* Posts by doublelayer

10566 publicly visible posts • joined 22 Feb 2018

Raspberry Pi 500 and monitor arrive in time for Christmas

doublelayer Silver badge

Re: Pictures, pictures, pictures

That would go against the nostalgia involved in having a keyboard attached to the computer. Maybe there's a benefit other than that, but I don't really know what it is. One fewer cable doesn't worry me very much, and it lets me have a keyboard of my choice. Still, they are selling enough of these that they made another version, so people must like having the keyboard and computer integrated.

doublelayer Silver badge

Re: Keyboard layout

We all get used to a layout. I don't think there's a better or a worse one, just a normal one and the one that you keep making mistakes with because the keys are in the wrong places. For example, if you're used to an ANSI layout*, you might get used to a longer shift key and dislike the little key they shoved in between the shift and Z key which you keep hitting when you want to capitalize something, whereas if you used the ISO layout and were now given an ANSI one, every time you try to run a command and hit something other than enter because they made it thinner would get on your nerves.

* For once, this isn't a US versus everyone else thing. ANSI keyboards, what has been called the US keyboard layout for this thread, are commonly used in a lot of countries, not just the US. ISO is common in many European countries, but most other continents have more ANSI keyboards.

doublelayer Silver badge

Re: Keyboard layout

"The reason why USians call it "Pound" is back in the day of 7 bit ASCII, on many serial terminals (and printers) sold in the UK, there was a switch or a menu setting that changed the "#" for "£" on both the keyboard and the screen."

Not quite. It goes back farther, at least as far as when someone needed non-digit inputs to a phone and decided to put a # on one of them. The United States called and still calls that the "pound key", in the same way that a lot of other countries call it the "hash key", and Canadians call it the "number key". Can I explain why those names got chosen? No, I can't. It does predate a lot of terminals and computer usage, though, suggesting that the names for the symbol might have come before both the phone and the computer usage.

Huawei handed 2,596,148,429,267,413,
814,265,248,164,610,048 IPv6 addresses

doublelayer Silver badge

Re: I have one major worry about IPv6

"Need to be careful, whilst many things eg. On prem Mail server, RDS server, PABX benefit from a static public address, the individual systems don’t need to have different public IP addresses."

I agree that user desktops, for example, don't need public addresses. If they get them thanks to IPV6, they'll need a strict firewall in front of them, which the default config will usually do.

There are often enough things that do need a public endpoint that having addresses for them is helpful. When I've seen ISP plans for small businesses, they tend not to give out very many. The last one I saw had options for two statics and six (six was a lot more expensive than two). A lot of businesses can fit their public infrastructure into six addresses. Some can manage with two. However, if someone has seven machines and wants them all to have public addresses, I want to give them that option. I could pack things together so that their machines share addresses, or I could just give them IPV6 and no sharing is required even if they buy an eighth one. That means there's a lot less complex configuration, fewer opportunities for things to not work until the network admin can be called in to reassign ports and clean up the DNS, and less opportunity for an ISP to overcharge people for providing no service, just a scarce resource that has no reason to be scarce.

doublelayer Silver badge

Re: I have one major worry about IPv6

While I grant you that someone wanting to claim a difference in the router could phrase that the way they did, that's not what they meant. What they meant was that a NAT connection has only one IPV4 address, and thus only one port 80, whereas an IPV6 network has more than one and thus more than one port 80. I'll concede that they should have said "network" instead of "box" in that sentence.

You're right that a lot of homes won't need very many, if any, connections. This doesn't matter very much to me. We can ignore those people and consider only those who actually care about inbound connections, and for any of them, IPV6 offers significant advantages. A Ring camera doesn't need to have a public port because it calls out to Amazon's servers and only talks to them. A privacy-respecting one might self-host, which you could do with a directly accessible public port or with a network setup of your own choice. Ring benefits if we don't get public access, whereas personal control benefits if we have that flexibility. Some people who currently don't understand why IPV6 would help them, including some who don't know what that is at all, would also benefit from that. Randomly changing addresses are also not much of a concern, because ISPs are unlikely to randomize the IPV6 prefix you were assigned because they have plenty of those, and your devices don't have to change their address at all. Some machines are set to do that, but that's an option, not a requirement. Meanwhile, ISPs generally reclaim IPV4 addresses if the network gives them up because they are a scarcer resource, so changing addresses are more likely there.

doublelayer Silver badge

Re: I have one major worry about IPv6

"(1), completely irrelevant to home and small business,"

Home I'll grant you, though some home users (me, for instance), wouldn't mind being able to publicly address multiple machines without a manually-maintained port forwarding and DDNS setup. When you consider CGNAT which prevents any public ports and covers billions of home users, there's another reason. But true, a lot of home users won't notice the switch. Small business is not so uncaring. Some small businesses actually have some infrastructure that benefits from public IPs.

