I should warn you that some email forms will refuse to accept an address with a + in it and others will cheerfully use it but are smart enough to realize that they can chop off the part after the + and it'll still work. If this feature is useful to you but this is getting annoying, I recommend using a custom domain set to forward things to another address. Anything@mydomain will go to me, but since there's no + in it, the addresses don't get blocked in ill-designed forms nor do automatic spammers figure it out. Also, I can redirect a specific alias to forward somewhere else, such as /dev/null or the original place's postmaster.
Posts by doublelayer
9408 publicly visible posts • joined 22 Feb 2018
Page:
- ← Prev
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- Next →
Pure frustration: What happens when someone uses your email address to sign up for PayPal, car hire, doctors, security systems and more
Cops raid home of ousted data scientist who created her own Florida COVID-19 dashboard

Re: I gotta ask...
In order:
1. It's possible, but a crime that effectively consists of "typed a message into a system with a single every-user username and password" is a very small crime. It wasn't an abusive message. It wasn't a harmful message. It wasn't a repeated message. Assuming she did send the message, she neither broke through a complex security system nor did something very harmful with the access. The response is not proportionate.
2. The people in the house were not suspected of any violent crimes, nor have I seen any evidence of any reason to expect violence from them. I cannot use the same logic as a private citizen; "I just wanted to retrieve the toolbox I lent to my neighbors but I did so with a big gun in case they were armed too" isn't generally considered a good excuse in court. The police have provided exactly zero good reasons for why they had to get the guns out and point them; if they're that worried, they could just carry them in a safer way. Intentionally pointing them, at anybody, is clearly an act of intimidation.
3-4. Your argument on that point effectively boils down to "I don't know the facts, so let me invent some hypotheticals to justify the actions". Yes, an older child is more likely to respond violently to the police than a younger one. Also, a child with a box of sharp knives is more likely to be dangerous than one without. You can't use that kind of what if to justify the threat of violence unless the person actually demonstrates a likelihood to get violent. Just because there could have been an older child is a pointless argument, because there could have been all sorts of things that there wasn't.
Remember Ask Jeeves? It's still alive, kinda, and Google seems keen to show it the door once and for all

Re: déjà vu
I think that's the wrong way of going about it. If it's bad to do that kind of behavior, and both have done it, then there should be a penalty for both, not an acceptance of both. I might not care if each was making the other the victim and the fight was internal, but each is making money off installing adware onto computers of third parties who didn't agree to this. Both should have to pay for each time that happened. Even though that's never going to happen, a step which prevents it happening in future is a good step.
Users complain iOS 14.2 causes some older iPhones to overheat, rapidly lose charge

"Erm, with all due respect, that’s bollox imo."
Ah. Is this going to be one of those "I don't have the problem, so there can't be a problem anywhere" opinions? Three devices. A wonderful sample size.
"I have very few, if any, problems with these phones compared to the decade of suffering under Android and Windows Phone. And my very reliable iPhones are half the price of the problematic Androids."
I wonder when you stopped using Android, as it's only been around for eleven years and your iPhones are five years old. Somehow getting Windows Phone in there and having it last a decade sounds hard. IOS devices get the benefit of longer security update lifespans. I've repeatedly praised them for that, but I really wonder what widespread Android issues you have had. Also why you purchased the really expensive Androids if you hate the OS so much; they have cheap ones too, which don't get security updates any longer but still.
"There, fixed it for you. You’re welcome."
No, you slapped on some praise for iPhones and nonspecific criticism of Android, which wasn't even mentioned in the article, without in any way pointing out a problem with any part of the article or comments.
China’s digital currency finds its first cross-border payments buddy: Hong Kong

Re: What a surprise
"It wouldn't surprise me if China's digital currency had a way of tracking people and their purchases secretly built into it..."
You would be incorrect. Instead, China's digital currency has a way of tracking people and their purchases explicitly and openly built into it... They don't want it to be secret; they don't need to make people trust it in order to make people use it. They want it well known that, if you use your money for something the state wouldn't like, you're getting tracked down and jailed. They've already been making clear that they're tracking everything else to make their citizens scared of possible repercussions. They have surveillance systems which they describe in detail and don't bother to hide at all, a thing called social credit score which is exactly what it sounds like and is clearly explained, rules about what's not allowed on the internet and a convenient tip line to let them know when someone's violating it, and many more systems of that nature. This is just one more step in that.
Apple's M1: the fastest and bestest ever silicon = revolution? Nah, there's far more interesting stuff happening in tech that matters to everyone

Re: I fear that too much shiny is taking a toll on some people's attention span.
That's been tried, and it hasn't sold very much. Not really for any defect in ARM; if you throw 96 ARM cores on a single server, you're going to get some pretty good performance if your task can easily run on that many CPUs but couldn't or wasn't ported to GPUs. However, it didn't increase the speeds that the M1 has and for many of the reasons stated in the article. Server ARM chipsets don't have memory inside the SOCs, so they don't get the very fast transfer from and to memory. They are also able to handle more memory because it's kept separate, so everything's a tradeoff.
It really depends what you care about. I do some compute-heavy things on a local machine, so a processor that runs very fast is quite useful. Simultaneously, I don't need a lot of memory for those things, so an M1 with 16 GB of on-chip memory would probably be quite nice, and I'll have to consider it if my current machines need replacement (they don't yet). That said, many of my compute-heavy tasks aren't time sensitive, so although the M1 could probably do them faster, I don't need them to go faster right now. There are others for whom these advantages are less important. I don't really see much benefit in giving Apple's chip designs blanket praise for revolutionizing everybody or dismissing them as unimportant; both views are limited.
A 1970s magic trick: Take a card, any card, out of the deck and watch the IBM System/370 plunge into a death spiral

