* Posts by Michael Wojcik

12268 publicly visible posts • joined 21 Dec 2007

IBM says GenAI can convert that old COBOL code to Java for you

Michael Wojcik Silver badge

Re: Programming is independent from language

COBOL is not very complicated and any competent programmer should be able to pick up the rudiments in an afternoon.

Rubbish. The COBOL 2002 standard is half again as long as the C99 standard (COBOL has over a thousand keywords), and it doesn't cover any of the many vendor extensions and quirks. There are dozens of COBOL dialects, with wide variations in syntax, semantics, and runtime behavior. COBOL is full of traps for the unwary, such as inadvertent scope termination and implementation-defined PERFORM behavior. Anyone who's actually worked on COBOL translation can tell you that your claim is complete bullshit.

This will be particularly true when maintaining code written by someone else. I've run into plenty of COBOL developers who are unfamiliar with, and puzzled by, COBOL idioms and constructs they haven't used themselves: keyword variants, abbreviated conditionals, tables, arcane uses of verbs like INSPECT and UNSTRING...

Michael Wojcik Silver badge

Re: Programming is independent from language

I also think it would be relatively easy to make a COBOL to JVM compiler

Writing a COBOL-to-anything compiler is hard. Even if you just stick with a single dialect – say COBOL'2002 (ISO/IEC 1989-2002) without the OO support or optional features – it's a tough language to parse (it's not LL(1)). And a single dialect won't get you far, since non-trivial applications often combine "programs" (what would be object modules in other languages) compiled from sources in a variety of dialects. Then you have to make various implementation decisions because the standard leaves critical aspects up to the implementation.

Once you have a working COBOL compiler, targeting JVM bytecode as a backend is certainly possible. We do it. But it's mostly useful for integrating with other JVM languages, using JVM frameworks, or writing OO COBOL. It doesn't help much with migrating COBOL applications from the mainframe because it's the mainframe environment which really matters to those applications.

Michael Wojcik Silver badge

Re: Meh

Micro Focus Visual COBOL (the current descendant of the original MF COBOL line, and the flagship COBOL product), now owned by OpenText, still compiles initially to an intermediate representation. That can be interpreted at runtime, or converted to native code (in various object formats), .NET CL, or JVM bytecode. Such "generated" code isn't interpreted at runtime, if it's native (and it's JITted if it's CL or bytecode).

The runtime is typically dynamically loaded, not statically linked.

As an aside, you can decompile COBOL-sourced CL into, say, C# or VB.NET, and it's not awful. It will have a bunch of COBOLisms, but it's readable. If you use the Managed OO COBOL language variant you can actually write OO COBOL for CL that looks very reasonable when decompiled into another .NET language. But traditional procedural COBOL using the idioms of COBOL'74 or COBOL'85, plus the various extensions that vendors loved to toss in, can be very messy when converted to another language.

Michael Wojcik Silver badge

Re: Curious choice

"COBOL", with two O's.

While the quality of the generated Java source is definitely one area of difficulty, the bigger issues are likely portfolio analysis – we often encounter customers who aren't sure which of their tens of thousands of COBOL programs are actually run in production, or what sources they're built from, reliance on odd aspects of IBM COBOL behavior, and (for the promise of eventual migration away from the mainframe) dependencies on zOS features and subsystems.

People have been selling COBOL-to-Java conversion tools and services for decades. It's rarely gone well, and source language conversion isn't most of the work. So throwing an LLM at that part, even if it doesn't create a dog's breakfast (and I wouldn't count on that), is only optimizing a fraction of the problem.

Michael Wojcik Silver badge

Re: Skip the Java - go straight to Rust (or whatever the new flavor is today)

Java is thoroughly integrated into the IBM z environment and subsystems such as CICS and IMS. Python and Rust are not, and migrating COBOL mainframe applications to them would be a miserable experience.

For these sorts of applications, the programming language is much less important than integration with the zOS environment.

It's all going to end in tears anyway, for applications of significant complexity. Many of these applications have decades of stovepiped changes to business logic and integration with other applications. They typically have very few tests, accurate specifications, or documentation available. The business processes are defined by what the existing programs do, and nothing else. The first stage of any such migration is application portfolio analysis, even just to identify which programs are actually being run and what sources they probably were built from, and that's a major undertaking in itself. Converting to another language without introducing changes in behavior is very difficult.

And that's not even touching on the vagaries of IBM mainframe COBOL, such as its nested-PERFORM behavior (hint: it's not a stack); or the differences among various IBM COBOL product releases.

Disclaimer: I make wads of filthy lucre from a competing product, so of course I would say that, wouldn't I?

South Korea's biggest mobile telco says 5G has failed to deliver on its promise

Michael Wojcik Silver badge

Re: Blackpool Already Has 6G, Honest!

Peons! I'm using ∞G ("Infini-G"). Nothing can ever be better. Websites load on my phone before they've even been created.

Now hush, I'm trying to watch next Tuesday's episode of Popular Show.

Computer graphics pioneer John Warnock dies at 82

Michael Wojcik Silver badge

Re: In 80pt bold please :)

I have to confess that I dislike Hackers, which is written in a rather adolescent style of breathless enthusiasm, to the point where I find Levy's prose almost unreadable.

While I can't think offhand of another volume that covers all the same people and events, there are a dozen or two better works of computing history and lore in my library. Unfortunately most of that library is in storage a thousand miles away, but just off the top of my head there's Kidder's The Soul of a New Machine, Stoll's The Cuckoo's Egg, Jennings' The Devouring Fungus, and Swaine's Fire in the Valley. Lee's The Day the Phones Stopped is less captivating but has some good material. Oh, Alexander & Smith's Fumbling the Future on the Alto.

