* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

It's true, LLMs are better than people – at creating convincing misinformation

doublelayer Silver badge

Re: 676 sites (!)

"Embed top level domain reputation filters into browsers. Allow low reputation TLDs for experimenting developers, but keep them out of reach unless the filters disabled explicitly."

That won't do anything. to stop people from just putting their junk in an older TLD. I can get a .co.uk for pretty cheap. Sure, the name will be less clear than if I use the word of my choice because someone probably registered all the nice .co.uk domains already, but if you're blocking other TLDs, it can be managed.

Making the registration difficult doesn't help either. It might do something against scammers who like to quickly spin one up, run their scam site for about five days, then try to get a refund from their registrar, but sites intended to have misinformation stick around for a lot longer. It's also pretty easy for operators to just set up a bunch of domains, park them, and bring them online when they've got something for them to say.

Fairberry project brings a hardware keyboard to the Fairphone

doublelayer Silver badge

Re: The Blackberry Passport...

Which, so far, I oppose for the reasons I stated. I have yet to see anyone explain how any of this is done without breaking most or all of the reasons why multiple messaging protocols exist. I thought that Liam, having expressed interest in the concept and having some technical experience, might have an answer to this. So far, if he does, I don't understand it.

The law as it's currently written basically just calls for this to somehow happen and doesn't explain how or give any criteria. As far as I know, nobody is taking steps to make it happen, and there is a distinct chance that they won't be able to manage it while keeping encryption working. I doubt that was the intended goal when the law was drafted, but I also doubt that the theoretical loss of end-to-end encryption will bother those who passed the law very much. It would bother me, which is why I'd like to see a suggestion on how to keep it and the various other advantages or the requirement reversed. I don't have a good solution myself, so I posted in the hope that someone else had thought of one and could convince me.

doublelayer Silver badge

Re: The Blackberry Passport...

However, if you're not clear, then both projects fail to meet your standard. Exchange is breaking compatibility by not including the rich message whatever it does, and Thunderbird is failing to be compatible by not supporting it. In this case, I think it's more Thunderbird not supporting it than Exchange not sending it, but I don't know for certain. If you ask for interoperability, I see two ways of doing it:

1. Everything must support the protocol of everything, which either means that I cannot introduce new features because it would break compatibility with anyone else or that, if I do introduce new features, everyone must adopt it. It sounds like neither of us want to do this.

2. Everything must support some standard communication system in addition to whatever protocol they were built for. You can do this, but what's the point? Anyone who uses it is presumably using it for its unusual features, which will be the reason it has a protocol other than the standard. If they just wanted another XMPP client, they have a bunch to choose from. We might as well make that standard email and tell every chat system that they'd better bolt on a mail client. Those systems having the feature won't make anything easier for the users.

doublelayer Silver badge

Not the way I would do this

I admire the work that goes into something like this, but I have to wonder if the work might not be better spent making a different keyboard rather than using a specific model from an old device. I don't imagine that many Fairphone users happen to have that particular Blackberry around, and they're not cheap and plentiful on the second hand markets. This board will, for most users, provide them the ability to connect something they will never have, and that will only get worse if they do extend this to other phones.

Other open hardware projects have built their own keyboards, and I wonder if it might make more sense to try to do that or find a part that's currently in production. The creator of this hardware may be doing it because they do have such a Blackberry available to cannibalize and might not be focused on the ease for others to adopt it, but they've gone to a lot of effort that I'd like to see pay off.

doublelayer Silver badge

Re: The Blackberry Passport...

"This is why, incidentally, I want to see all messaging vendors legally compelled to be open to existing open standards and allow connections from 3rd party client apps."

Well that's an interesting request. How do you intend your system to deal with the situation where someone makes a new chat app because they want to offer some feature that's not supported by whatever open standard you've selected? That feature could be a lot of things, from a different format of media to a new encryption strategy. Most of the apps in your list were originally made to add some new feature that previous chat systems lacked. You could deal with a few of these by embedding more and more information in the message, and old clients just dumping unsupported messages out as text. That would work for a few things, although it's not pretty. However, for anything where the architecture is substantially different, for example if they change the routing mechanism to something decentralized or start using asymmetric encryption with user-provided keys, that won't work either. So far, I have opposed similar requests because I don't have a good solution to this problem and I don't want to lose the benefits of new systems. Do you have an alternative?

Elon Musk's brain-computer interface outfit Neuralink tests its tech on a human

doublelayer Silver badge

Re: Why don't people see the bigger picture?