Re: Broken NFS
A less advanced method of having to do a slow manual fix process is to create too many files in a directory. I wrote a program which created a model, tested it, and serialized it out to a file so I could use it later. It would then evolve to improve the model before running another test. It would also create a summary file reporting how well the model had done, so for each loop, I got two files (1.model, 1.report, 2.model, 2.report, ...). Usually, I tested it on a large amount of initial test data, making each loop take ten to fifteen seconds, and would cancel it after five hundred or so iterations, the model being generally good enough then. After confirming the result, I could clear up by doing a "rm *.model && rm *.report".
Then, I wanted to see how it would do if I let it go for much longer. I gave it a smaller set of tests for a new task, set it going, went to see my family for two days, and promptly forgot that I had done it. Weeks later, when I found out that it had been churning away on an infinite task of little importance, I tried to clean up the millions of generated models. "rm *.model" was not my friend. Now, I make sure not to run programs in the same directory where I built them, no matter how insignificant they seem.
Surprise, surprise: AI cameras sold to schools in New York struggle with people of color and are full of false positives

Re: Wait, what?
There are various long cylindrical things people might want to take to school with them, and many more things that could look long and cylindrical if the camera doesn't get a good picture. For example, people who walk in a rainy area might carry umbrellas with those long poles so you can carry one over your head. Or maybe they're carrying sporting equipment to use the recreation areas of the school. Or a camera or microphone stand they used to record something elsewhere and now need to return. People who have withstood injuries could use crutches with the long pole part. Meanwhile, someone who did plan to take a weapon could, if the weapon is small enough, put it in a bag; most students I know carry bags. With these provisos, there's a serious question if the cameras really serve a useful purpose. Even more so as they're also scanning faces. I don't know why they're doing that; most school shootings are perpetrated by people who previously went to the same school, just not with weapons. Given the reliability of other facial recognition systems, I hope it's not to verify that the students entering are all known by the school; there'd be queues of students waiting forever for the camera to recognize them.
Marine archaeologists catch a break on the bottom of the Baltic Sea: A 75-year-old Enigma Machine

Re: Old typewriter
Correct. This doesn't much matter though, because I didn't say it was. I was commenting on the original question, which asked about methods of hiding communication. Cryptography and code are two such methods. Additionally, it's frequently discussed in the same places, or often instead of discussing the cryptography. The same is true of Enigma. Although the efforts to break it are frequently discussed, I rarely see articles such as the one here describe how enigma machines worked. Perhaps the appetite among the nontechnical public to hear about the design of a multirotor typewriter encryption system is not very high, whether it was the German, British, American, Soviet, Japanese, or any other model. It's also complex enough that, should someone be interested, they would better be served by looking up the longer technical descriptions of the machines. As a news article, it's too much detail about which few care.

Re: Old typewriter
XOring something is ambiguous, but I think you all know what I meant. I meant that your plain text can be XOred with some key, then another key, and on and on. This is sometimes done to deliberately increase the complexity of the encryption operation by making the user create a large number of keys, each being used. Also, it was a general comment on the ability to perform repetitive mathematical tasks.

Re: Old typewriter
I think the lack of articles on British cryptography is mostly because there wasn't as interesting a mechanism used to crack them. The mathematical details regarding the text codes are doubtlessly available, but they're likely relatively boring compared to the interesting minutia I more regularly see coverage about. For example, a program to broadcast a specific piece of music to indicate where to plant bombs. Old cryptography can be surprisingly boring because the algorithms had to be easily mechanized or performed by the human brain. The quality of modern cryptography is stunning compared to that just because we can afford to XOR something a couple million times if we want to.
.org owner Internet Society puts its money where its mouth is with additional IETF funding

