* Posts by doublelayer

10485 publicly visible posts • joined 22 Feb 2018

The 2018 ThinkPad X1 Yoga: A bendy-legged workhorse walks into a meeting

doublelayer Silver badge

Re: So how is this a workhorse?

I know I'll get a lot of disagreement with this, but for many people, 16GB is a perfectly fine amount of memory. I don't know what you do, but I assume it's not one of those things. If you're using a lot of VMs, writing code in a large IDE with a lot of features turned on, or anything that deals with a lot of video and audio stuff, for instance, large amounts of memory can be very important. However, most business things aren't doing anything of the kind. Anyone who is just browsing, doing word processing, and using email and some videoconference thing won't need 16GB. I think that 8GB would be perfectly fine for that use case. Some business uses may need a bit more, such as the machine that's actually running that tremendously bloated financials package. However, a lot of places I've seen have moved that to a server with the machine just providing a frontend to it. That's another case that doesn't need a ton of memory.

I have a computer with limited memory. I'd love one with 32GB of memory, and if I had it, I'd find a way to use it. However, I handle certain exhaustive workloads and I tend not to run into a situation where my 16GB is insufficient. I have multiple VMs open at most times, each one having been given quite a bit of memory. Of course, some help may come from not running windows as the base OS, but even with that, you can still run quite a bit with 8GB memory, and 16GB, especially for a business machine, will work for almost everyone*. *Everyone refers to the business at large, not the technical areas, where the percentage is lower.

As one Microsoft Windows product hauls itself out of the grave, others tumble in

doublelayer Silver badge

Re: schrodinger's browser...

What if it's one of those wonderful tabs that, when they crash, manage to take the browser or, if they're ambitious, the entire OS, down with them? Is that what quantum entanglement is like?

Turns out download speed isn't everything when streaming video on your smartphone

doublelayer Silver badge

The best explanation I can think of is coverage, such that a country with good download speeds but bad video would have a fast network that isn't reliable, probably when moving. Video consumed while on a train or something like that could cut out a lot. But really, I have no clue. Maybe the article could get some more details?

Microsoft pulls plug on IPv6-only Wi-Fi network over borked VPN fears

doublelayer Silver badge

Re: Why do we need IPv6

For example, if they have five different servers that could work, they don't need to have large load-balancers to handle that case. Five ports on a public IP would mean that there was a theregester.co.uk:443, theregister.co.uk:444, etc. Who is going to type :444 when they don't have to? Nobody. Five servers running internally that are mapped to the same IP takes more networking setup that isn't really necessary. If they have servers in different places, many places can easily direct people to a nearby one, but again, doing that with the same address, while possible, takes more effort than doing it with five distinct ones. If addresses had a good reason to be rare, then I'd have more sympathy with the argument that people are just wasting them and should be better, but there isn't such a reason, as addresses can be made extremely long and extremely plentiful. So go ahead, use a hundred addresses if you have a hundred things at the other end.

There are plenty of reasons to dislike IPV6. I agree with most arguments, even the often-attacked hard to remember the addresses argument. However, the argument that four billion addresses should just be enough for a world of seven billion people and millions of companies, including tech companies with a lot of stuff running on them, and that we should just fix the problem of people using too many addresses, seems foolish to me.

doublelayer Silver badge

Re: Why do we need IPv6

I can see your point with most households, but there are some who will have publicly-facing devices and may need some more. In some cases, they may have small servers of some type, which could be quite a few. I wouldn't judge them without knowing their use case; they probably have their reasons even if you don't like them.

As for companies, there are some who use only shared hosting, and there are those who have several IPs for the web server alone. For example, The Register has five addresses for their web servers because there are real advantages that having one would not bring them. The company might have a lot of systems running that need to be public. It would be possible for one system to have the only public IP and direct traffic as needed, but it would be inefficient and a tremendous single point of failure with the capacity to bring down a lot of access should it break. Some of these workarounds are necessary with limited address space, but if more addresses are available, I see no reason giving people the benefit of the doubt that they need a few hundred addresses. Of course, deciding that the logical unit to give each user is a /48 (2^80 addresses) may be going too far in the other direction.

doublelayer Silver badge

Re: Catch 22

If only the process of getting dedicated IPV6 sections for a single unit were more convenient. I had cause to try to get one, going for one block for an organization rather than getting one from the ISP because we have multiple areas served by different ISPs. I figured we could assign subsections to each area and have a coherent block. Of course, blocks for end-user use are only allocated at /48 blocks, because there is never any way we could run out of addresses if they hand quadrillions to each person who has a reason, but also it turns out to be nye impossible to get an ISP to accept a block that isn't directly from them. So, of course we're using blocks allocated from the ISP themselves, losing any coherence provided by the structure, and making firewall rules (E.G. people from location A may connect to the server at location B, but people from the wide internet cannot) more complex. This happens because we have to know each subnet that the ISP has provided if someone at one place wants to run up something internal, rather than knowing our address section (which, IANA, could be a /96 without causing us any problems whatsoever). I think they might have constructed that a bit better.