"(2), mostly irrelevant to anybody using a load-balancing front end."

Rubbish. Load balancing does not eliminate the benefits of IPV6. You still put a load balancer in front of your servers here, but when you need to identify and locate those servers, you have an easier time of it rather than shoving everything into the 10.0.0.0 space and hoping that nothing overlaps. You can also have multiple addresses for multiple servers. If you direct all those addresses to a single load balancer because your load can take it, fine. If you want to have a different server outside the balancer, for instance one that you intend to be available in the case of a failure of the balancer, you can do that. Of course, most of the people who are in such a position have some IPV4 addresses to spare and do that because they have already paid for the ones they'll need. With IPV6, you won't have to participate in five-figure auctions for a /24.

doublelayer Silver badge

Re: I have one major worry about IPv6

No, it is not an implementation issue. It's not that your individual devices can't have their own port 80s, but that only one thing can receive packets directed to your only public IP's port 80. You can implement several ways to have traffic sent to different internal devices, such as:

1. Direct your traffic to one server which reads the request and sends it to whichever machine can handle that request.

2. Have a machine acting as a load balancer across multiple internal devices.

3. Have different ports forwarding to your devices and include those in the links you give to users.

4. Implement a custom protocol which includes a specific device identifier with every packet and make sure that whatever is talking to you speaks it and your networking equipment understands it.

What none of those solutions does is let you have a single IP and port, sent to one of multiple independent devices, because that is not possible. It is not possible on IPV6 either, and the reason that it can handle this is that you have enough addresses that anything you want to be publicly contactable can have its own address and all the ports to itself.

doublelayer Silver badge

Re: IPv6 network topologies are a godsend

And what kind of block did you have in the 1980s? I'm guessing you had no scarcity problems because that's when individual companies were getting /8s or /16s. It's really easy to assign addresses in a network like that. What's harder is assigning addresses to a country that only gets /24s because all those big blocks already disappeared. I think the record is St. Lucia, which in fairness, is a pretty tiny country with only 150k people living there. They get one /24.

doublelayer Silver badge

"So I should basically be able to assign myself an IPv6 address and the chance of a collision with someone else's address is remotely minuscule."

You have two choices:

1. Get a normal IP block, which you'll get automatically if your ISP supports IPV6*, and assign yourself an address inside it. The chance of a collision is zero unless your ISP screwed something up, and if they did, you'll find out quickly and you'll have someone to complain to.

2. Assign yourself a random IPV6 address and your chance of collision is very small indeed. Your chance of actually getting any traffic is also pretty small, since that's not your address and the routing tables know it.

* Generally, residential ISPs give a /64 to the average customer and larger blocks, /56s or /48s are common, if you ask for a dedicated block.

doublelayer Silver badge

Re: I have one major worry about IPv6

Yes, they are directly reachable, but you have to keep several things in mind:

1. If you have a firewall, they're as secure as your IPV4 addresses. You probably have a firewall.

2. If you have a firewall, but you have UPNP turned on, then your IPV4 boxes are punching their own holes in the firewall meaning they're more directly reachable than the IPV6 hosts are.

3. Finding and harassing a random address is a lot easier for IPV4, where I can sweep every address in ten hours from one machine or five minutes from a botnet than IPV6, where your incoming pipe is most often the limiting factor to a random or sequential search.

NAT has often provided a basic firewall-like service to people who won't set up their own, although UPNP makes a lot of it worthless, but it is certainly not required. If you know why NAT was sort of helping, you know all you should need to to set up a basic firewall or at least check that you already have one, and you should take that step. The rest of people is why a lot of network hardware has firewall software on it, usually set to a basic config anyway.