Re: Unusually high score...
I must disagree with a few of your critiques.
Article: ".org owner Internet Society"
Reply: "No, actually the IANA function of ICANN "owns" top level domain names, i.e. has the final say as to who has the right to run the corresponding registry. ISOC sort-of owns the PIR corporation which has been assigned that registry right by IANA."
The ISOC operates and controls PIR to the extent that they can command it to do things like sell off its prime asset, and the sale of that asset is permitted by ICANN. While your answer is technically correct, a place that can effectively manage an asset without many limits is not very different from an owner. If ICANN forbade the sale of a registry and reassigned it, or if PIR was only partially run by ISOC, I'd agree that the statement would have been misleading. As conditions are, I consider it an acceptable though imperfect summary.
Article: "But the subsequent financial reliance on ISOC, even though the IETF also raises money through sponsors and conference attendance fees, has not always resulted in a healthy dynamic."
Reply: "What is unhealthy about the relationship? I've tracked it since the beginning in 1992, and it's always been fine and productive."
This is a statement of opinion, much like yours. I can't say this is at all misleading; if the author thinks that the IETF's reliance on ISOC for most or all of its funding makes it unhealthily dependent, then the point was effectively communicated. I'd like to see arguments from both of you as to the effects, positive or negative, of this relationship, but I at least know where you both stand.
Article: "But those efforts continue apace, not least with China’s “New IP” proposal that would see more modern and efficient systems for networking management than the current TCP/IP approach. That proposed system would have clear advantages, but also have surveillance and control baked into it."
Reply part 1: "First, it isn't "China's" anything, it's Huawei. If NewIP is China's, then the Web is Switzerland's."
No, I'm afraid that's too limited. Here's a quote from the article introducing New IP: "Huawei, China Mobile, China Unicom, and China Ministry of Industry and Information Technology (MIIT) are backing a plan titled 'New IP, Shaping Future Network.'". Huawei is involved, but it's not just a suggestion by an interested company. The last item in that list is a government entity.
Reply part 2: "More to the point, it isn't yet at all clear that NewIP is well-defined, technically plausible, and economically feasible. There are those who think it is none of those things. Thirdly, what is specified so far neither supports nor contradicts the assertion about surveillance and control. All we've seen are a few empty words about the importance of security and privacy."
I agree with this chunk.
Article: "That effort exists, albeit in a half-hearted fashion. The board created a new body to look at its governance... However, a culture is hard to change and the board has insisted on maintaining complete control of any proposed changes to its governance."
Reply: "The Board is still in the process of chartering a governance working group, to be precise. And it isn't a matter of the Board insisting on control of proposed changes; it's mandated by the Internet Society's by-laws, which require a four-fifths majority of the Board to approve by-law changes. The Internet Society is incorporated in the District of Columbia and can only act within the relevant D.C. law and the rules of the US tax system for non-profits, and of course that includes obeying its own by-laws."
You are correct here, but there are ways that a larger effort could be possible. ISOC members have protested recent actions by the board, so the board could perhaps attempt to replace some members by holding resignations and elections. If your members really wanted to change the structure of an organization, a representative board could easily do that. Or they could adopt a resolution stating that they would bind themselves to the results of the investigation, put those results to an election and support those which got supported, etc. Nobody's suggesting that the board can eliminate their own authority, but they could voluntarily give up some of it should they wish to indicate that they understand the complaints of members. They have chosen not to go that far, which may be a good idea, but still the possibility should be acknowledged.

Compared to the previous model, where they had to ask for money every year, having an announced six-year funding plan is closer to self-sufficiency. Unless ISOC cancels the funding plan they announced, the IETF doesn't have to return to them and possibly get less money than they need because they angered the ISOC board. If the ISOC does cancel their announced funding plan, it will produce a large backlash among members and the general public. As we saw last time, ISOC views that concerted backlash as completely meaningless and will cheerfully ignore it, but still... there must be hope somewhere, right? Please?
Four or so things we found interesting about Qualcomm's Snapdragon 888, its latest 5G chip for high-end Androids

Re: But is it practical?
I'm not sure that's true. I did a search on a phone database. Of the 60 known devices with the 865 or 865+, 53 (all but 7) have dual SIM, 16 have 3.5 mm jacks, a different 16 have micro SD card slots, and 3 have all of those features. I don't think it's the SOC that means you don't often see all those features together.

Re: How far behind Apple are they now?
Existing Windows on ARM systems have primarily been using Qualcomm's CPUs already. While those have mostly been chips that use more power than the 888, I can't see a reason Microsoft would prevent an OEM trying to use it. It's possible that there are other reasons why chips at that level don't get used for Windows, but I doubt it's because MS cares too much.

Re: Looks a bit crap now we've seen Apple's effort
It should still be remembered that the M1 has a few advantages that this does not. The M1 gets to go in laptops, where it can get more power for longer from the larger battery, while this will go into phones, where the batteries are anemic or ill-designed. The same difference also means that the M1 has an easier way to handle heat production; even in the fanless MacBook Air, the large metal plate under it can work well enough as a heat sink. Phones won't get that. For those reasons, this chip has to spend more time on heat management and providing low-power cores so they can get used for the comparatively easy tasks that phones get asked to do. For the same reason, the A14 cores in the iPhone are clocked lower (and there are half as many fast ones) as the M1.
A comparison may help. For Pi fans, Qualcomm's chip is a lot like the SOC in the Raspberry Pi 4, which overheats often without assistance, whereas the M1 is like the higher speed version in the Pi 400, which gets a large heat dissipation plate. The Pi foundation could afford to clock that up (and so can a user) while the original Pi kept automatically clocking down, even though the base rate was lower.
Infused with the spirit of Christmas, TalkTalk decides to extend cut-off deadline for Business email domain
Amazon’s cloudy Macs cost $25.99 a day. 77 days of usage would buy you your own Mac

Re: Always do the sums
That's important when calculating costs for cloud services which can actually be spun up and shut down in an hour, but it isn't the same for these Macs. AWS requires that you use the Mac for a minimum of 24 hours. That means that, if you need it for an hour per day and five days per week, you have to pay for almost 120 hours (technically, you could cut off the morning of Monday and the afternoon of Friday if you can nicely schedule which hour you need it each day. So approximately a hundred hours rental for the Mac versus five for a different VM, which leads to a very different cost calculation.
'We've heard the feedback...' Microsoft 365 axes per-user productivity monitoring after privacy backlash