Bug? Feature? Power users baffled as BitLocker update switch-off continues

doublelayer Silver badge

Re: Bit(un)locker

Incidentally, what's the benefit of storing the key in the TPM, without requiring a password, USB dongle, or pin to unlock it? The key is nice and secure, but the system can just read it and go right ahead. So the only difference is that if you steal only the hard drive, you can't read it. But if you steal the computer itself, you can just boot it up and attack the login window, which can gain you access to all the decrypted contents of the drive. Since encryption is primarily a defense against physical access and theft, storing a key in the TPM doesn't strike me as at all useful, let alone a good idea.

Cloudflare invites folk to dabble in the 'distributed web' with InterPlanetary File System gateway

doublelayer Silver badge

So, this is... wait, what is it?

As far as I can tell, this is a version of the internet where everyone has to hold a bunch of data that no one needs because what if it dies? It can be annoying to get a broken link because someone's host has gone down, but it might be even more annoying to have to store a bunch of garbage that was posted at one point but has no purpose anymore. For example, could I use this as free storage for my encrypted backups, just by splitting them up and uploading them? How does the IPFS network feel about keeping that around so I can retrieve it by smaller and easier to store hashes?

Another problem is the hashes themselves. It's wonderful that they can make it impossible/somewhat difficult to replace data, but that is what normal hashes already do. I somehow need to get my hands on all the hashes I need, and it's not that hard to put in some documents that look like what I want, but contain sneaky tracking code and incorrect hashes to other files, then ensure I get the wrong one. The lack of a secure way to indicate locations means that the secure delivery once a hash is entered is a lot less valuable than it sounds.

Top Euro court: UK's former snooping regime breached human rights

doublelayer Silver badge

Nail in the coffin

So this is another nail in the coffin of state surveillance, huh?

Hey! You've got to take those nails back out! You forgot to put state surveillance in the coffin before you started nailing it up! Next time we need something buried, we're going with a different group of coffin makers.

Apple in XS new sensation: Latest iPhone carries XS-sive price tag

doublelayer Silver badge

Emergency call

Please tell me that this can be turned off. The last time apple did this, they did it badly. They installed an easy to call the emergency services using the same shortcut that used to be for respring (essentially, stop apps and reload the interface, but don't reboot), which could be useful if you were developing an app that had bugs and caused the phone to lag. So, I ended up on the phone talking to the emergency dispatcher who did not need to hear from me, and my phone was still laggy and required a force restart. If I was crazy enough to have the apple watch, what would happen if I dropped it on a desk, or I set it down to charge but accidentally knocked it off the table, or I dropped it somewhere where I couldn't get it, such as through a grate? I don't want to burden the emergency services with a bunch of useless calls.

Email security crisis... What email security crisis?

doublelayer Silver badge

Re: Microsoft announces threat intelligence service?

Unless this has changed in the past two weeks, the phone number step is not required. Fill out the original form for a free account. They will demand proof of humanity, which I think is set to phone number. However, you can do a captcha, get a mail to another account, or donate to bypass this. Then you have an account. I speak from experience, having done this twice.

doublelayer Silver badge

Re: Unsecure

That is exactly my point. It was easy enough for me. However, it involved using a gmail address. In the days when people are unwilling to trust gmail, what can I offer them as an alternative. Very little. It isn't possible to set something up that would be independent of it. In the end, you end up with a chain of things that are all tied to an email address, and the only place you can get one of those that isn't connected to another chain is a company that is external to you and that you may not trust. You major options are google, microsoft, and apple, with a few Russian and Chinese participants available too. I'm sure you can find some more that will let you pay them for access, but there is not a guarantee that they will be any more trustworthy. A new system may not fix this.

doublelayer Silver badge

Re: Unsecure

One of the major security problems I have with email is how it is required by most things. Consider my recent attempt to switch from using a mail account provided by a company to having my own mailserver that would be more secure and more under my control. I've seen it recommended by a lot of people, so it should be doable, right?

I already own a domain name, but if I wanted to get one, the registrar requires an email address for the account. It can't be my new one because I haven't bought a domain name yet.

The place from which I'm buying my server space needs an email account. While I have a domain now, and thus could probably set up an address through it from the registrar's tools, they don't give me free mail facilities, and I don't want that anyway because I want to set up my own. So, since I don't have a running mail server yet, I can't use my new address.

Fine, so I can't use server space that I buy from a remote provider. Maybe I can get a static IP and run a mailserver on physical hardware in my house. The ISP requires an email address.

It seems that there isn't a good way to have an address that doesn't rely on an external address itself. I did end up setting up that mailserver, which now handles most of my mail. However, I still have to have that third party address, to deal with the messages and identification for my domain registrar and my server provider. I considered switching those accounts over to my new domain--I would have needed that third-party address at one point, but it could now be dispensed with--but then I realized that, should either the registrar or server provider become concerned and suspended the account or asked for additional verification, I'd be immediately locked out because I'd rely on the server they'd just cut off or shut down to authenticate myself. And people wonder why nontechnical users just set up free accounts with gmail. It's a losing game, it seems.

doublelayer Silver badge

Re: Email is absolutely broken...

