scandal.
Unless you're generating your own electric, you might need to redo that calculation. At 60W continuous, you're using 525kWh per year. if you're paying £10/year it means your electricity must be about 2p / kWh.
My electric bill for that "low powered" server would be *fifteen* times higher, some £150/year.
I'm sure Dave Plummer and the MS-DOS developers had good reasons for doing what they did.
It's a little condescending to just show up and claim that you know better than them.
I also used to have the "Everything that I don't understand is easy" attitude, but we should try to be better than that.
Though if anyone is thinking of using a 3G hotspot to replace a broadband connection, be aware you will likely not receive a publicly routable IP address.
This will mean any application that requires you to open a port on your router won't work. For example, you won't be able to do remote streaming from your Plex server.
I don't think it's feasible to guarantee that the binaries running on the network gear are generated from the inspected source code.
Unless you're planning to desolder all the flash chips and test them individually, who's to say what's actually running?
The OS can simply report whatever the attackers want it to, including lying about what binaries are running.
@JimmyPage...
Totally agree about the shiteware that comes preinstalled on many phones these days, but just buying unlocked phones doesn't guarantee lack of shiteware. For example, the Sony Z series are great - apart from the shitty Sony apps that can't be uninstalled.
It now looks like WileyFox are going down the shiteware route - I updated mine a couple of days ago and now it won't stop spamming me about bloody Skype every time I open the dialler.
Doesn't work for me - it tells me the filesystem is clean and then hangs. Not even a login prompt.
Fortunately it was a clean install on a new drive, I can just pop the old drive back in.
I might raise a bug if I can work out where I should do it, it's not immediately obvious.
@Doctor Syntax
Yes, I agree with you. Most folks using a commercial database (e.g. Oracle) will continue to do so rather than move to SQL Server on Linux.
I look forward to seeing if Microsoft can make an impact on Oracle's market share. It has a chance, assuming it will be much cheaper than Oracle.
"there are better free alternatives out there"
er, no.
Core database functionality of the free databases may be comparable to SQL Server, but they are nowhere near in terms of the full package.
To pick some random examples, where are the better free alternatives to SQL Server's multi-master replication? What about Analysis Services? I'm sure I could think a dozen features of SQL Server that are better than the free alternatives.
(Last time I used PostgreSQL - admittedly a long time ago, it required a database dump and restore when upgrading versions. Honestly I would still use it, but better than SQL Server? Nope.)
I like the way the malware can encrypt Time Machine backups.
I am considering changing my Time Machine configuration so that it writes to a Linux box on the network rather than an external disk, and where I can take daily ZFS snapshots of it - presumably this would mitigate against this type of malware.
I believe this configuration works , but is unsupported by Apple.
The actions taken (i.e. release a new version of the affected application) only make sense if the original vulnerability in the web server has been identified and patched.
Otherwise, what's to stop this new version from getting infected in the same way?
You shouldn't use *any* software from this developer until the question is answered: what was the actual vulnerability, and how was it fixed?
My experience was the same as some other commenters - (some) outgoing emails never arrived at the destination.
I suspect that some SMTP servers would silently drop email based on the source IP address (i.e. they knew it was a residential ADSL connection)
It made the whole exercise pointless, and I ended up on gmail.
This sentence is fundamentally wrong. Nothing between the sample points is lost. The continuous analogue signal can be perfectly recreated from the samples.
Please please watch this excellent video made by someone more knowledgable than anyone on this forum: (watch between 4:00 and 6:00 if you don't have time to watch the whole thing)
https://www.youtube.com/watch?v=cIQ9IXSUzuM
(For the pedants, yes, this assumes that the signal being sampled does not contain frequencies above 22.05kHz. Obviously this filtering is always done to the signal prior to sampling)