Re: I don't understand
I bet the process went like this:
Manager 1: I wonder whether we can get organizations using extra tools if we give them metrics and make it look like they're beneficial.
Manager 2: Yes, but it needs a catchy name to indicate that it's not a sales push. And maybe, if we can think of any, some actual useful features.
Manager 1: Well, the optimal use of our services should help with productivity. While paying us for extra services doesn't constitute optimal, the benefits to the customers, if any, are productivity related.
Manager 2: Productivity score. I like it. But what happens if someone adopts a tool, our score says they get extra points, but it doesn't roll out to anyone else. They might figure that out and cancel the thing that only one person uses.
Manager 1: Simple. We'll score all the users individually and show how other people can gain in "productivity". People who want the total productivity score will be able to see who's not using a feature yet and get them to do so.
[months later]
Manager 1: Why are all these privacy things coming up? This isn't really a privacy issue. It's just for sales.
Manager 2: I don't know. I mean you could theoretically extract information about communication frequency, but nothing about communication quality let alone noncommunication productivity. Using this to grade workers would be ridiculously idiotic.
Engineer: You are assigning sortable scores to individuals, calling it "productivity score", and you aren't expecting some crap manager somewhere to use this without understanding what it really means? Think it through.
New study: DNS spoofing doubles in six years ... albeit from the point of naff all

Re: Really?
The 1.7% is more concentrated. Some places make it nearly 100%, and some places make it 0%. The places with 100% usually spoof the answer with the correct answer. However, they sometimes choose not to, usually when the correct answer is "don't know that one" and they instead substitute "how about these ads". Their infrastructure for that purpose can also be used to censor something at a later point should they decide they want to do so.
A note: although a lot of ISPs do redirect unknown domains to an ad system, it does not necessarily follow that all of them spoof to do so. Many only do so if the user doesn't change away from the ISP-supplied DNS servers. That approach is annoying, but not the kind of violation of trust that spoofing does.
Bare-metal Macs-as-a-service come to AWS. Intel for now, M1 silicon in 2021

Re: What is the use case for this?
That makes sense, but I'm not sure the pricing works out. A day costs $28.99, and two weeks costs $405.89. If we assume that you use the system once every sixty days, and one of four of the times you'll need it for a while, your average yearly bill would end up being $793.65. Even without ever hitting the bad case, your yearly bill would be $176.36. I don't know about other providers, but the AWS prices seem a little unsuited even for your requirements.

Re: What is the use case for this?
Not really. With cloud, you're not buying the same thing you buy with a standard computer purchase. For example, cloud offers you the ability to pay for temporary use of hardware which would be very costly to purchase outright, or access to the provider's faster network connections, or geographic distribution. None of those services come from purchasing hardware outright; you'd also have to pay for the administration of the features you want, which the cloud provider would be willing to replace.
The reason this doesn't make sense to me is that I don't see why people would want those services on a Mac. If people routinely used a bunch of Macs as servers, then it might make sense. To the best of my knowledge, they don't. I've only seen Macs as servers where the place is really small and they just put the server on the thing that was available. Similarly, most of the use cases I can think of where a Mac is needed on occasion is for development or testing of a cross-platform application. I don't think the pricing makes sense if that's the expected use case, since a month of access, either continuously or thirty days across a year, would equal the cost of a purchased device.

Re: It's not cheap
I really wonder about that. Developing for IOS or Mac OS usually means more than compiling--in fact, if all you want to do is compile, you can hack a different OS to do it if you're motivated enough. If you want to use the restricted components like the simulators, that bit that lets you push the code out to real IOS devices, etc., it will take longer. Also, since you have to rent the device by the day*, you don't get the benefits of paying only for the half hour you use. Meanwhile, you could just buy a single one and set up the remote access to share it among the team if it's not needed very often.
*You don't have to pay by the day, but you have to pay for it for at least a day each time you spin one up. This effectively means that you'll pay continuously or you'll pay for various chunks that are 24 hours long.
On the 11th day of Christmas TalkTalk took from me... the email address of my company

Not relevant to the conversation. There's a GMail address behind my domains, but you don't see that if you want to email the domains in question. Using a single mailbox rather than a domain seems unprofessional, and for certain types or sizes of institution, it is. A single mail address usually means a single mailbox, with everyone having access to it. For that reason, I wouldn't send any personal or financial information to a company using one of those. For something smaller, I don't care so much. It's about what address they want me to use, not what addresses they might have behind the scenes.