I have an NAT setup over IPV6, which is intended as a privacy measure because it mixes lots of devices' traffic from one outgoing address which changes on a cycle. That isn't proven to help, I just thought it might and had some time to write the rule, but it also doesn't provide any security that I didn't already have with my firewall. If you prefer that method, you can have IPV6 and NAT together.

doublelayer Silver badge

In the whole address space, there are 2^n /n blocks. There are therefore 4096 valid /12 blocks. However, some of those are already assigned for local usage, some are assigned, and some aren't part of an open block.

Also, Huawei did not get a /12 block. APNIC got a /12 block. They then gave Huawei a /17 block inside it. In the whole address space, there are 131,072 of those.

doublelayer Silver badge

"I dimly remember that baryonic matter is estimated to be around 2^88 particles."

Where did that figure come from? I'm not sure it's correct. For example, the sun's mass is approximately 2*10^30kg. That's 2^101 kg. That would make for some very heavy particles even without including any other stars. Having searched for the information, I think you might have used this article which comes up with a number of 10^80 (2^266).

It's also annoyingly vague about what a particle is, as I am not a physicist. For example, is a neutron a particle? If it is, do the proton and electron that make it up not count as two particles? If not, will they when the neutron comes apart? When that happens, does the proton count as one particle or are we going to count the quarks and gluons?

doublelayer Silver badge

Re: Good for Huawei

I'm not sure I understand what your suggestion is, and I'm not sure your suggestion would work at all, and I'm not sure your suggestion would be a good idea even if it did work.

"Huawei has 18 regions ? Each region could use the full IPv4 range and, with NAT translation between regions, business is done."

The article says they have 39 regions, but I doubt it matters, so let's ignore that. So if I'm understanding your plan correctly, and there's a possibility that I'm really not, we're going to let all those regions use all 2^32 IPV4 addresses, minus some outward facing NAT endpoints. Just using the 10.0.0.0/8 block isn't going to be large enough. In that case, what happens when a customer is assigned the internal IP 104.18.4.22. How do they identify whether they're trying to access themselves or The Register (that's one of their IPV4 addresses)? For that matter, how do they identify if they're going for that address in a different cloud region? I understand how you can encode that into something the routers will interpret and redirect properly, but I don't understand how you identify it in the first place. Every server and application would need to know that there are at least three things any IPV4 address could mean: this region, the internet, or a different region which needs to be identified. Huawei-written software can be given a special address struct to do that, possibly just an 8-bit integer identifying the region or the internet attached to the normal four-byte address, but that won't work as well for user-written software. Software people buy in is going to have an even harder time of it.

Even if you did that, what would happen for all the machines accepting traffic that hasn't already been set up? NAT works well enough if you only open out, but a lot of those devices are the ones that people are opening out to, meaning they need to have somewhere to accept connections. A single IP can only host 65536 services before running out of ports. It's likely that any server will have more than one of those, as even a basic HTTP server generally has three (HTTPS, HTTP, and management, usually SSH). Lots of things use more ports than that, including internal devices making up the network. Is this really better than IPV6, and if so, why?

No, I can't help – you called the wrong helpdesk, in the wrong place, for the wrong platform

doublelayer Silver badge

Re: Warren's big mistake

Yes, it does, but in very general terms. Selling that number, even though they have a legitimate reason to have it, would be a GDPR issue. Giving it to every colleague of yours might be an issue but might not reach the bar. Using that number to let your manager call you when you are an employee is exactly why they have it. GDPR is not specific enough to distinguish excessive contact from normal contact and is the wrong law to try to use in that situation. For that, you will need something that explicitly defines it, such as a right to disconnect law if you have one or general employment law otherwise.

doublelayer Silver badge

Maybe this person had more reasons to expect calls out of hours. My phone remains on overnight. It never rings then normally, but if someone I care about does call, they likely have something bad going on that they need help with.

doublelayer Silver badge

Re: "They also didn't understand time zones very well."

I've seen that, and not just from Americans and Canadians. For example, a British person setting up a meeting for a time in GMT even though the UK was in summer time at the time. Fortunately they used the GMT label and not UTC, because if they had said UTC I probably would have believed them and used it.

doublelayer Silver badge

The problem is that there can be a fine line from a normal thing I'm happy to help with to people taking liberties that are causing problems, and it's not always systemic. As I said in a different comment, I have been fortunate that most jobs I've had have not abused their access to my personal contact information, which is why my colleagues tend to have mine.