Their argument was not whether the technology could be significant to someone, but whether it is "the holy grail of human-computer interface design". There are a lot of technologies that are very useful to some people which mean little to others. Acknowledging the lack of general utility does not diminish its transformative effect on those who do require it.

doublelayer Silver badge

Given that we don't know exactly what software they were using or what actions the monkeys' brains were activating, and that this is a person whose companies have been accused by employees of faking sales videos before, I would take that particular demonstration as perhaps not indicative of the product you get.

Japanese government finally bids sayonara to the 3.5" floppy disk

doublelayer Silver badge

Re: What you are all celebrating...

You are mistaking two things. The first is that we're not celebrating it. I'm not mourning at all, but there is a middle area between sadness and celebration.

The second is more important. No longer using something obsolete is not erasing, dumping, or losing that thing. We have floppy disks and drives in archives, museums, online shops, all over the place really. We also know how they were manufactured such that, if we decided it was worth going into production again, it could be accomplished. It's not happening because there's no point, not because we can't. There is no benefit and some harm requiring people to use something ancient for a historical purpose. It won't prevent companies from no longer manufacturing floppy disks, but it will increase the cost and inconvenience of anyone who had to submit forms that way. It is also a good thing that you're not required to drive a Model T to get your passport, whether you decide to maintain one or not. There are many old things that we don't consider worth our time to maintain, and that is not automatically a bad thing.

doublelayer Silver badge

Re: Less "connected" means less likely to be hacked and randsomed.

What makes you think that the system that took in data on floppy disks had no network connection? Lots of systems had networking and floppy drives. Fewer systems had networking, floppy drives, and an application that was written with security in mind. I'd be more worried about how old the software that was used to process the floppy-provided files was, because if they didn't update the hardware requirements, they may not have changed the software. Keeping in mind that the software was probably written in a time when, even if you did use encryption, it was something that can probably be cracked in seconds nowadays, I don't think my concerns are groundless.

Microsoft's vision for the future of work is you trusting Redmond to get AI right

doublelayer Silver badge

Re: Doh!

You can disable it entirely so it can't be activated without enabling it again. I'm not exactly sure what "nuke it completely" entails. Do you want Siri to no longer appear in the Settings so it's impossible to turn back on?

Their point appears more general than that, though, since Siri is a frontend to a set of databases that are usually available in other places. Siri's contact information for businesses, for example, is the same ones you can see in Apple Maps as well. The problem is not the voice interface, but the incorrect data it occasionally returns.

doublelayer Silver badge

Re: US bias

That's what happens when you shove the entire internet into the training set and push the go button. These programs are not looking through the data to find out which things apply to your country, they're just guessing, and if there's more about the US in their training data, it's going to show up when it randomly looks for answers unless you've crafted your prompts to keep reinforcing your country name. Even then, it's not guaranteed to get things right, just more likely to. I'm hoping that people will eventually recognize that this cannot answer specific detail questions when those questions get past simple (I.E. whenever a simple search wouldn't turn up the answer).

Cory Doctorow has a plan to wipe away the enshittification of tech

doublelayer Silver badge

Re: Does old Cory know what he's talking about?

More that they were ridiculously obvious about it. While I'm sure people here have other companies they'd allege are making money by stealing, it usually takes at least one abstraction and has a contract in the middle. For example, Google makes money by stealing our data, but although I think that's true, they would argue that they have permission to get the data (I don't agree) and that they're only selling advertisements. Napster's business model was based around really obviously allowing people to download music they didn't have a right to download. They were only slightly less obvious about it than if The Pirate Bay decided to try to become big tech. You can't be that obvious about committing crimes if you don't want to get sued out of existence.

ICANN proposes creating .INTERNAL domain to do the same job as 192.168.x.x

doublelayer Silver badge

$25,000 US per year, $185,000 for each one created, and a per-registration fee for successful domains.

doublelayer Silver badge

".int sounds okay to me, as it's very unlikely to ever be requested as a new gTLD."

The problem is that .int is already a GTLD, one of the relatively early ones. It's for international organizations, and it's quite strict about it. For example, the official website for the United Nations is un.int. The EU has a few of them, but they usually redirect to something.europa.eu. In practice, it's not as likely to cause a problem as using some other existing domain you don't control just because it's quite difficult to get a .int domain so it's unlikely that any other system will exist and your DNS request will just fail, but still, not the best idea.

doublelayer Silver badge

Re: "DNS, however, can't prevent internal use of ad hoc TLDs"

Two reasons. Mostly that the land rush has come and gone. When lots of people were buying up names, there was more of a chance that that would happen, but many of those names have not proven to be the commercial blockbusters the investors were hoping for and they're busy hosting cheap domains for scammers and the occasional domain hack, but not even a fun one as was done with two-letter TLDs. Some of them have even been shut down entirely. I don't think people are still hoping to throw money into that.