Re: Car Mechanics are not IT people
This comment is mostly good, but then I saw this: "(Also how many hackers would even know how to break into XP anyway?)". The answer: a lot of them. XP has holes, and if it wasn't patched, some really big holes. Someone who didn't update the operating system, even just to Windows 7, probably doesn't have great patching regimes for the XP boxes. Protection against malware which makes it to execution is almost nil. Protection against external penetration is a little better, depending on the firewall settings, but there are bugs which can allow an automated installation of software without needing the user's permission. Put an XP box on the public internet and someone will be attacking it soon. Put an XP box without the emergency patches from 2017 on the public internet and it'll be in a botnet in half an hour. With luck, most XP machines still in use are either kept offline or at least behind a NAT or restrictive firewall.
AWS reveals it broke itself by exceeding OS thread limits, sysadmins weren’t familiar with some workarounds

Re: Potential enormous boost for AMD
Only if they find three things: a) they can't get around the one thread per server thing, b) all their threads are putting too much pressure on the CPU, not just the OS's limits, and c) they still can't get around the one thread per server thing. So far, when they increase the CPU power available to the VMs, it's so they can reduce the total number of them rather than to get more concentrated compute. They could solve problem A by using a system that allocates threads to access requests rather than reserving one per server. Having done that, it seems unlikely that they'd experience problem B at all, based on their statements. If they did, they could always try to solve problem C by redesigning the system so it doesn't have quadratic scaling, for example by having certain nodes whose responsibilities are to contact subsets of the servers and keep that data available for servers in other zones. If all of those attempts fail, then AMD may have a cause to celebrate.
Calls for 'right to repair' electronics laws grow louder across Europe

Re: @Dwarf
"People buy what they want and they know this by looking at what they care about before purchase."
They do. If they can get said information, which sometimes they can't. You don't know, for example, whether a certain component is going to be easy to replace unless one of the following situations occurs:
1. The manufacturer tells you. They often don't.
2. Someone else buys one and disassembles it so you can watch their discoveries. They mostly do that for only the most popular of devices.
3. The product has been available for long enough that people have broken them and the information about repair policies has been released. This only happens if enough people bought it and often takes months or years.
For certain products, this is easier. A durable expected to last decades can often be researched because you don't have to get the new model. The flagship consumer electronics will get dismantled by somebody on release, so that information will come out at some point. For other products, you won't get it. Maybe not enough get purchased for much information to come from independent repair attempts. Maybe, by the time that information is available, the manufacturer isn't making that product anymore. This is asymmetric information. I want to know details about a variety of options so I can choose which I wish to buy, but the information didn't get released to me so I can't. In this situation, I'm usually faced with the option to buy the one product that did make the information available, even if it's not really my favorite option, or to choose a product that looks like I'd like it more but I don't know many of the details that interest me.

Re: @Dwarf
I'll state my point less ambiguously. The information needed to determine repairability is by and large unavailable to me. That's why I asked those questions, but apparently it didn't get through. I can't just look up the repair information for many products because the manufacturer didn't make it available and there aren't enough people who like to buy things and write up what it's like to disassemble them. As for your question of why I'd like to get the details on every option, it's so I can compare them. I also like my products cheap, so if I find two models that can be repaired, I'll likely buy the cheaper one. If I only get one recommendation for a repairable one, I don't have that option. This is why just having a reliable repairability score would be so useful. For those who already care, it makes information available when they wouldn't have it. For those who don't care, it would display the differences more prominently and might convince them that they do care after all.

Re: @Dwarf
So much to take apart. Let's get to it:
Original: "You have to take into account asymmetric information"
Reply: "So you dont research what you are going to buy?"
Asymmetric information: noun. A situation where information is not available to both sides of a theoretical transaction. If asymmetric information is part of the experience, then research will not result in the desired information. An example: I do not know when buying a phone whether and for how long its manufacturer plans to release updates for it. The manufacturer does, but I don't. I have to guess based on reputation, previous history, etc. This is unreliable at best. It can often be worse.
Original: "where I do not know that the piece of equipment is difficult to repair"
Reply part 1: "That kind of equipment or specific product?"
Specific product, obviously. For each option. From context, this is what the complaint is about.
Reply part 2: "Did you look or was it not so important to you at the time of purchase?"
See above, under the section entitled "asymmetric information".
Original: "cartel/oligopoly behaviour"
Reply part 1: "Which gets punished."
You have more faith than I do.
Reply part 2: "But not what we are talking about unless you think so many businesses are running such?"
I would like to argue against this, but the first reply has already taken this and done an admirable job.
Original: "Please stop with your A-level economics"
Reply: "Didnt take it but thanks. Should we abandon any economic thought in this discussion or just if our opinion doesnt match yours?"
I'm not sure if you're misunderstanding that point deliberately or because of a regional term. I'll assume the best. If you're unaware, A-levels are the tests taken in the UK by adolescents and cover the basics of a topic. Therefore, to accuse someone of using "A-level economics" means that you are accusing them of having only an elemental understanding of a complex topic and displaying ignorance. The solution to that is not "abandon[ing] any economic thought" but instead to consider more complex parts of economics, among which are the incorrectness of the perfectly competitive free market.

Re: @Dwarf
"Ok. So you bought something you were happy with until something broke and the idea of fixing it wasnt on the top of your priorities until it broke. When you buy the next one will you look at how repairable it is?"
Absolutely. When I buy a computer, I read about what repairs are possible and how hard they are. When I buy a washing machine, I'm sure I can get all that information, right? Instead of a few likely options with easy-to-find reviews, I am faced with the choices from local retailers. Should I ask them to let me disassemble one right in the shop to see what I'd be experiencing a few years later? Or maybe I can go to IFixBigEquipment where there's an in-depth review of the repairibility of every model of washing machine released.
In other words, how am I supposed to know how repairable something is unless the manufacturer has published information or someone else has reviewed it? If I can't know how repairable the thing is, how can I take it into account when making a purchase?