However, I have had the problem with things like email. For example, when I wrote and maintained a piece of internal software, people could email me with support requests and I would be happy to answer them. Most users did this rarely, and in that case, I didn't object much even if their question could be solved without my help with the documentation we already had. A small number of users, however, decided that I should be emailed every time they had any question, no matter how minor, and that if I didn't respond quickly, they should just send more emails. That kind of thing can cause several problems. It wasn't my manager or my team. It wasn't even very many of the users. It was just a few people causing problems for everyone else. The risk with answering the odd call is that you suddenly get more odd calls.

doublelayer Silver badge

Re: Warren's big mistake

"If you're supposed to be on call and contactable by the company whenever, you're either high enough up the pecking order that your salary justifies this sort of thing, or you're paid to be contactable."

Or it's just expected, which might switch from reasonable to not reasonable very quickly. I've had several jobs where I could theoretically be on call any time of the day or night, and they did not run this by me beforehand, but so far, these have not actually called me in in the middle of the night so I've not complained.

Also, the HR database wouldn't be an automatic GDPR fail depending on what "unprotected" means. If it means that they didn't bother to have any access controls or to encrypt the data, yes, that's a GDPR problem. However, neither of those are necessary for your manager to use it to get your phone number, as that is data they would normally have a legitimate reason to access, for example if they need to contact you because you haven't been online for some time. It would be very difficult to make that a GDPR issue, as the problem is their abuse of the number, not their access to it in the first place.

doublelayer Silver badge

Re: Warren's big mistake

I agree, though I have so far been willing to let them send normal voice calls, SMS messages, or OTP codes to my personal device. Anything more than that and they can buy a device to do it. Their IT department gets no administration rights over any personal device whatsoever. Fortunately, I have never had that particular contact method abused by managers.

Amazon accused of cheating low-income Prime users out of two-day deliveries

doublelayer Silver badge

Re: Wait

You are correct. I found recent unemployment figures for the codes (they change a lot, but these are from 2024) of 15.5% and 15.8%. Those are quite high numbers, but that still means 84% in work.

doublelayer Silver badge

Re: This lawsuit is bravo-sierra IMHO

The problem, again, is not that Amazon decided that they weren't willing to provide the service. The problem is that they decided they weren't willing to provide the service, didn't tell those who paid for the service, continued charging customers for the service, and continued to claim that the payment was in exchange for the service they weren't providing. You are in a similar situation, apparently. If they promise something and, through their own fault fail to provide it, then they are short-changing you. If an ISP tells you that your line has 100 megabits per second but the highest you've ever seen is 23, they need to fix it or they're committing fraud. If they can't, they are perfectly able to cancel your service, relabel it as 25, and try to sell it again with the lower price that will likely be necessary for the lower speed. The same logic works for shipping times.

doublelayer Silver badge

Re: Exactly what the AG is doing

They may know about the thefts, although you're being rather extreme by blaming all the residents for crimes committed by... well presumably some of the residents but you haven't even proven that. They may not be aware of Amazon's responses to the crimes, because as the article demonstrated, Amazon didn't tell them this directly. For those who are actively stealing, the message is clear: don't have Prime, because you can probably steal enough to outweigh the benefit you would get from a Prime subscription. For everyone else, you're not only punishing them for things they didn't do and can't stop others from doing, you're also justifying charging them for the punishment. Would it be fair if companies started doing similar things based on the actions of someone who lives near you?

doublelayer Silver badge

Re: Exactly what the AG is doing

And, in that case, they can tell you about restrictions. It's not the restrictions themselves that this complaint is about as much as not informing people of the existence of the restrictions while charging them for a service that would normally remove those restrictions.

doublelayer Silver badge

Re: Wait

I suppose if they don't have retail near them, online shopping may be the cheapest way to buy things. If that was the case, Prime might be more cost-effective* for people who are placing a large number of low-value orders compared, for instance, to me where I place on average two orders per year above the free shipping limit and don't care about waiting longer for them to arrive. It depends how easy it is for people in this area to get to an alternative shop with comparable items and prices.

* If you actually get the fast shipping they advertise, that is.