The second reason is that ICANN already decided that some TLDs were not to be reserved. Back in 2018, they put several TLDs on the never list because some internal systems had used them. If .internal was already used frequently, I would expect ICANN to reject the application should someone try to reserve it after all. I don't have any objection to them doing this, but it's weird for them to make it sound like they've done a lot of work when they have no technology to set up.

doublelayer Silver badge

Re: "DNS, however, can't prevent internal use of ad hoc TLDs"

No, it's not, because they actually do use most or all IP addresses. If we hadn't reserved the 10.0.0.0/8 block, some ISP would have asked for and been granted it, and we wouldn't be able to use it. In addition, it's quite intrinsic to the way networks are used that IP addresses be available for local use without having to request them from someone else, and private addresses permit this.

Let's consider both aspects with the .internal name. Nobody has requested .internal, and it's unlikely anyone would given how many new TLDs have been issued. Any TLD that does not exist can be created without registration, will be dropped by public DNS, and can be filtered by internal DNS infrastructure.

doublelayer Silver badge

Re: "DNS, however, can't prevent internal use of ad hoc TLDs"

Theoretically, this could happen. Equally theoretically, they could already do this for any number of names. They could be configured to look for *.internal.companyname.co.uk and drop it. They could be configured to drop any internal domain the admins might set up and drop that. Either way, though, some admin will have to configure their internal DNS resolvers to know when they should be dropping requests that have not resolved yet and when to forward them on, and if they don't do that, the request will still go to the external DNS system. All this does is ensure that the external systems will reject it. However, since .internal didn't already exist, those external systems already would reject it.

doublelayer Silver badge

Re: "DNS, however, can't prevent internal use of ad hoc TLDs"

Not even that. ICANN has, over years of discussion, decided to take a name and do nothing with it. A name they already were doing nothing with, that nobody had asked to use, and in a set of other names they've already decided to do nothing with. When this idea is fully implemented, nothing whatsoever will change anywhere in the world.

doublelayer Silver badge

Re: I use....

It seems like a fine limit to me. We may not use anything that long, but having a lower limit wouldn't offer any advantages as far as I know. The 64-character limit also makes it possible to use some strange things, like the encoding of Unicode domains to ASCII. The longest domain name in use is .ファッション, which is in your expected range for length, but since it's in unicode, it's actually implemented as .xn--bck1b9a5dre4c. It's convenient that the limit makes that feasible, as a shorter limit would have required it to be truncated.

One person's shortcut was another's long road to panic

doublelayer Silver badge

Re: Genuinely curious...

I suppose you could try running your script in a chroot of the directory concerned, which depending on where the link was going might or might not prevent the program from going there as well. However, when you get to the point of involving chroot, you're also at the level where you could write explicit symlink logic. It sounds like this script had not gotten to either level.

doublelayer Silver badge

Re: Genuinely curious...

One option is that there was a script somewhere which used relative paths and moving the script somewhere else was harder than just linking in the data for it to work on. I've had the experience, in fact I'm having the experience right now, of a script that's not written well but it would theoretically be faster for me to work around its errors rather than going in and fixing it. For instance, a script I have which needs Protobuf and does not work with modern versions of Protobuf. If this were an important part of a system, it would make sense for me to rewrite the logic to use modern behavior, which shouldn't be too hard (I didn't write the initial version), but since I run it manually and on offline data once every six months, I just keep around an old copy of Protobuf in there.

Amazon calls off $1.7 billion iRobot buy, blames regulators

doublelayer Silver badge

I'm not sure it's an assumption. I think it's a stated opinion; he is stating that it's a fair acquisition and that regulators shouldn't have prevented it. Definitely an opinion, but not really a hidden one.

It's true that the statement doesn't give any reasons why it is a legitimate acquisition, but neither does your statement or those of others here state why you don't think it is one. The only explanation for why it's not is from the EU's statement. I somehow agree with them and still think they've gotten it wrong.