So I should have a whitelist of people who can send me mail, having to negotiate their certificates approved by [not mentioned] so I can trust it? How do I deal with the "We would like to schedule your job interview for the important job you applied for." email that I'd like to read, but it's coming from an employee of that company whose identity I didn't know and therefore whose certificate I don't have, let alone approved.

That also makes the process of using email for casual communication, at which it works well, much more irritating:

Before:

"We should really discuss this later. Would you be interested in meeting next week?"

"Sorry, I'm busy then, but I'd love that. How about we email to find a time?"

"Perfect. My address is person@website.domain. I can write that down if you'd like."

After:

"We should really discuss this later. Would you be interested in meeting next week?"

"Sorry, I'm busy then, but I'd love that. How about we email to find a time?"

"Perfect. My address is person@website.domain. I'll need yours, as well, to approve it."

"Mine is another.person@adifferent.domain. Just let me get my phone out so I can send you my public key."

"Sorry. My phone died earlier. I suppose I can try to find someone with a USBC cable I can borrow so I can record that and send you mine."

"Otherwise, I suppose I could write down the hex value of my key and you could approve it. I hope that I'll remember to contact you, because without your key, I can't approve seeing your mails."

"That will work great! It's wonderful how we solved that insecure email problem, isn't it?"

Dust off that old Pentium, Linux fans: It's Elive

doublelayer Silver badge

Re: GUI ?

Of course you are right. There are a lot of good use cases for machines with 256 MB or less of memory. However, my original point with respect to memory was basically these two:

1. I wouldn't recommend the use of a machine with 256 MB or less of memory as a computer to be used as a desktop, running GUIs of multiple applications,

2. I wouldn't recommend a pentium computer (referring to pentium meaning the typical age of chips called pentium when they might regularly be shipped with 256 MB of ram) for any purpose. Among the reasons for this are power efficiency, raw processor speed, memory speed, and speed and reliability of the disks typically found inside these things.

doublelayer Silver badge

Re: Best live distro to run from a USB

In general, whatever distro you already use, minus some stuff that requires a lot of disk access. If, for example, ubuntu is your wish, just install it, pick a desktop that you like and that doesn't lag much when you run it on the oldest computer you have, and install the utilities and applications you'll use when the machine you're using your USB disk on isn't connecting to the network. I'd suggest making a partition on the disk for general data storage that can be safely mounted and written to by other systems, so you can continuing your USB drive as a drive and for dealing with data stored on encrypted disks you can't mount when booting directly, and you'll have all you need. With very few exceptions, any linux distro will run well enough. Some desktops will use a lot of resources, especially disk, so they might not be available to use while retaining your patience, but there are many, including mate and KDE, that run perfectly well.

doublelayer Silver badge

Re: GUI ?

I can't really see the use case for a pentium with 256 MB ram. Anything that still needs one will probably also require whatever software was running on it already. Otherwise, a better computer can be had for $5 for the raspberry pi zero. A better computer with a screen can be had for $25-40 if you look for a used laptop being sold on your used-goods-emporium of choice. Power consumption means they aren't even good for places that can't afford modern systems. What's the point?

Trend Micro tools tossed from Apple's Mac App Store after spewing fans' browser histories

doublelayer Silver badge

Re: It wouldnt be a Trend Micro product otherwise

I've seen it used as well. The version that we had had a scan scheduled every week during the middle of the afternoon on Wednesday, when you were working. The software would courteously ask you to confirm the scan, with the option to delay it. Nice and respectful, no? No, not really, because the delay function didn't work all that well, and would sometimes delay all the way until you logged in on Thursday morning, when it wouldn't ask you but would just cheerfully scan everything with the accompanying lag in performance. And because whatever group was responsible for scheduling the original scan for when people were working, most users would go with the only guaranteed way of continuing to be productive: clicking the "skip this scan" button every single Wednesday.

doublelayer Silver badge

Re: 1 - 2 - 3 - Not it!

Yes, that's so. How does it work if it went like this:

Due to GDPR, we require to accept our terms of service and privacy policies for doctor antivirus [tm] to REMOVE ALL MALWARE from your system. In order to perform our 99% effective algorithms, we will need to collect information about whether the code crashed [several more clauses] and some information about your computer [left unexplained]. Please check these boxes to note that you understand that we take your privacy and security seriously, and then we'll start our medical scan [tm] algorithm to find the malware that caused you to install this in the first place. Just check these boxes, and it's all done!

I certainly hope it still works in that case, and I'll cheerfully watch on as Dr. Privacy Cheat and the rest of their software earns them a massive bill. However, I figure that lawyers eventually figured something out with regard to that particular issue.