"have you considered the universal remote controls - they often have all the devices listed and either have the codes or you can download them to the devices."
Not the original poster, but in an unrelated incident, I have tried to do that, but I did not have much success. I was given an old television whose primary defect was that it wasn't as big as the one the previous owner wanted, but also had no remote control. I tried to find the codes to get it running using an old Android phone with an IR transmitter and later an old "programmable" remote control, but it resolutely refused to respond to any of the codes I sent to it. Maybe the phone's IR function required a Google library (this had had Play Services removed). More likely though is that the codes it knew and the random numbers I found online were not the random numbers this television was expecting. Don't count on that information; it's not as good as it seems.
If you're curious, the television now sits on a friend's wall. You have to go up to it to change things, but they seem not to mind. I'm still not sure why the previous owner didn't try to sell it, or why I tried so hard to get it working given that I never wanted to use it, but all's well that ends sort of working.
Marmite of scripting languages PHP emits version 8.0, complete with named arguments and other goodies

Re: PHP cost 0
I assume this is an attempt at a joke?
"Cero in compile the code before "production" How much money you save stuff in resources?": Because compiling any number of smallish projects uses so much precious CPU time? This isn't the 1970s. I can type "make" and wait five seconds.
"Cero in time to dev something. Do you need to install jdk, maven, npm, packages, 300 hundreds of line of code and config to say "Hello World".": I have to install PHP and, if I'm using PHP in the most typical way, a webserver configured to use it. Not much different.
"Cero time in changes, hot changes in production.": You're fired. Really. You don't install changes into production. You run it through tests and review first, then it's elevated to production.
"Cero time in learn and spent to get good developers": Ah. Free PHP devs? Sure thing. Send me ten of those; I'll find something for them to do if the work is free.
"Cero resources to mantain his performance": I don't know what this even means.
"Cero time to create a good architecture.": Trust me, whatever you're writing in, you need time to create a good architecture. It's one of the most important things to spend time on.

"I expect there is work for code maintenance for PHP, but I assumed nobody in 2021 is going to start a new project with it."
It really depends on the scale. For example, I sometimes work on one-time projects for charities, which usually take the form of some basic web forms glued together. I often end up using PHP for the backend because it doesn't require additional effort to get it running. Nearly every server already supports PHP scripts in the backend. Had I chosen a framework that requires other things, I'd have had to ensure the server they're planning to use supports it, that it's been installed and configured correctly, etc. Since a lot of these nontechnical and small places use a shared hosting plan, it's much easier to say "put these files on your server via FTP in this directory, or give me the credentials and I'll do it for you" rather than "We're using a framework called Flask, so I'll need access to your server to verify that it supports it. Also, we will need your server software to redirect some URLs to the Flask engine so please remember that I did that in case the next person to volunteer for your web tasks doesn't figure that out". Also, while someone might not be starting a new large project from scratch given the CPU limitations of PHP, there are plenty of existing codebases written in it. When people want to add features to those, they'll probably end up writing their new features in PHP too.
Privacy campaigner flags concerns about Microsoft's creepy Productivity Score

Re: Design vs Use
It can look at an individual user, but it doesn't show you information about what they're doing at any given moment, but only what they did in each 28-day period. Which is extremely different, because there's no way that any information could be extracted, for example by cycling through new rolling periods and looking at the difference between them, or going into the settings to look at more fine metrics. Yes, definitely the time aggregation will be sufficient to make this difficult to abuse.
Retired engineer confesses to role in sliding Microsoft Bob onto millions of XP install CDs

Re: Back in the nineties I worked at a software house
Aren't finance departments wonderful?
Option 1:
Programmers: We were planning to have a unit distribution cost of two floppies, two labels, an envelope, and the initial documentation. We met that target.
Finance: Well done.
Option 2:
Programmers: We were planning to have a unit distribution cost of two floppies, two labels, an envelope, and the initial documentation. We managed to reduce that to one floppy, but still two labels because that was last minute.
Finance: You're wasting money on the extra labels! Even though we were already planning to spend that and you saved us money on the floppies! Let's fire somebody.
Thought the M3 roadworks took a while? Five years on, Vivaldi opens up a technical preview of its email client

Re: Fantastic
"A simple one that I find extremely useful is being able to show all mail to/from a particular contact. Can't seem to do that in Thunderbird."
I'm probably misunderstanding what you want, but if I'm not, it's pretty easy in Thunderbird. If what you want is to show messages with someone particular in either the from or to addresses, can't you just do this:
1. Open the message search feature (CTRL+shift+F).
2. Change rule setting to "match any of the following".
3. Add a rule "To contains <the address you care about>".
4. Add a rule "From is <the address you care about>".
5. Activate the filter and look at the results.
Again, I assume I'm just misunderstanding your goal.
Amazon's ad-hoc Ring, Echo mesh network can mooch off your neighbors' Wi-Fi if needed – and it's opt-out

Re: The real problem is the data caps
You are correct. I pay my ISP for the resource I use. The difficulty is when they attempt to restrict what I may do with it. For example, I have an agreement with a neighbor who uses a different ISP. Specifically, we each pay our own bill, and if one ISP goes down but the other doesn't, we can use the guest network of the neighbor who still has a connection. I think that's technically against the subscriber agreement I have. ISPs also frequently restrict other things to make it difficult to put several devices on one connection; for example, someone I know had an ISP-supplied modem which didn't allow people to change basically any settings and throttled bandwidth when sent by too many client devices. Or there are the mobile providers who attempt to restrict what can be done with the data access a subscriber already purchased, such as preventing tethering. Without these tactics, I would entirely agree with you. Since they exist, I must only partially agree.