The problem the EU points out, that Amazon can restrict the online retail market in favor of its own products, is a real problem and one I think needs resolving. However, I don't see why it has much relevance to this particular product. Amazon can and, according to people who make products that Amazon's making as well, already do abuse their market position. That is a problem that will not be defeated by preventing them from buying a company that makes a different type of thing, so some effort should be spent punishing Amazon's manipulation and preventing them from doing it again. However, since Amazon doesn't make robot vacuums, buying a company that does won't, apart from that online retail argument, reduce the number of competitors in the market. On this basis, Amazon should be prohibited from buying any company that sells any product which could be purchased online. Compared to going after the abuse of their online market power, this seems like a bad plan for resolving it.

DEA nabs $150M from dark web drug lord based... in Coventry

doublelayer Silver badge

Re: the resulting property search led to the discovery of multiple cold wallets and recovery seeds

They didn't say that they had found all the seeds, just that they found some of them. It was probably just a search to get every hard drive and SD card in the place, then looking through each of them for wallet keys or seeds. Maybe the criminal had other ones stored somewhere, at least I probably would have tried if I was a criminal with that much wealth from it, but they wouldn't know that if the criminal had been successful at hiding it.

Linus Torvalds flames Google kernel contributor over filesystem suggestion

doublelayer Silver badge

Re: Linus being shouty is not really news

Leaving the realm of Linux entirely, I think you've misinterpreted the statements that led to this part:

"However, volunteers have the choice to just not volunteer anymore"

Yes, they do, which is why you generally want to stop that from happening. In many places where you have volunteers, they're not that easy to get and can be really important to whatever you're doing because, if you didn't have them, you'd either have to pay someone to do what they're doing or do without whatever they're doing. In most situations where there are volunteers involved, they are a major asset. Mistreating them can be even more harmful than mistreating an employee because the volunteer can usually just quit at a moment's notice, whereas the employee might hang around long enough for someone to apologize and fix things.

I know how frustrating a support call can be, but that doesn't change any of the harms that getting shouty can have. Even if it is entirely their fault, getting angry at them often will just extend the process. For example, in your situation, they could have accidentally called you as they were changing focus because the call system's interface makes that too easy, but they didn't know that they had done it. They were using headphones but had taken them out because they weren't on a call, meaning they couldn't actually hear you. Then they got your remote request, and having just talked to you, they accepted it because they didn't understand. A few hours later, they don't know what you're talking about with this second call idea because the call was ended without them ever looking at it. That is a possibility, and shouting wouldn't help to resolve it.

The pen is mightier than the keyboard for turbocharging your noggin

doublelayer Silver badge

Quote sounds wrong

I will admit that I haven't read the paper, only the article. Still, the part that they quoted sounds very wrong to me:

"As increased connectivity in the brain was observed only when writing by hand and not when simply pressing keys on the keyboard, our findings can be taken as evidence that handwriting promotes learning. Interestingly, the increased connectivity between the various brain regions seems to be linked to the specific sensorimotor processes that are so typical in handwriting,"

We have two suggestions that don't appear to have any proof. The first is that more connections means more learning. I don't think so. There are lots of ways to have lots of connections that don't involve memory or learning. You would actually need to test whether learning happened rather than saying that these areas activated, so let's assume that meant a good thing happened.

The other part of this is that the movements are linked to the increased connectivity, but that could easily be the other way around: the connections are present when writing, not because writing creates them, but because they make writing work better. For all we know, the connections are there so that the handwriting can maintain a consistent visual style which isn't necessary when you're typing and can change the font later. The point is that we can invent lots of possible reasons for that correlation to exist and, unless we have tested that sufficiently to eliminate other causes and establish a rule, it's supposition what the connections mean. They could test this by having people write stuff they already know, stuff that has nothing to learn in it, and stuff they are learning. Then they could test the former suggestion by actually testing whether people managed to achieve different learning results after writing in a different way.

Apple redecorates its iPhone prison to appease Europe

doublelayer Silver badge

Not at all. It's a matter of position. Your perspective may be basically the same, but your ability to control the situation is a major difference. The strongest prisons will not protect you if you are a prisoner. They're not meant to protect you, but protect things from you. The people running the prison may choose to protect you, but it's not intrinsic to the structure.

doublelayer Silver badge

Re: I, for one will not take 'advantage' of this

If they don't offer any non-app ticket options, they're already rejecting anyone who doesn't have a compatible phone. So yes, that might happen, but it's not like it's that new. I also don't think it's likely to happen because sideloading is confusing and that would prevent some people from buying tickets, so they'd like to decrease the difficulty as long as it doesn't decrease their control. Since Apple's store regulations don't prevent any of the things their apps do, I see little reason for them to want people to sideload them. Let's assume that I'm wrong about this and they decide to do it.