Sextortion scum armed with leaked credentials are persistent pests

doublelayer Silver badge

They're using webmail accounts

I wonder whether anyone at the webmail providers has done something to help track these people down. It is now the case that it's almost impossible to set up an account with the main providers without providing them with a phone number, at least, which they use to "verify" your existence. That implies that they should have those somewhere. If they can't use these to help find criminals, why are they violating standard users' privacy by making them give them one in the first place?

FBI fingers the Norks it wants to pinch for Sony hack, WannaCry attacks

doublelayer Silver badge

Re: You'd be amazed at how many hackers ....

Not only can North Korea make him a new identity with great ease, but most North Koreans, including, I assume, this guy, only get to leave the country if it is specifically approved by the government, which almost always means only to China. I wouldn't be surprised to hear that he'll be staying there for the rest of his life, from where he can keep working on all the same stuff. If you don't have the choice to go on holiday, you can't be caught on your way.

Microsoft sharpens its claws to cut Outlook UI excess, snip Ribbon

doublelayer Silver badge

Re: UI revamp

Who wants to bet that all the keyboard shortcuts will change again? You already got rid of the feedback while using them, at least let me keep typing the same thing to add an attachment or something basic like that.

I've seen the future of consumer AI, and it doesn't have one

doublelayer Silver badge

Re: So-called "AI"

I mostly agree with you, but some applications of what is termed AI are things the brain couldn't do either efficiently or at all. Usually, they call this machine learning, because they realize that the program is less deliberate intelligence and more iterative or evolutionary familiarization with data. For example, a laptop can recognize text from images much faster than your brain. Your brain can do it better, but the computer can do it well enough if image quality is good, and can process at hundreds of pages a minute. Identifying irregularities in a million seemingly random numbers used to be a multi-year project for a team of cryptographers, or a multi-month project for a concerted effort of tens of teams. Programs exist to do that in a matter of hours using consumer hardware, or seconds on the computers you mention.

There are other examples that a computer can do where a brain can't; anything that involves a lot of data transformation, while technically possible to be done manually, would require a brain to act almost identically to the computer, doing the job much more slowly and with the virtual guarantee of many mistakes. Thus, not all machine learning/clever algorithmics/artificial limited-intelligence is useless. Primarily just the kind the companies want we consumers to have available to us. The good code they keep to themselves.

Google is 20, Chrome is 10, and Microsoft would rather ignore the Nokia deal's 5th birthday

doublelayer Silver badge

Re: For all your searching

I use DDG whenever possible. It is my default, and most of my searches go through it. However, there are types of queries that google can handle much better. One of these is when you want to download some piece of software, but you don't remember what the download link is for it. If it's a thing that has its own site, then it's straightforward (go to site, click download). Consider a program like thunderbird. Is it mozilla.org/thunderbird? I don't know; it might be. If you want the download quickly, google will direct you to the right one from the search "mozilla thunderbird download", whereas duckduckgo will give you several close but wrong pages. They are also prone to being attacked by the SEO-intensive software distribution sites that put malware in with the download if you can even find it. Google can also answer certain questions directly. When the standard user wants to ask a question and get the answer fast, google's lead in this keeps them from taking my suggestion and switching to something that is more respectful of the user.

doublelayer Silver badge

Re: Ask Google? Ask Microsoft?

Google's search is still pretty good. This is unfortunate because the previous sentence is the standard response to my question "How are you liking using duckduckgo?". I would cheerfully continue to use google's search, including seeing ads on that page, if only they could disassociate it from some of the other creepy things they do. Unfortunately, that doesn't look like a viable possibility.

Huawei Mate 20 Lite: A business mobe aimed at millennials? Er, OK then

doublelayer Silver badge

Re: castrated

It's surprising to me that the two phones compared in the article described the other as good if you don't want photos. I understand that the camera on this one is better, but the one on the other is a 16 megapixel sensor, which, assuming it's not connected to some terrible imaging unit, should be fine for a lot of people who don't intend to go into phone photography. I figure that it will be just fine for people who like to take photos to send to others, given they used to do so with 5 megapixel cameras and didn't seem to have a problem with it then.

doublelayer Silver badge

Re: Whenever I see these "overly diverse" SKU options

That's logic. You and I have logic, but phone makers don't. I was resetting some old phones for a friend's business a few weeks ago and was presented with about six phones that I thought were identical. Instead, they represented at least three different LG brands. Fine, so the black and white ones weren't the same model, but there were two different types of black phones that seemed the same to me from all respects. By the way, none at all had the same OS version/security patch. 4.4.4, 5.0.0, and 5.0.2 were all listed, along with security patch dates ranging from 2015 to January 2017.

In terms of buying a device, the many options preferred by some companies irritate me. Sure, the long list of models ensures that there probably is one that's nicely priced and includes whatever specs I'm after, but the length of the list, as well as the inability of any web listing to stop repeating them, means I'm not likely to find it. For example, try to collate a list of all the mid-range windows laptops from dell, HP, lenovo, etc. into a single database that can be searched. When, for example, someone asks me for a machine on which they intend to run windows, and I just need to find one with an I3/I5, probably 8GB memory, traditional ports, and reasonable storage, there can still be too many options for me to find the one that is best priced. I can find something meeting those specs almost instantly, but it's likely to cost almost twice as much as it should. Eventually, I find one and recommend it, only to have to start again a year later when someone says "You know computers, right? Could you help me find one to..."