Cops arrest suspected admin of German-language crime bazaar

doublelayer Silver badge

Re: Criminocurrency

Bitcoin is similarly hard to spend as gold is. I might be able to find some people willing to sell me a house for some Bitcoin, but probably about the same number as those willing to sell me a house for gold. Every other house I might prefer will want cash. Fortunately for me, if I have either gold or cryptocurrency, I can sell it with relative ease, get some cash, and use that cash to buy stuff. There might be some money laundering required to put the cash into a bank account, but that doesn't differ depending on what form it started as.

Transferring gold or cash is harder than transferring cryptocurrency, but not so much harder that criminals haven't done just fine with it. This works pretty well at the small end, where small amounts of cash can be sent through the post (for markets like this, the things people are buying are also sent through the post), and at the large end, where many criminal organizations have set up special systems to manage mountains of cash. Some parts in the middle are the most challenging. Still, they've done it for a long time and, if they somehow lose their preferred tool, they can go back to it.

doublelayer Silver badge

Re: Criminocurrency

Tell me, for the first time apparently, who claimed it isn't? Of course cryptocurrency is used by criminals. What you probably heard before is that cryptocurrency isn't only used by criminals, and if that's indeed what you heard, it was correct.

British hospitals hit by cyberattacks still battling to get systems back online

doublelayer Silver badge

The vagueness of the language leaves open the possibility that this did stay within the bounds of approved conduct, I.E. learning offensive security from others and applying it on machines where testing had already been approved. However, the vagueness (specifically, things like "after I had managed to hack it then I was able to prevent all the hacking") mean there are several other options, including that basically nothing happened at all.

The original point is sometimes valid. People who are employed to work on security often find that either management has an existing plan for what they're supposed to do or restrictions meaning they aren't able to work on certain areas. Properly securing a system that already exists and spans lots of different groups can be a very difficult task in ideal circumstances, and circumstances are often very restrictive and painful.

Wubuntu: The lovechild of Windows and Linux nobody asked for

doublelayer Silver badge

Re: ChromeOS looks nothing like Windows ...

People don't object to it because it does look a lot like Chrome if you only use the browser, and most users will not be using the rest of the things Chrome OS supports because they either don't really work or they only make sense for technical users. It does look familiar to users who already use browsers most of the time anyway and can quickly grasp the idea that this is only a browser.

doublelayer Silver badge

Re: Some use cases

Yes, which makes a lot of people resist updating Windows until that causes problems. Which also means they will sometimes resist Linux similarly strenuously. I'm not sure whether a UI that looks like their version of Windows will trick them into not complaining about Linux, but I can see why someone thinks it's worth a try.

Judge again cans Musk's record-setting $56B Tesla package

doublelayer Silver badge

Re: Musk should quit fighting this

"As I understand it, the agreement between Musk and Tesla depended on Musk meeting some performance and valuation goals that were, at the time of the agreement, thought to be somewhere between wildly aggressive and impossible."

The problem seems to be that there's not an agreement about whether those goals really seemed impossible at the time because the people who set the goals were Musk's friends doing things that Musk asked for. It would have been easy to find something that looked more impressive than it was and then set that as the criterion for reward. Figuring out whether that happened is more difficult now that we have hindsight and can see that and how the objectives were achieved, which is why the conflicts of interest among board members are an issue here. From all that's happened so far, I think Musk will be getting lots of stock now and through the future, so this may be a mostly moot argument about how many months he has to wait before he can get it.

GitHub's boast that Copilot produces high-quality code challenged

doublelayer Silver badge

Re: What will it mean to be a....

I don't think "subnets should be sized in powers of two" was trying to argue against /25s, since the smallest IPV4 subnet you could create if it was would be a /16. I think it was making the equally useless point that subnets should contain 2^X addresses, for example your /25's 128 addresses. Otherwise phrased as "you shouldn't create subnets that are impossible to create" since a /25.356 for 100 addresses isn't generally supported.

doublelayer Silver badge

Re: Why Python?

Probably to make simple tasks, the only ones their bot does well most of the time, something a person is willing to write for a study. Python has several downsides, but one advantage of it is that there are various simple tasks that don't require lots of basic plumbing code to get working right. Reading in a json file can be three lines because there is a json parser in the standard library and you don't have to be too specific about types (which can be annoying for larger tasks but speeds up smaller ones a lot).

doublelayer Silver badge

Re: What will it mean to be a....