Re: The real problem is the data caps
It's actually quite a nice idea, and I'd be all for it but for a couple of things: it has no user control, no security, no accountability, and massively advantages Amazon over everyone else. Offering an open mesh network would be nice, and I'd gladly add some of my resources to it, but only if it could allow me to control what I allow and when. That means that it'd have to be an open standard and controlled centrally by each user without any data collection by a third party. This won't ever happen because a simple internet benefits several types of entities. It benefits ISPs which get to charge each user for a shared resource. It benefits data trackers who can more finely track individuals on the network. With these groups against an open idea, it won't ever really come to fruition. Still, let's keep the dream alive by making sure Amazon's proprietary imitation stays dead.
AMD performance plummets when relying on battery power, says Intel. Let's take a closer look at those stats

Re: RUGs
I don't do either of those very often, but converting to a PDF is usually a few-seconds activity in my experience. Extending a 2.5-second task to 4 seconds or a 11-second task to 15 probably doesn't change the user experience much, especially as selecting the options probably took several seconds too. The performance differences I care about fall into three categories:
1. Things that take a long time to run. Adding three minutes to a process can be an important detail. However, I don't do many of those things on battery power.
2. Tasks that get run in batches.
3. Tasks that I do very frequently, such as loading new pages while browsing.
When I'm mobile, I care most about the third category. As long as the slowdown isn't bad enough that I see it while reading or writing things, I doubt I'll have a problem. Most intensive work gets down while the laptop is connected to power. This is why the CPU is rarely the most important detail in a computer purchase in my opinion. Amount of memory, memory speed, storage speed, and repairibility are my metrics of greatest concern.
It's always DNS, especially when a sysadmin makes a hash of their semicolons

Re: Me 2
I had a similar experience. I was looking at a config file, with a line I wanted to comment out temporarily, but not sure whether this format supports comments and if it does how to use them. My basic thought process went like this:
It looks like XML, so maybe I can just enclose the line in <!-- ... >. That definitely makes the most sense. Except it doesn't start with an XML tag. Also, after a few levels of XML-style tags, it starts listing key value pairs without tags, so it's probably not XML. I'm also pretty sure that it takes multiple values separated by semicolons, so it can't be that. That only leaves #. Well, I think it uses semicolons for the multiple value separator but I can't check because this file doesn't have any sets of multiple values. In the end, I just copied the file and deleted the line. It was the fastest way to be sure.
Study: While text-generating AI can write like humans, it lacks common sense

Re: When are they going to stop pretending ?
Not really. That's mostly what I wanted to avoid. That argument is referring to the difficulty in determining the sentience of a system which may only be simulating sentience. It then argues, mostly without supporting evidence, a fundamental limitation on mechanical devices and an inherent possibility in biological ones. Right now, I don't care about that; it's an interesting philosophical debate, but very difficult to make progress on.
For the moment, I'm just trying to get a good definition of what artificial intelligence is. I've seen people who think that, if code has more than two if statements, it qualifies as AI. I've also seen people who say that nothing using mathematics to arrive at a conclusion can ever be AI. Both these definitions seem highly limited to me. The argument to which I originally responded is close to the second opinion above, and in an attempt to understand why people say it, I'm trying to determine if its adherents think there can ever be such a thing as AI. Maybe some think that a mechanical system can never be intelligent because intelligence requires sentience and they think mechanical devices can't be sentient. If this is their view, they really should phrase it in those terms, I.E. "AI is impossible" rather than "this is not AI". If they do believe there is something they would agree to be AI, I'd like to establish where that begins for them and why certain complex systems which are not simply programmed externally don't qualify. My questions are about the definition of the term AI, not metaphysical discussions about what sentience is and whether we can create it.

Re: When are they going to stop pretending ?
On that basis, we can never have AI. A machine that does mathematical stuff could in theory eventually simulate intelligence and sapience very well, but it would be by performing a very large amount of statistical calculations to interpret what just happened, what logical actions would be, the likely consequences of each candidate, and variables that change any of the preceding. At the very strong risk of getting into metaphysics, you could argue that our brains are doing exactly the same thing. If I presented you with a computer which was acting human consistently and without external influence, would you agree that to be AI or would you tell me that, since it's running on essentially mathematical code, it can't be?
I agree with you about this though; these are definitely not intelligence.
Cool stuff: MacBook Air and Pro teardowns show thermal changes and missing T2 chip