Microsoft gives Windows 10 a name, throws folks a bone

doublelayer Silver badge

Re: Obviously...

LibreOffice can save just fine as word or PDF, so it can be hard to determine if someone's using that. Of course, complex stuff that docx files support might not be perfect if LibreOffice saves them, but experience tells me that the same type of chaos can be created just by saving a file in one version of word and opening it in another. Simple things like CVs will be fine.

The major problem I've seen with getting some people to use LibreOffice is that people used to excel won't take to calc. A lot of excel stuff doesn't work at all. Normally, that's probably fine, but if the people you're trying to convince worked in finance of any type, they will be grumpy and unhelpful. If you try to convince them to leave excel behind, this gets worse.

Hello 'WOS': Windows on Arm now has a price

doublelayer Silver badge

Re: How much?

Theoretically, anything relatively legacy from win32 should run, as long as it can without doing any deep-system work. The APIs are compatible and the instructions are simulated. If what I saw months ago is still correct, 64-bit applications won't work, but with only 4GB of ram, that's not a really big deal.

I wonder how far the battery drops when you're running one of those. I presume quite a bit. I also wonder if the 25 hours of battery when watching local video is perhaps taking advantage of a GPU that is efficient. Usually, that kind of number sparks my exaggeration sensor. I would like to see real world numbers for activity that will actually happen: browsing internet, doing office work, spreadsheets with inefficient formulas courtesy of finance, and doing one of those with several tabs, mail client, and skype running in the background. Then I'll know what I predict.

Fast food, slow user – techie tears hair out over crashed drive-thru till

doublelayer Silver badge

Re: Very Good Answer...

I'm currently dealing with a similar problem. I don't work in IT support, but when my family members have issues, they come to me. This time, it's one of my family members who runs a small business with no IT help at all. Unfortunately, the help is going like this:

Family: We have a firewall, and it's old. We want to get rid of it.

Me: Would you like me to recycle it? I get rid of a lot of hardware.

Family: No. We don't know the password to it, or actually we think we know the password to it, but we don't know for sure.

Me: Do you need the password if you're just going to get rid of it?

Them: Well, we don't know, but how can we configure it if we don't have the password?

Me: Do you want it or not.

Them: Do we need it?

Me: I don't know. What are you doing with it?

Them: It's between the modem and the router.

Me: Do you mean the WiFi access point?

Them: No, that's connected directly to the router.

Me: Which is downstream from the firewall, right?

Them: [confidently, so I know they haven't a clue] Yes.

Me: [realizing that using the word downstream was my fault and I shouldn't have] Do you know what I mean by downstream?

Them: Yes, of course.

Me: Ok. Then what is upstream from the firewall?

Them: We have some network phones and a computer on that part. All the other computers are on the other part.

Me: Which part? Can we start from the line in from the ISP? What's plugged into that?

Them: The modem from the ISP.

Me: And what's plugged into that?

Them: The firewall and the router.

Me: What's plugged into the firewall?

Them: The router and the modem.

Me: Is this router the same one that's connected to the modem directly?

Them: Yes.

Me: And what's connected to the router?

Them: The server, the switch, a phone box, and the WiFi.

Me: [Pretty sure they've got a loop but at least I understand now] So the router is between all the devices on the network and the modem? There's nothing else there?

Them: No. The firewall is only between the router and the server. The computers are connected to the switch.

And it continues. This is why I didn't go into IT or specifically networking. I can sysadmin a lot of stuff, but I don't know whether I can do a business network, let alone one where someone's already treated it as a cabling playground. But more importantly, it's why I would never work in support. Even if all the programming jobs that I'd rather do are replaced by AI, I'll not do support. My sanity is important to me.

No need to code your webpage yourself, says Microsoft – draw it and our AI will do the rest

doublelayer Silver badge

Re: I do wonder...

I will bet on "a very large amount". Just try to pick up any html page and see if you can read it from source. I certainly can't. About the fourth time another javascript blob appears, I lose my focus and give up.

I have a web application online that I hand-coded. All the files involved except the images can fit in 24 KB. This includes the backend code as well, so each frontend page that could be presented is tiny. And still it has a number of features. A standard page online is much larger than my entire application.

If you have to simulate a phishing attack on your org, at least try to get something useful from it

doublelayer Silver badge

Re: Russian Hackers

I wouldn't count on that. Sure, generic phishing attacks are fragile; they can be detected and usually they are ineptly built. However, a standard phishing attack is usually done to get a few people. If an attacker gets four credential pairs out of a thousand people, they're probably quite pleased. There are ways that phishing can be done better, be that "spear phishing" (tailoring everything to one specific victim, which increases the likelihood that someone clicks on it), using various methods to make detection harder (for example, many phishers don't try to pretend to be from a trustworthy domain, but it can be done), or having lots of small phishing sites such that the death of one doesn't really affect much. The proper flagging of this attempt doesn't mean that something else can get through.