Their choice to do something inconvenient for you does not mean we should be barred from other choices. I'm a bit surprised that you're making an argument like that, since people can and have pointed out how the restrictions on apps create inconveniences for them, both users and developers, but you don't seem to think those are important. Why is your inconvenience any more important than their inconvenience? From a legal perspective, Apple's restrictions have an anticompetitive effect and ticket sellers, while quite annoying, generally don't restrict competition more by using an app, so the legal argument doesn't work in your favor either.

doublelayer Silver badge

I'm a bit confused why the discussion of what is a computer has come up so much. However, the distinction seems obvious to me: does it have an operating system capable of and intended for installing and running multiple applications not provided with the operating system? An iPhone definitely is. Your car and washing machine are not. If you wipe out the firmware of either and install what you like, then you can try to use them that way. The car may be capable of it, though it's almost certain that your washing machine is not able to be used that way.

doublelayer Silver badge

Re: I think I disagree, but I’m not sure…

So your definition of computer is "it's shaped like other computers"? An iPhone is a computer in every way. It has a general purpose operating system intended to run other software, with the facility to load that software at runtime (as opposed to baking it into the firmware in order to install). Its screen may be smaller, but why would that make it not a computer? It may also have a phone capability, but why would that prevent it from being a computer? Your definitions confuse me. I'm not sure that being or not being a computer is the relevant point here either.

Competition is decreasing in enterprise IT – and you’ll be poorer and dumber for it

doublelayer Silver badge

There is a reason they do that when they do, which I think you've overstated. They're requesting it because VCs tend to want the companies they invest in to scale really rapidly. Sometimes, that's a viable approach, sometimes not, but the VCs generally expect it. This means that, if you get a hundred times as many users next month as you have this month because you spent the money on a very successful awareness campaign, the VCs really want you to be able to handle that. If your infrastructure isn't up to the demand, it takes a long time to scale it up. You have to get equipment, configure it, and set it up, but perhaps more importantly, you need the space to store it, the ability to power and cool it, and those things take a long time to expand for a startup that probably has one small office, not their own private datacenter. Even colos won't be able to instantly provide a ton of space overnight.

A startup that can convince VCs that they can scale up without having to buy a bunch more infrastructure can probably get around this, but if that's not something the startup techs are willing to promise, then the investors will ask about using cloud for scaling potential.

Guess the company: Takes your DNA, blames you when criminals steal it, can’t spot a cyberattack for 5 months

doublelayer Silver badge

Exactly. If users deliberately use the same password for lots of services, there's little a service can do to prevent those credentials from being accepted. In my opinion, any safeguards should come after that point, for example asking for additional verification when unfamiliar IP addresses are used, but that comes with tradeoffs, such as including the IP addresses users have used in the past. This service sounds like it could have done some useful things, such as offering MFA, but I doubt that the kind of person who would simply reuse a password would be the type to enable it. I don't think issuing a username will help very much in this situation.

doublelayer Silver badge

If you do that, then users now have to remember their username. Either they get to set it themselves, in which case they'll pick one reasonably unique one and use it everywhere, or they all get assigned one by the service that makes no sense and they don't bother to remember it. In the latter case, you will have to include mechanisms to recover usernames which are not supposed to be secret information in the first place. You might as well just issue the user a password you generate if you're willing to go to that extent. On the bright side, it makes password stuffing difficult.

Standards-obsessed boss ignored one, and suffered all night for his sin

doublelayer Silver badge

Re: Needless!!

I suppose there's also the risk that it looks stable for a while, but the stress on whatever is now taking the weight eventually wears it and causes it to tilt further. I've seen it happen with wood, but it's probably much less likely with harder floor materials.

I'd think that the most obvious step is don't move racks unless you have confirmed that you should, and maybe don't do it late at night unless there's an emergency requiring it.

doublelayer Silver badge

Or, and this might be wrong but it's possible, the printer is too complicated?

I hate office printers and try to have as little to do with them as I can. This is especially true when the IT people have tried to set up something to make them easier to use, but it doesn't work. I've had the experience of trying to get a printer to recognize my credentials and print my document and it seems very unwilling to do so. I've had the experience of calling in my colleagues, also programmers, and none of us can. Maybe that's because the printer's broken, though it doesn't say so, but maybe we're all too stupid to understand the obvious method IT had in mind for how to turn this on. I start wondering whether I'm supposed to be pressing more buttons or if the server that's controlling print jobs is not working. Sometimes it eventually works. Sometimes it doesn't.

Most of the time, I'm using the office printer because I don't print much at all and I figure they can spare a sheet, so I don't build up the experience to know exactly what you have to do.