"However, the OP asked what would happen if laymen started using those tools - which IMHO implies a scenario in which they actually work as intended by the user, without hallucinations."

I don't think that's correct. People use things that are not perfect all the time, and sometimes it makes sense to do so. For example, let's use their own example of accountancy. I am not an accountant. I have not taken an accounting course. Yet I have learned a lot of the basic terms and can avoid doing the most idiotic things. Someone who employed me to manage their finances would not be making a good decision, but while their needs remained simple, it would probably work. The problem would come when they needed something more advanced and I either failed to do it or tried and demonstrated my lack of skills. Still, for someone who didn't have the funds to employ an actual accountant, someone with my level of knowledge might be good enough for something simple.

I think the same will apply to LLM-generated code, with the slight mitigating factor that the quality is more random. If you choose the right model/specific layer above a model, one like GitHub Copilot that was specifically designed to generate code rather than one like ChatGPT which can generate stuff that looks kind of like code, you can get valid code for some simple programming problems. As long as that is all you need, you may get what you want. When you start needing things that are more complex, the models break down, and by relying on them instead of having someone who knows what they're doing, that invalid code is going to run and possibly cause damage. One major difference between this and the me as an accountant scenario is that, if I was somehow employed as a cut-rate pseudoaccountant, I am likely to identify when something is well beyond my area of knowledge and refuse the task. That means that the business needs to be most concerned with tasks that are slightly outside my area but I might be stupid enough not to recognize this, but they don't need to worry as much about big things because I will point out I don't know what I'm doing. An LLM doesn't do that, so no matter how ridiculous the assignment they're given, they'll produce some kind of code. As soon as people start asking for things that connect to systems, chaos should be expected. That's just the most immediate and obvious version of chaos. A lot of other options are worse.

Open source router firmware project OpenWrt ships its own entirely repairable hardware

doublelayer Silver badge

Re: So WiFi only for client connections. Really?

In my experience, yes, they can get close to the throughput depending on whether you've put extra load on the CPU. However, I only use OpenWRT equipment for home networks and I use relatively capable hardware. That means my point of comparison is often to the other cheap boxes supplied by ISPs or easily purchased on Amazon, not to managed hardware that offices use. I also have never had anything faster than gigabit for my internet connection, and I have less than that now, so at best I can say that my OpenWRT hardware from five years ago was indeed able to push packets at gigabit speeds when the rest of the path could take them. There are devices that people run OpenWRT on to extend their security update lifespan which will be limited by still having a CPU from 2010 in them. Those will almost certainly not be able to do the same thing.

doublelayer Silver badge

Re: So WiFi only for client connections. Really?

It's not only WiFi, as there is one LAN port in addition to the uplink and you can always connect a switch to it. Most of the OpenWRT devices are intended primarily as WiFi APs. I do find that a little disappointing, but I'm not very surprised they've chosen to do it that way. It's less convenient for my home use, but it wouldn't have as much of an effect on someone using them as individual APs on an existing network, and I'm guessing that was one of the groups they thought a lot about.

Note: Although they've labeled the 2.5 port as WAN and the 1 GB as LAN, nothing makes you do that. You can swap those in the case where you have faster internal hardware but don't have an upstream connection that makes use of the 2.5 Gb speeds.

doublelayer Silver badge

Re: So WiFi only for client connections. Really?

I generally find that those are good as long as there is a native build for it. I don't like their interface even though it has a number of conveniences built in that take manual configuration from a stock version, but if you can flash that stock version, it also means you're likely to get updates for a long time.

Musk seeks injunction to stop OpenAI morphing into for-profit company

doublelayer Silver badge

Re: A capped for-profit arm ?

It can sometimes work. For example, Raspberry Pi, the charity, owned Raspberry Pi, the for-profit company that made the computers. That company made its profits, and the charity got those profits and chose what to do with them in a way that didn't involve paying it to shareholders. Now, they've decided to sell off some of that company so they get less of the money every time but they still get some of it, and the investments from others in the now public company means they can probably make more things which means more revenue for the foundation.