A decade on, Apple and Google's 30% app store cut looks pretty cheesy

doublelayer Silver badge

Re: Exposure?

Not really. Of course, google play won't help with exposure, but it will help keep people who already know about the app from drifting away. When you say in your advertising to go to the google appstore and search a phrase, people know what that means. If you tell them to go to a website, no matter how clear you are on that site as to how to download the APK file and install it, fewer of them will. That's why the google store can effectively constrain developers to using it, even though sideloading is possible. The same would be true, for example, if you told them that the app could be found in FDroid or another relatively unknown store. The non-technical, for most apps, the main customer base, won't get you, and you'll lose their business.

Intel rips up microcode security fix license that banned benchmarking

doublelayer Silver badge

Re: When will it be safe to by a new system?

I'm glad that works for you. However, there are many tasks that people ask of their computers that a raspberry pi would not do to their satisfaction. Among these are modern games, high-speed browsing (think downloading a multi-gigabyte zip file and extracting it, which on the pi with its USB2 bus and SD card is going to be a lot slower), editing high-bandwidth data (images, audio, or video), even browsing pages with a lot of data to pull down and render and/or having a bunch of tabs open (I wouldn't want to deal with my family's complaints if they tried to do their standard browsing with only a pi core doing that for them). There are a lot of good use cases for one, even when running a full desktop, but there is a reason that a great many raspberry pi users are using them headlessly or as media devices rather than transitioning to having one as their main machine. However, my point was more about viable options for processors in consumer computers. In the sense of performance that is expected of a computer sold these days, intel and AMD are the only providers who 1. have such a processor available and 2. have that processor in a consumer-available machine. ARM has many such processors, but you can't get a computer with one in; the raspberry pi uses a much slower processor. Therefore, the only available alternative should you be concerned about the vulnerabilities or unwilling to hand over more money to intel but still want a standard desktop or laptop is AMd, at least for now.

doublelayer Silver badge

Re: Silly season...

If you're suggesting that we just ignore the problems, that's not likely. Sure, many of these vvulnerabilities aren't important (now) for our personal machines, but a lot of us, myself included, have virtual machines on a system that probably has some more ones. If there exists something that lets another VM user read or write data from mine, that's not a good thing for me. No matter that my VMs aren't doing something extremely secure, I don't really want others trying to break in.

Note here that I have made some trade-offs in doing this; my VM provider could do a lot of nefarious things if they were so inclined. I have taken that risk and chosen to trust them as a result of my paying them for the service. I am willing to trust that they will not alter my system or extract information, but I don't extend that trust to other users I do not know. The same would be true of each security vulnerability. We don't expect complete security, but we did expect a reasonable level of it. We are justified in being irritated with intel for repeatedly failing to make their processors secure.

doublelayer Silver badge

Re: When will it be safe to by a new system?

Functionally, there is only one viable alternative, that being AMD. There are a lot of other processor types available, but none that are convenient for consumer computers. ARM processors aren't sold in prebuilt machines, and even if there are ARM motherboards out there, you're probably heading for a compatibility nightmare. While there are some machines running ARM out there that are inexpensive for standard consumer use, would you really want to have a raspberry pi as your main computer for standard tasks? The latest one would be fine enough for browsing, coding, or word processing, but it has a lot of downsides if it is being set up as a desktop.

It's a net neutrality whodunnit: Boffins devise way to detect who's throttling transit

doublelayer Silver badge

This is completely correct. You could put the original blame on verizon selling an annoying package or the fire department for not paying attention. To the extent there was blame, it would be verizon not terminating the throttling during an emergency. This is definitely not a net neutrality thing, and I think our writer may have mixed these things together. I've reported this to the tips and corrections, in the hopes that it was a mistake or the reporter was just tired at the time.

Australia blocks Huawei, ZTE from 5G rollout

doublelayer Silver badge

Re: 5 Ears?

Really? I'm not saying that equipment made in countries with large surveillance systems is free from backdoors, but we're talking China here. They have spyware on pretty much everything, but they just won't have it on something big and important? That doesn't make sense to me. If you do want to go full conspiracy theory, it wouldn't matter if the Chinese equipment did in fact have no back doors, because the Australian companies would be going to configure and program it. If a surveillance system needs to be built, that could be done no matter what it runs on.

Redis has a license to kill: Open-source database maker takes some code proprietary

doublelayer Silver badge

Re: Jolly Good Journalism, El Reg.

Thank you for those posts; they were informative. I will be going through my code and clarifying the licenses. In most of the libraries I have written, they are probably more of a BSD-type thing, as they are less likely to be externally modified, and I'd rather not limit what people can create with it. Still, quite a bit of research to do before I decide on something.

doublelayer Silver badge

Re: Jolly Good Journalism, El Reg.