If you have a complex printer system, for example one with multiple printers you can send your print job to, some rule about where the printer you need to use will be which don't include some printers, and several steps when you physically get to a printer, and you write none of it down, don't act surprised when some infrequent users find this less than intuitive. Someone can get confused by that, and it's the configuration, not the printer, that caused the problem.

BOFH: Looks like you're writing an email. Fancy telling your colleague to #$%^ off?

doublelayer Silver badge

Re: cleaning alcohol

Oh, yes, they are. Think of the kind of detail you find in your job which you think is important, but others either don't care about or understand. There's no backup system, perhaps? Every time someone works with the large file, you're making a round trip to a cloud service on another continent and getting charged annoying egress fees, even though everyone who works with that file is in the same building? The code is running a large spaghetti function which will cause a performance bottleneck if you get three times as many requests per second, and usage has been increasing rapidly? Have you ever had to explain this to someone who really didn't want to spend their time understanding you?

The same thing can apply to accountants worried about some detail about tax filing or audits or even thinking that the company could spend less on something that's costing them. It doesn't mean that they're right, but neither is an IT person necessarily right about the things that bother them.

doublelayer Silver badge

Re: cleaning alcohol

"What is it that makes a man(or woman) become a beancounter? and what sort of courses do they take there? something that removes all emotions and empathy leaving a heart unbrideled by a conscience"

You know some people think similar things about us? Both accountants and techs tend to focus on one area with a lot of complicated and important details which the other people don't understand or care about.

Wait, security courses aren't a requirement to graduate with a computer science degree?

doublelayer Silver badge

Re: A purely theoretical curriculum

I thought the rest of my comment indicated that I meant "a theoretical curriculum in computer science as an undergraduate". Theology can do whatever it wants, as it usually does anyway.

doublelayer Silver badge

Me: "I don't know of many universities where you can take a purely theoretical curriculum"

Reply: "Oxbridge"

Well, I didn't go there, so let's see what they have. Taking into account the criteria written in my comment, let's take a look at Oxford's computer science course description:

This course in Computer Science aims to produce graduates thoroughly conversant with the principles of modern computing science, who are able to apply those principles in the design and construction of reliable systems. The course at Oxford concentrates on bridging theory and practice, including a wide variety of hardware and software technologies and their applications.

[...]

Practical skills must also be developed, and the majority of subjects within the course are linked with practical work which contributes marks towards the final examination.

[...]

In the second year, Computer Science students are required to take:

- the core courses in Algorithms & Data Structures, Compilers, Concurrent Programming and Models of Computation;

They have many optional courses that offer practical skills. You are not getting through this degree without learning some practical skills in programming.

Let's check Cambridge, just to be complete:

Practical work is undertaken and assessed in all years of the degree programme.

[...]

You take four papers, including three compulsory Computer Science papers - covering topics such as foundations of computer science (taught in OCaml), Java and object-oriented programming, operating systems, digital electronics, graphics, and interaction design - and the Mathematics paper from Part IA of Natural Sciences.

[...]

You take four papers, spanning core topics:

▪ theory – including logic and proof, computation theory

▪ systems – including computer architecture, computer networking

▪ programming – including compiler construction, programming in C/C++

▪ human aspects – including Human Interaction design, Artificial Intelligence

You also undertake a group project which reflects current industrial practice.

[...]

doublelayer Silver badge

I don't agree, possibly because my experience about what computer science degrees, at least the first degrees before postgraduate, intend to teach. In my experience, they do teach a lot of practical programming skills. It's not a full set of skills needed to be a good programmer in industry, but it's enough skills to be good at learning what you need when you are in that position. That's not the only thing they teach; there's plenty of theory involved as well, but they do teach practical skills and people do take them to learn those. If they are going to do it that way, I think secure design is important enough that it should be part of the requirements, not a separate choice to be trained later. This might be related to what I describe in a comment below that I've rarely seen computer science split into programming and a more theoretical version, so I assume that most other departments work the same.