However, I don't think OpenAI is anywhere close to this. They started themselves as a nonprofit in order to attract people who had concerns about ethical problems related to AI research, and they probably never really intended to live with that if they could get lots of money, the same way that they keep firing and ignoring anyone who suggests an ethical problem might exist. I don't think Musk is doing any of this for any ethical reason, nor am I certain that he has the standing necessary to make anything happen, but some of his complaints are factual.

Tech support chap showed boss how to use a browser for a year – he still didn't get it

doublelayer Silver badge

Re: "learnt many things about how not to run a company"

Of course there are many incompetent politicians. My point was not that they are competent after all. It was that their incompetence is not why the countries aren't dictatorships. Similarly incompetent people have become dictators. Much more competent people have at times partly run democracies without taking them over.

Putin probably does consider himself a success with a couple decades and counting of massive dominance. Not every dictator has even gotten that. Some of them were not only incompetent at running their country for its citizens, some of them were so incompetent they couldn't even manage to sustain their power very long. I consider that threshold to apply even if they lasted several years if, at the end of it, they ended up killed or imprisoned.

doublelayer Silver badge

Re: "learnt many things about how not to run a company"

Of course every dictator has a lot of help on the way up. However, I can give Putin some credit for building his new dictatorship even though the pieces to do so were all there around him. Someone without his background would probably be unable to manage it, but a lot of people with his background couldn't have succeeded either because it took an eye for detail and an ability to manage loyalty and betrayal with a fine touch. As dictators go, I have to give him more credit than most, if only for correctly employing his various assets in a way that lots of others didn't do.

doublelayer Silver badge

Re: "learnt many things about how not to run a company"

That's not usually caused by better managers. It's caused by missing or broken controls on the rise to power. Dictators who manage to self-build their dictatorship, E.G. Putin, tend to have some level of competence in order to accomplish that, but dictators who simply get one, E.G. Kim Jong Il, can be as incompetent as they like.

The success of democracies is not that the people in power were too incompetent to take over. It is a combination of those people not wanting to take over, institutions stopping them if they tried, and voters being smart enough to detect the most dangerous and not let them in. Many dictators, even those who managed to get power in the first place, were completely worthless at running their countries afterward. Sometimes they managed to last a long time nonetheless by killing people who threatened to do a better job.

doublelayer Silver badge

Re: "learnt many things about how not to run a company"

I tend to disagree because most software certifications I see do not provide any useful skills checks. They are often tailored to some specific skill, test something that's easily scored but not very related to the difficult to score work actually involved in writing software, and mostly act as gatekeepers from some organization that will use its ability to decide whether you can get a job to extract as much as they can from the people doing work. If I were considering paper requirement, I would consider a degree from a programming curriculum that I can verify more highly than certification, because that takes years and teaches a lot of different skills. However, there are people who have all the same skills without the degree, and they should also be considered. A certification doesn't demonstrate that to my confidence, so without any better alternative, I would end up testing them myself.

Abstract, theoretical computing qualifications are turning teens off

doublelayer Silver badge

It depends what you want students to gain from their studies. If you only have a little time to teach someone to program, you want to give them enough information that they can decide whether they're interested in learning more and ideally enough information that they can do some useful stuff. If you get to have a programming course every year, you can cover lots of useful things, but not everything is or is considered important enough to get that much of a student's limited time. If it ends up being a half-year or even a single-year course, some things have to be postponed to the next ones. Various bases generally get covered briefly in mathematics. Covering it again in introductory programming isn't very useful if you spend a lot of time on it, because almost all introductory programs and a large number of more complex ones don't require the programmer to directly use either of those. It will be covered later when they're using it directly and you won't get a computer science degree without knowing it, but that doesn't mean it needs to be done first.

NHS major 'cyber incident' forces hospitals to use pen and paper

doublelayer Silver badge

Re: Total Barstewards

The explosions of the pagers required deliberately-installed explosive materials. You cannot cause that kind of damage or injury with a battery. At most, you can create a nasty fire and hope the holder of the device can't throw it away immediately. Most of the time, you can't even do that as the battery safety mechanisms will disable things when they get sparky and can't be deactivated via normal hacking. Normal hacking could possibly have broken some pagers, but they needed to build their own custom pagers and get them into the hands of people they wanted to hurt in order for the explosions to happen.