I agree entirely. I have periodically considered which license I should use for my own open source projects, and I still don't know. I've never seen a concise argument between the various contenders, and while I have at one point or another read most of them, I can't really remember all the things you are and are not allowed to do with them. At the moment, I have published source without including or mentioning a license and I just leave the users to figure it out, but that is probably not the best way to handle that.

US Democrats call in Feds: There's something phishy going on with our voter database

doublelayer Silver badge

A security test?

Well, that seems very weird to me. I trust that it happened, but what has to go through one's mind to come up with the plan of action: "Let's run up a fake website for a security test for someone we don't work for, who hasn't asked us for one, and by the way we won't tell anyone about it." I have a feeling that, if I did that to someone, I'd be sued and/or arrested almost immediately.

It liiives! Sorta. Gentle azure glow of Windows XP clocked in Tesco's self-checkouts, no less

doublelayer Silver badge

Re: Local Optician

"running XP is not really that bad especially if the machines are not connected to the Internet"

For point of sale equipment, it is almost certainly connected, if not to the internet at large, at least a corporate network. You could create a communication system that lets information about payments be sent out without networking, but that is difficult and probably wouldn't be attempted. These vulnerable devices have been used before to gain access to payment information, usually after a breach somewhere else in the network.

Meet the LPWAN clan: The Internet of Things' low power contenders

doublelayer Silver badge

Re: I have doubts

I will try one more time. I do not think, nor have I ever thought, that the type of devices we are discussing are the types to send video streams or other large data streams.

Now to cover IoT vs IT: IoT is IT. It is a system that runs code, interacts with other devices, and in order to actually come under IoT, must connect to the internet at some point. It may not be exactly similar to other IT devices, and there may be other people to work on it, but it is technology that delivers information, and is more similar to IT infrastructure than infrastructure by most other departments. In addition, most of the things that are talked about as members of the IoT group as a whole are much more complex than something that runs some sensors and can communicate all the relevant information in some 255-byte chunks sent every once in a while. Even if we're limiting ourselves to equipment used in industrial things, there are things that require direct connection because they report information or receive commands in real time, and those things are always called IoT. In fact, if we wanted to split the broad category IoT, the devices better suited to the name would be those connected directly to the internet rather than sensors that use a gateway (of course, if that gateway also allows internet connections, then those sensors also belong to the IoT group).

My doubts are still alive, but not because I fail to see use cases for the technology. I merely see a great deal of complexity in the technology that would make it difficult for some players to use it. Combined with the fact that WiFi exists and can be used by a lot of sensors, albeit with less effectiveness and many downsides (I admit these are there), many might not bother to implement it. This could cause the technology to stagnate.

On the topic of hospitals, many of these already have WiFi. Part of the reasoning for this are patients who must remain there for some time, but the system is also used for wireless devices used by the staff. Those hospitals that lack it often still have wired internet, as they are some of the most computerized locations. I'll admit that I have less experience with factories, but I'd imagine that those for whom the term internet of things is a selling point are probably not strangers to internet-connected equipment on the factory floor.

doublelayer Silver badge

Re: I have doubts

In fact, I did read the article. If you could reread my comment, please, you will perhaps notice that I mention video as a reason why data limits on WiFi wouldn't apply to devices such as this, as they will not be sending a lot of data.

Hospitals and factories are very often highly networked. They are indoors, and there is electricity running everywhere. Machines, lighting, communications infrastructure, all are there. Especially with hospitals, there are also computers everywhere requiring network activity, not to mention patients who may have phones and laptops with them. Installing WiFi access points in an environment like this would make a lot of sense. FYI, a single WiFi access point doesn't cost anything like $200. A network covering a factory wouldn't be cheap, true, but depending on use case, it could be worthwhile. However, in a highly electrified location, many of the sensors could be directly wired.

The use cases that make the most sense to me are those that need a long range where electricity and networking aren't available, most of which are outdoors. I can think of some use cases indoors as well. If you had a factory without WiFi and you only had one or two sensors, then installing WiFi only for those might have little point. However, if that were the case, I'd assume you could do that more efficiently by having those sensors attached to whatever they're sensing, as there are not that many of them.

doublelayer Silver badge

I have doubts

I looked into some of these a while ago--I had a system which could benefit from communications at a distance, where there was no WiFi. However, I couldn't justify it, as all the components I could find required a lot of investment in hardware at each point. When you keep in mind that the computing part of a lot of these were raspberry pis, it perhaps makes more sense why I wasn't exactly impressed by the $20 US LoRa boards I found. Of course, I'm not mass-manufacturing these things, but a lot of the IoT things used in industry could probably be set up in a way such that they don't need these. For example, factories and hospitals, as listed in the article, are environments where devices could easily use WiFi connectivity. They are indoors, so in a place that likely already has networking, and a place that has electricity sufficient for the machines to transmit on the comparatively power hungry WiFi. There are lots of cases where something like this could be necessary, but I seriously doubt it's going to replace devices that use more common and less expensive technology.