The reason that I think secure design is required is that it's not really a design methodology. It's not an option to be picked from a set of choices, but a mindset you gain from knowing what can happen and what you should do to minimize the risks. You can design securely along with any other structure you plan to use, and the concepts involved apply equally well whether you're writing a videogame or low-level industrial control software. In either case, it consists of basic lessons like knowing how to look for vulnerabilities, knowing what likely ones are, and learning how to either prevent them from existing or block someone from trying to use them. It's true that it's very easy for people to design without paying attention to these, and there are cases where this can be somewhat excused if I grit my teeth and admit it, but those exceptions are a very small section of software produced and the consequences of ignoring it in all the other areas can be extremely bad. We could fix this with more security courses, or with more attention to it in normal programming courses, and the latter might actually be more efficient, but I do think we should fix it in the education step as well as the corporate one.

doublelayer Silver badge

I agree that specific product configurations shouldn't be in there, but should be in the IT security course, but there's a lot more to secure coding than the ways the language itself can have vulnerabilities. There is also secure design, which needs to be taught somewhere. Not just memory safety, but that you need to encrypt some data, hash other data, and be certain about the security of wherever you've stored it. They need to know how an attacker works so they can add the basic security precautions to their code. They need to know about information leakage so they can prevent having that vulnerability. Many of these things aren't about the tools they're using, but how they write their code.

I was taught all this stuff. Some of it was in security courses which were not mandatory, but at least some of it was included by professors who wanted to do this well. Still, those designing courses would do well to ensure it is there.

doublelayer Silver badge

I can't really agree there. There are lots of certifications for safety-critical software, as there should be, but there's a difference between licensing people to build something, licensing their product, and licensing everyone who does anything at all similar to it. Licensing the product is what they should be aiming for, and a certification of the people building that product can be a way of making it more likely that the product itself will be acceptable during that process. Trying to require licensing standards for all of programming is likely to end with a bad certification test which is difficult to pass and nonetheless doesn't tell you much about the capabilities of the student.

This sounds like the "programmers aren't engineers" cliche all over again, a cliche I believe to be flawed. It assumes that all engineers are like civil engineers when this is obviously not the case. The engineers building your consumer electronics don't need to have any more certifications than the programmers writing the code running on those devices or software with a similar level of criticality. They may be held to standards about security for the programmers or not spewing too much radio interference for engineers, but that's checked on the product and, unless it's quite extreme, only when it causes a problem.

I don't mean by this that security shouldn't get more importance in this. I think having security courses is a good idea, if only because I work in security and if I can stop dealing with the basic things people get wrong, that would let me work on more complicated and useful things. We also need to somehow stop people from ignoring all the lessons that get taught in good courses, whether those are about security, maintainability, or efficiency. I just think that adding a certification to this process won't make that happen.

doublelayer Silver badge

That's not the structure used by most universities. Usually, there is computer science, which teaches both theoretical and practical programming, and there is IT, which is separate. You don't often get to skip the practical parts when taking computer science, even if you do decide to become a theorist, and if you are pursuing that approach, you'll still find that most of your classmates intend to become programmers. Those are generally the two options. Sometimes, there is a split in computer science where some students take a mostly software approach and some others do a combination of electrical engineering and low-level software, but not always.

I don't know of many universities where you can take a purely theoretical curriculum, nor am I convinced that any of them should run such a program.

Wanna run Windows on an M-series Mac? Fine, buy a license, but no baremetal

doublelayer Silver badge

No, wrong again. I was saying that your statement, this one:

"Google will charge you 30% for apps and in-app products across the board. What do Play Store users put on their toast? :D"

Is factually incorrect. I then posted the evidence indicating that it has been wrong for over two years.

Nowhere in that did I say Google was good in all of this. I think Apple and Google are intentionally charging the same amounts and tacitly supporting one another's App Store monopolies (monopoly for Apple, near monopoly for Google). I would like to see both lose cases about this and be required to change their ways, and since Apple has more ways to change than Google does, for example offering third-party app installation at all, that's the one I think deserves it more.

Missed expectations, zero guidance: Tesla's 'great year' was anything but

doublelayer Silver badge

Re: Right

If you don't care about breaking rules and any objective reason to keep it alive, why should anyone outside the region care about breaking rules and any objective standard that would harm you? Why shouldn't, for example, large tech companies continue to ignore increasingly strong European attempts to regulate, tax, and restrain them on the basis of "you probably need Google here, so what are you going to do"? Of course, they're already taking some attitudes that look like that, but not officially and when regulators put their foot down, they respond.

Those rules exist for a reason. If you're going to defend them, you might want to be careful and make rules that at least appear to work with the rest of them because otherwise, people will toss out all the rules that help you. An environmental regulation that happens to make things more expensive for Chinese manufacturers is doable. One that just bans them is likely to have negative effects you're not paying attention to.

