Et tu, Simon?
130 posts • joined 28 Mar 2020
I don't know the exact junction layout, but I get the impression that it is unlikely that a Prius could make the turn at 40mph. This should have been enough to tell the Cruise AV that it wasn't turning or to make the turn quickly, keep right and be prepared for an out-of-control Prius to enter its path. Or better still, don't even attempt the turn.
If too much for an AV then it's not ready for real-world driving.
One summer job I had was at a distribution company, basically putting goods ordered into boxes. I started on a temp's wage but after my first week the foreman said that my output matched that of the permanent employees so he would pay me the same as them.
There were two conditions:
1 Don't tell them.
2 Don't exceed Jim's output. "He is proud of being number 1 and will sulk all summer of you better him. I don't need that."
I was working at a UK mobile network operator, whose new CTO was an arrogant individual. He had some bad ideas and also some good ones, many of which were issued as JFDI diktats.
One of his ideas arrived on my desk. The requirement was that it should not be possible for a user to make changes on a switch without change control authorisation; this was to be managed by disabling all user access and providing change control with a scheduler to enable relevant users’ access as per the change schedule. My job was to write the scheduler and front end; end of conversation: do it now!
To be sure that my system was meeting the requirements I created a second utility that periodically downloaded the switches’ change logs and checked to see if any changes were being made that my scheduler could not account for. I found something...
An unknown user was using an unknown access port to run unknown commands. The penny didn’t drop and so, not twigging what department this might be and me being in a rush to plug the hole I’d found, I asked various people I knew throughout the business to try to identify the miscreant.
Next thing I knew I was standing in front of the CTO with some individuals from “lawful intercept”. It turns out that a config error (not mine) had made visible to my log checker their supposedly hidden activities: I shouldn’t have seen what I had seen and certainly not gone asking questions. The CTO, who, up to that point, knew nothing about the intercept activities or my second utility, hated being shown to not know everything.
I got a proper dressing-down from the CTO that afternoon for having gone the extra mile and written the log checker, but nothing more came of things after that so I assume I hadn’t ruffled too many feathers. I deleted the logs I had uncovered and, given that no more showed up, the config error must have been fixed, not that I got any thanks.
"three million times less memory than a typical modern smartphone".
One time less would be zero, so that must be -2,999,999 more.
I wonder what negative memory looks like; two's complement?
I'll leave "38,000 times slower" as it makes my brain hurt working out what that means.
I have said before on this site:
A previous employer of mine used to send this sort of email out, training its customers (of which I was also one) to click on dodgy links. The thing was, if I followed the company's internal security awareness training then, had the email been sent to my work address, I should have sent it to our IT security team (a few times I actually forward it from home to work and did this to make a point). I put a fair bit of work in trying to identify who in the company was responsible for the emails but eventually left before I found out.
My thoughts exactly. Can you imagine getting a RoboTaxi trained by DPD?
It will take you to a street 5 miles from your desired destination, park on a double-yellow and leave you behind the rubbish bins. That's assuming it picks you up at all and doesn't just wait outside your house for 5ms then leave a note saying you weren't in.
It must have been about 20 years ago but I still remember, having unpacked my iPod, the disappointment and anger as I looked at one of the items on my desk. "What the hell is that?". A colleague answered, "firewire".
I discovered it would cost me another £20 to buy a USB cable from Apple (inc postage), so instead I bought a firewire card for £22 from a local PC shop and vowed never too give Apple another penny.
I'm a stubborn bugger and have stuck to that ever since.
Can't fault the iPod though: got many years of use out of it.
"Even if the person in the footage is obscured, the account holder is known & will be brought in for questioning. If they can't provide a plausible excuse for the person in the video *not* being them, they'll be on the hook"
Ah yes, the old guilty-until-proven-innocent approach.
Nate, look for "relay attack" on Youtube and you'll see how distance between car and fob can be easliy overcome by relaying and amplifying the signals.
Replay attacks aside, fob unlocking requires access to the fob whereas keyless is initiated from a button often left on a driveway.