Another issue is that open standards are a lot easier to develop for. If I build something that can use WiFi, I know it will work with the network infrastructure already in place. If I'm doing things locally, as usually these things will do, there is no data limit problem. Given that anything considering using something with maximum message lengths less than a kilobyte won't be sending video or something like that, WiFi connected to the wider network still won't have a data limit problem. Meanwhile, all these systems seem to require some type of central infrastructure, which is either provided at a lot of restrictions or has to be constructed by the user of the devices. It's a lot of work to do for most applications, so unless the range or power is absolutely necessary, I doubt they get used as often as the predictions estimate.

EU wants one phone plug to rule them all. But we've got a better idea.

doublelayer Silver badge

Re: It has?

Nor do I. I think it might be best if, instead of thinking up new types of connectors that 1. don't have any faster data rates, 2. didn't get any smaller, 3. took far too long to realize that being flipped would be helpful, and focused on making what is already available better, we'd have better cables. The same applies to all types of fast-charging stuff. If, instead of trying to crank up the voltage or current, phone manufacturers tried to make their phones run at lower power levels and have batteries supporting it such that the typical high-power USB (5V 2.5A) would be fast, then it would be much easier for everybody.

Democrats go on the offensive over fake FCC net neut'y cyberattack

doublelayer Silver badge

Re: Pai is still damaging society

That is not how any of that works. Net neutrality means that the people running the communication systems can't send some traffic faster than they would ordinarily, and the reason for that is that the only way to do so involves taking something else and slowing it down. It is not that you can't buy faster speeds; you can. Get more powerful servers and high-speed data links and believe me, you'll see your speeds skyrocket. What the net neutrality people advocate is that you can't buy someone else having a worse time. For example, there is not an "expensive car lane" that allows those who have paid more for their cars to bypass traffic, even if they pay for it.

This is usually the reason that companies want to have the ability to change speeds; coms company C wants more money. Video streaming company V wants their competitors out of the way. If V pays C to make all of V's content faster, thus making it a better experience than competitors W, X, Y, and Z, then eventually people stop buying service from W, X, Y, and Z. The two possible options are for W, X, Y, and Z to fail, causing consumers pain because their options have been lost, or for W, X, Y, and Z also to pay C for faster connections. This makes the services of V-Z more expensive, as some of the money the people pay has to go to C for the we-won't-choose-to-kill-your-business tax, and it harms any other business that wants to stream video. In fact, it hurts any other business, period.

If you drop a tablet in a forest of smartphones, will anyone hear it fall?

doublelayer Silver badge

Because tablets aren't as useful as the companies thought

Companies seem to lose track of what products are going to be useful to everyone and which ones aren't. Then, the sales slump off and they all ask why as if nobody's considered it.

Laptop computer: Hit. People want a lot of computing capacity in a package they can carry with them.

Smartphone: Hit. People want a lot of computing capacity in a package they can carry on their person and use portably or in motion.

Tablet: Let's give them a sort of middle amount of computing capacity running an interface designed for pocket devices, but make it big enough that it can't be carried without a bag or conveniently used for short periods on the road. Why doesn't everybody want one?

Smartwatch: Let's give them a small amount of computing power, and they also carry it on their person, but it does less than the other thing they already carry on them. Do people not understand they should want this?

Of course, all these things that aren't going to attract everyone have use cases that work for some, but businesses shouldn't just expect everything to sell at the same rate. It's not going to work like that, especially if the thing they expect to be their standard is a revolutionary device like a smartphone which has achieved extreme levels of market penetration.

You want to know which is the best smartphone this season? Tbh, it's tricky to tell 'em apart

doublelayer Silver badge

Re: Tricky indeed...

I disagree. Android is insecure in all sorts of ways, and google, as well as various others if they can get a chance, will collect a very large amount of your data. Apple doesn't collect as much, has more restrictions on third party collection, and has fewer security problems. Apple therefore makes a more secure product.

However, there are a lot of good reasons to dislike IOS. The fact that it's secure doesn't make the lack of choice, the lock-in to apple, the ridiculous expense of the hardware (although certain droid manufacturers are giving apple a run for your money there), or any other annoying elements better. There are trade-offs, but I see them as security versus all the useful features android has that apple doesn't. Security vs side-loading. Security vs removable storage/battery (some conditions apply). On and on.

Also, just because apple's phone is more secure than most android phones doesn't mean that apple is good. Apple could do more to protect their customers' security, and they could easily collect less. I would like to see both. For security changes, I have a very long list for android to do.

Nah, it won't install: The return of the ad-blocker-blocker

doublelayer Silver badge

Re: Advertising from mobile 'phones

It is possible to remove this, but the setting is hidden so that most people don't try to find it. Also, it has an irritating habit of switching itself back about once a year. If you send relatively few messages from your phone compared to your computer, you're liable to send out a few before you notice that the thing is back.