The iPad processors are more limited for the moment. Consider these spec differences:
M1: 8 cores, 4 high-speed Firestorm at 3.2 GHz and 4 lower-power Icestorm at unknown clock rate (at least I don't know yet). Cores from A14 range.
iPad Air 2020 (4th generation): 6 cores, 2 Firestorm at 3.0 GHz and 4 Icestorm, A14 range.
iPad Pro 2020 (4th generation): 8 cores, but from A12 range instead of A14, high-speed cores (X4) running at 2.5 GHz.
In addition to these technical differences, most users will not hammer the processor as hard on an iPad as they do on a computer. Most tasks requiring a lot of sustained calculating get done on computers with full operating systems, such as compiling code, managing large datasets, or manipulation of visual data. While some such tasks can run on iPads, fewer users intend to do that with them than intend to do it with a laptop.
HTTPS-only mode arrives in Firefox 83 as Mozilla finds new home for Rust-y Servo engine

Re: , you can help your users keep information away from any ISP
That is a separate issue. An important issue, but nonetheless a different one. Tracking content placed on the page by the page creator is a privacy issue between the requester of the data and its provider, whereas HTTPS solves a privacy issue between the data requester and a third party which can access network traffic. What you're doing here is dismissing a real privacy issue and its solution because you can name another one. This classic argument (XKCD) doesn't really make any good argument why the HTTPS privacy feature either doesn't work or doesn't matter.

It well can be. There are a few historical examples of large ISPs doing it, the most memorable of which is the "great cannon" DDOS tool operated by the Chinese government which allows them to use Chinese residents' network traffic as a targeted cohesive force to knock objectionable sites offline. It did this in a couple of ways, but one easy one is to add references to the victim in any HTTP traffic which the user's browser will access.
It also happens at a much smaller level. Public networks can be set up by malicious people or replaced by an impersonator doing the same thing. Someone who does this could inject scripts into HTTP traffic and get your computer to execute them. There are risks that remain if your connections are through HTTPS, but they both are harder for the attacker to implement and easier for you to detect.
Another issue is that an ISP can record traffic going over unencrypted HTTP, even if they don't modify it. That traffic is usually used for advertising purposes, but could be used for anything nefarious you can imagine. Since you live in the EU, this would be a clear GDPR violation. As we know, data protection authorities find those out immediately and instantly impose major penalties, so there's never a need to worry at all. Other countries which don't have GDPR don't usually even offer any redress if an ISP should do this, and some countries even allow that data to be made available for sale. HTTPS is a very useful guard against things like this.
When even a power-cycle fandango cannot save your Windows desktop

Re: Too Many Stories!
Do you really want people who don't understand on their own not to push emergency buttons or activate any controls during a tour to operate expensive and dangerous machinery? There's a certain amount of common sense that becomes an absolute requirement when the dangers of lacking it are big enough. To me, that means that if lacking common sense means the person involved is about to end the day greater one permanent disability or less one coworker, demonstrating too large a lack means it's time for them to go before that can happen. This would also apply with a high enough financial cost. Fortunately, I don't work somewhere where those safety risks are experienced, so the worst that a colleague lacking common sense can do is irritate everyone and slow us down; I can try to train that away.
Israeli spyware maker NSO channels Hollywood spy thrillers in appeal for legal immunity in WhatsApp battle

Re: Who cares?
I doubt Israel has really put much effort into that. If this were an Israeli government project, it wouldn't have been handed over to the Saudis with no stated restrictions. While Israel and Saudi Arabia have at times collaborated against common enemies like Iran, they otherwise have had a rather tempestuous relationship. NSO has sold this utility to the Saudis, and if Israel was going to do anything about that, it would have been months ago. There are three options here: 1) Israel knew about it and is more willing to help Saudi Arabia and a couple other countries with repression than I thought, 2) NSO didn't ask Israel about it and Israel didn't bother to investigate, or 3) Israel has chosen not to prosecute a company for their own reasons. I would hazard a guess at option 3, with the reasons being that NSO is providing them with some tools and/or providing an ally of theirs who suggested to the Israelis not to do anything.
Apple rummages through pockets, hands out $113m in change to US states to make iPhone slowdown row go away

Re: iPhone slow down versus battery life
"So how was it to force people to upgrade?"
Two ways. First way you already pointed out: "The big issue was that iOS should have flagged up a message explaining that the battery was shot". If they hide that information, it's logical that they might have hidden it so some people would buy a new phone instead of a new battery. The second issue is that most devices aren't built in such a way that their batteries become shot just after the warranty expires. One could assume they did that on purpose so people would have to buy something pretty soon, and hid the information to try to make as many of those somethings as possible a new iPhone. I choose to believe that issue 2 was a design flaw and issue 1 was being too proud to admit the design flaw, but the argument that it was intentional has a lot of logic to it.
Billionaire's Pagani Pa-gone-i after teen son takes hypercar out for a drive, trashes it

Re: When you think about the cost of this car ...
"3 million to a billionaire is about the same hit as 3 grand is to a millionaire of the same scale"
Remember the law of decreasing marginal utility, or without the textbook, that more money starts to be less valuable when you have a lot of it. Billionaires don't usually have to worry about running out of money needed for basic living or even an emergency expense (unless they're the type to never think about their needs for money), so it's probably worth even less to him.
Page:
- ← Prev
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- Next →