Russia takes $13.5M bite out of Apple over in-app purchases

doublelayer Silver badge

We have a fundamental difference. Your article demonstrates that Russia could do this badly in the way you describe. It does not demonstrate that they have done it badly, or that they responded to that mismanagement using personal phones as a method. It does not respond to the technical objections that I raised to the method. Clearly, you find one of their failures convincing enough to assume that they have similar mismanagement elsewhere and to come to the conclusion you have. This is not sufficient evidence to convince me that they use the systems you say they do, any more than I would be convinced that this mismanagement means they are now attacking Ukrainians with golf clubs because they ran out of guns. I don't think we will reach an agreement on this one.

'Birthplace of Amazon' on the market for $2.28M

doublelayer Silver badge

Re: Housing

I'm not sure which two people you're referring to, but I assume I'm one of them. If so, I'm not sure it makes sense. There are lots of problems that living a hard life would have on someone wanting to get into electronics. The most obvious one is that, when you start to work on electronics, you'll break a lot of things. It's one reason I am mostly a software person, not a hardware one. When I was a child, when I messed up a program, at worst I had to restart the computer before I could get to fixing it. I never had to buy anything as a result of messing up. Just working on electronics requires you to have tools and parts that cost money, and each mistake will be more costly still. Another big one is access to guidance, which is much easier if you can find someone to teach you, and you're more likely to have such a person in a well-resourced school than if you don't have that. These are all major problems. House size, however, is less of a problem. I wasn't saying that anyone can get into electronics, but that as hobbies go, it's less limited by available space.

There are lots of ones that are more limited in that respect. Woodworking, for example, will not work very well if you don't have somewhere relatively large in which to store things. The tools are quite large, the stuff you're working is as well, it generates a lot of byproducts that you don't want to have inside. Or car repair and maintenance. You can't do either of those on a bedroom desk. You can do electronics work there. Living a hard life is an obstacle to all of these. Living in a small place is an obstacle to only some of them.

Wait, hold on, everyone – Mozilla thinks Apple, Google, Microsoft should play fair

doublelayer Silver badge

Re: zero cost

A lot of things don't float on the stock market or incur tax and are still a market. If I trade items with friends, we won't be filing any paperwork and there is no tax to be paid as we didn't exchange things with a monetary value. Yet, there is still a market going on, with all participants valuing and exchanging items. This doesn't change when those items become intangible, such as code I can run and the value of a larger user base.

And it's still not relevant. "Market share" means "the proportion of all users, customers, consumers, etc of a type of thing that use this specific thing", without having to specify other details about how they choose or what the alternatives do. If you won't give up on the idea that without money, there is no market, then I know there are some browsers that do cost money. They are in a market, and they are competing with free browsers, so those free browsers are in the market as well. It so happens that basically nobody uses those paid browsers, but they do exist.

doublelayer Silver badge

Re: You're asking me to quantify Mozilla's market strategy.

I am a trader. I choose which browser to run, paying indirectly by benefiting the organization that makes it. If I use Firefox, I benefit Mozilla by being part of their user base which they monetize in a few different ways. If I use Chrome, I'm benefiting Google by letting them control web standards. If I use Safari, I'm benefiting Apple by having bought one of their products because Safari doesn't run on anything else.

The browser makers are also traders. They provide me a service of value and compete with other browsers to offer useful features. Google provided automatic builtin translation with Google Translate. Firefox provides automatic builtin translation in fewer languages but it runs on my device and doesn't require me to send any data to Google. They are competing.

Musk lashes out at Biden administration over rural broadband

doublelayer Silver badge

Re: Just no

Too late, they've already tapped into normal taxes, allocated funds, and now intend to use them to spread into rural areas. They've got the money, and the only question now is how to spend it in order to provide the connections. It wasn't on your bill, but in your standard taxation, but the effect is the same.

Apple's on-device gen AI for the iPhone should surprise no-one. The way it does it might

doublelayer Silver badge

Re: While I'm very skeptical of the AI hype compared to the reality

Whenever I've run models, which admittedly is not often, it writes to memory a lot. It loads a lot of assets into memory, runs conversions on them, and then thrashes the RAM for a while. That's fine when it's RAM it's using, but not so much if it's flash. I agree with you that people don't tend to wear that out now, but that could easily change if that's what the software is doing.

It's not entirely new, either. Some Android phone manufacturers have started advertising massive amounts of RAM, for example 24 GB, which consists of a moderate 8 GB of real RAM, and then 16 GB of swap. There have been some reports of this causing flash-related failures, but that is much more limited use than running a model actively in it, since the swap space isn't constantly being loaded and rewritten. Just because it isn't a problem now doesn't mean it will never be one, especially if we change the reasons why it's not been a problem now.