Arch Linux installer now slightly less masochistic

doublelayer Silver badge

Re: Dumbing down

That might be the case for Arch, since its live installations tend to boot to a shell directly. That problem has cropped up for other CLI installations that don't start up a shell first. Other TTYs might not work if the environment isn't processing the key commands that normally access alternates. Even if they do, if the environment I'm in doesn't have a shell running or doesn't have utilities I'd use to find information, then I'm also stuck. That's why a lot of installers provide information about the thing they're asking you to select.

doublelayer Silver badge

Re: Installation has to be easy

Exactly. From the position where you know everything about what you're doing, an installer isn't very important, but not that many people are in that position and those who are are already scripting it. For those who remain, a GUI installer is more convenient for some users and, if it is as powerful, it's often no less convenient for those who would be comfortable with the CLI. Thus, the people saying that a GUI installer is advisable have a point and should not be dismissed, especially with incorrect claims of "dumbing down". At most, the argument could be, and in my case is, that the lack of a GUI installer isn't a big deal for me personally. That isn't a very convincing argument for any broader point, though.

doublelayer Silver badge

Re: Dumbing down

It depends a little on who is running, but not as much as your comment suggests. Let's consider the part where you'll possibly erase and partition one or more disks. Let's also say that you have something else running, for the sake of simplicity on another drive. When you get to the point in the installer where you specify where it is supposed to install to, which partitions it should use, and what it should create, how do you select that? For a lot of users, the GUI is the way that makes sense and anything else doesn't. CLI tools would just confuse them and mean they can't install the OS, so they won't use the OS, so developers who are targeting them won't build for the OS, and the OS is less successful than it could be.

But who cares about those lusers anyway. We don't need anyone who doesn't have at least two terminal windows as soon as they log in. We only need an installer that works for us. Great. I live in the CLI a lot of the time and I'm quite familiar with the tools to get information about and modify disks and partitions. So I run the CLI installer, it gets to the part where I specify that information and I ... well wait a minute. I would know what to do if I dropped to a shell and could start executing some commands, starting with lsblk. That shell isn't an available option right now because I'm in the installer. I don't have multiple windows, and if I exit this, I have to start from scratch again. So what happens is that I have to start an Arch environment, get a shell, find all the information I'll need during installation, write that down somewhere, then enter it during installation. At that point, why shouldn't I just script this; it will mean less risk of typos at any rate.

So who needs an installer. Anyone who uses a CLI installer is just dumbing it down from the script they should be writing. Amateur idiots, all of you. Is that approach helpful? A GUI installer is not dumbing anything down from a CLI installer, assuming they both let you do the same things. It's just presenting exactly the same options in a different form, and a form that may reduce complications, allow users to configure their installation more quickly, and attract others to using and therefore benefiting the software.

Australia passes law to keep under-16s off social media – good luck with that, mate

doublelayer Silver badge

Re: You make it sound that Oz is unusual

This site is mostly read by people in countries without licenses. A lot of the readers are in UK, Canada, or the US, none of which have an ID requirement. Many others are in European countries, several of which (E.G. Ireland, Netherlands, Denmark) don't have a requirement. Even Australia's closest neighbor, New Zealand, doesn't require it. So while you are right that a lot of other countries do require it, it's not that odd that most of the readers here have lived somewhere where getting a connection was as simple as paying the money.

I prefer it that way and don't see sufficient benefit to adding an extra verification and reporting step. If a country I was in wanted to institute one, I would oppose it and try to stop it. If a country I was in was considering removing their requirement, I would be happy. The fact that many countries have decided to do it doesn't change my mind.

Raspberry Pi Compute Module 5 cranks up the power – and the heat

doublelayer Silver badge

Re: Not for me

Where does the username and password requirement come in? Normal tools will restrict usernames to lowercase, but numbers are fine, and that can be overridden if you want to. Passwords have no limits at all. What were you doing that limited either of these?

Starlink gets FCC nod for space calls, but can't dial up full power

doublelayer Silver badge

Re: The FCC does not regulate the spectrum globally!

The satellites don't cover enough of the surface to interfere with UK signals since the LTE parts would be disabled when not in view of countries where they are licensed to use them. Canada and Mexico, at least those parts near the border would be less fortunate.

doublelayer Silver badge

Re: I imagine Trump's FCC will do what Musk wants

I didn't offer that as a justification. I offered that as an explanation for why Starlink wants the limit increased but other satellite networks don't need it.