I remember when Microsoft did that trick of hiding the extensions, I was working on something using file names like:
Oh fun! Yes, I could have learned to differentiate the subtle variations on the icons, but life's too short: I enabled extensions.
>a method of setting a VCR programmer using Ceefax/Teltext program listings
My first VCR (can't remember make or model) did just that. It also gave me Teletext on my non-teletext TV; you had to do it all via the video channel though. It also had a neat trick of using the teletext data to superimpose the TV show's name and broadcast time & date onto the first ten or so seconds of the recording which made searching a tape much easier.
The misused word that always gets me is "ultimate". I once considered buying the Ultimate Rock Album purely so that I could ask for my money back if they released another one.
But what really baffles me is why someone would market food as the ultimate. Surely the only way someone can be sure that they really are selling you your Ultimate Burger is if its full of botulism*.
* I suppose in the pedantic spirit I should say Clostridium botulinum, but you know what I mean.
I remember watching familiar landmarks go by as I rode from my home to the hospital in the back of an ambulance, thinking "will I see any of these things again?". Pubs, Tescos, even a bloody McDonalds. I had Covid.
Two days after I left hospital, I was offered a vaccine, but had to wait another 28 days before jab one.
I had my second vaccine over three months ago and I don't know if the covid or vaccines are responsible for the constant fatigue and the muscle aches, but if I have to choose between another vaccination or making that ambulance ride again: I'm rolling up my sleeve.
First thoughts would be something akin to a relay attack as used on keyless entry vehicles today. A small extender fitted over the socket relays the victim's charging transaction to another unit on the plug belonging to perpetrator's car (which can link to a nice big antenna hidden in the car to read weak signals from the extender). As per keyless, clever encryption doesn't matter: you just relay the encrypted signals and once the victim's authenticated, juice starts to flow.
If there is a warning that the car is not charging then the victim will likely blame the charger and try another, especially if the helpful chap (aka perp) next to him says "that one didn't work for me either".
OK, I've never actually used an EV charger so this probably has holes in it. Anyone care to plug* them.
I don't know if it's still like it but there is/was a one-way system in Limehouse, East London (Horseferry Road & The Narrow) where cars went clockwise but the cycle lane (just painted, not separate) went anticlockwise and, IIRC, on the right hand side.
Cue lots of drivers pulling out in front of cyclists coming the "wrong" way.
...emailing it to all and sundry is another.
Many football* world cups ago I received an email from my boss with an Excel spreadsheet attached. The spreadsheet was apparently just an electronic version of the wall-charts used to track who’s playing who etc.
As someone who doesn’t find the Beautiful Game particularly beautiful, I was about to delete it when I noticed the spreadsheet’s size: even by Microsoft standards of inefficiency, it was huge.
A bit of digging revealed that clicking on a country’s name, although not obviously a link, brought up a picture of a young lady wearing nothing but a body-paint flag of the nation in question. I carefully checked all other country names to see if they had similar images: they did. Some needed to be checked more than once.
Looking at some of the names in the email’s “to” list it was obvious that my boss didn’t appreciate what he’d just sent out. However, he was one of the good managers who always watched our backs, so I had a quiet word. The look on his face when he first saw one of the pictures was priceless! The Recall button was his friend that day.
*that’s “soccer” to left-pondian readers.
So you are saying that after fitting another piece of cheap kit from the Halfords boy-racer add-ons department to a Capri, ie a car that had probably already been "upgraded" by the previous owner/his mates/your brother/that bloke who "knows about cars", the electrics worked in a way that defied physics.
What's your point?
Fair point, but if you have a third party company as the building's landlord and it needs money, you can't just say "no, don't want to", so what difference does it make if the landlord/freeholder is your own company?
IANAL but my my other half is and she is in exactly this situation (flat owner and joint freeholder) and it seems to work.
The property owners each own a share of the freehold, it is their responsibility to manage the maintenance of the building itself. Typically a freeholders' association either manages it themselves or subcontracts the work out to a maintenance company who can be held to account.
Biting the hand that feeds IT © 1998–2022