Thomas Haigh published a number of interesting computing-history articles in CACM.

Back in the 1990s there was a tremendous number of insider accounts of all aspects of computing in alt.folklore.computers, but I don't know of an organized archive of that material.

OpenAI snaps up role-playing game dev as first acquisition

Michael Wojcik Silver badge

Re: Stop misusing that term

It's just mathematical rules coming together in some way that confuses people.

Cool. Now support the warrant, that this is qualitatively different from how human intelligence works.

I am not impressed by LLMs myself, but this dualist "I don't know what intelligence is, but it's not this" line you insist on repeating is just sophomoric bullshit. Could you please either come up with a substantive argument, or just cut it the fuck out? We've all read it a hundred times now.

Hallucinating ChatGPT finds a role playing Dungeons & Dragons

Michael Wojcik Silver badge

God forbid we be creative

Yes, let's automate the fun, imaginative parts of the game, so we can concentrate on rolling those dice.

On the other hand, LLMs, with their access to huge corpora of text and data, may be able to help our research DMs study the fundamental questions of D&D. Maybe we'll finally be able to prove that PC ≠ NPC.

Tesla knew Autopilot weakness killed a driver – and didn't fix it, engineers claim

Michael Wojcik Silver badge

Re: Tesla is simply making a financial calculation

Stop at any traffic signal and you're likely to have at least one and often two or three around you

No, I'm not. Not around here, certainly; and I just drove 6000 miles (from the Rockies to the Canadian Atlantic coast and back, with various detours along the way), and while there were certainly a number of Teslas, they were also not nearly as common as you're suggesting. They were easily outnumbered by any of the popular pick-up models (F-150, Silverado, etc), and probably by various crossovers as well.

Michael Wojcik Silver badge

I call bullshit on the "center divider" algorithm anyway. I frequently drive on highways that have mostly have center dividers, with occasional breaks for cross traffic. What is Autopilot going to do – stop working every 10 miles or so when it spots one of those breaks? (Assuming it spots it at all.) It's not a feasible approach.

The whole thing is rubbish.

Michael Wojcik Silver badge

Re: Risk tolerance

I hate adaptive cruise control. As far as I'm concerned, the whole point of cruise control is that it helps me maintain a constant speed in situations where that's feasible (uncrowded highways). That makes my driving more predictable, which is useful to other drivers. With adaptive cruise control, I'll end up passing a line of people whose cars have slowed down because of one slow vehicle in front, and then they all realize they've slowed, move into another lane, and often end up passing me – just for the whole process to repeat a few miles down the road. It's annoying and increases the probability of an accident.

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks

Michael Wojcik Silver badge

Re: Just when I thought about upgrading...

Or computers with non-trusted software downloaded

Which is basically all consumer general-use computers, of course. You don't need to worry about malware exploiting microarchitectural side channels if you're blithely installing random crap from whatever source with elevated permissions. Key loggers are a lot more effective.

Which is not to say that these attacks aren't worth researching and, in appropriate cases, mitigating; just that people need to keep their threat model in mind.

Michael Wojcik Silver badge

Re: Epyc fail there

That's possible, of course, but these microarchitectural side channels are really easy to introduce accidentally (they amount to failing to clean everything up), and because there are so many of them they're difficult to find comprehensively. Zenbleed was found by microarchitectural fuzzing (dunno about Inception, as I haven't gotten to the paper yet), which is a stochastic process, not exhaustive. CPU manufacturers have limited resources just like everyone else, and their testing focus will be on getting the correct documented behavior from the chips.

Lawsuit: We've got the stats to prove Twitter ax fell unfairly on older, female engineers

Michael Wojcik Silver badge

Re: A tough sell

If the court does compel X to pay for arbitration, that's going to hurt. It'll be a lot harder for them to dodge those bills. And similarly for severance and so forth.

X tries to win back advertisers with brand safety promises

Michael Wojcik Silver badge

Re: Not false advertising

being the captain of a ship sitting on the bottom of the ocean as the last posting held doesn't look that great

Not so, at the C-suite level. Boards have historically shown no reluctance whatsoever in hiring execs whose previous employers crashed and burned. And making them directors, for that matter. Most of the terrible CEOs I've known about (who aren't in prison) are sitting pretty.

Taking the helm of a sinking corporate ship these days gives you credibility, particularly if you can lay off a bunch of people or make other "hard decisions" as it goes down.

Middleweight champ MX Linux 23 delivers knockout punch

Michael Wojcik Silver badge

Re: this shoggoth of a startup daemon

Yes, because popularity is definitely a reliable proxy for quality.

A room-temperature, ambient-pressure superconductor? Take a closer look

Michael Wojcik Silver badge

Re: Apatite

It's a LaTeX expression, as any fule kno.

Sneaky Python package security fixes help no one – except miscreants

Michael Wojcik Silver badge

Re: Wrong end of the stick (for us, the profitable one for these folks)?

The CVE ID allocation process is ... infelicitous (at least it was back when I was a sub-CNA), but CVEs won't scale if we allocate CVE IDs for every security-relevant fix. CVE IDs is the wrong fix here. In practice, CVEs work well for significant vulnerabilities, and in particular for how they're actually most often used: to credit outside researchers and provide them with reputational compensation for notifying the product/component owner rather than selling or exploiting a vulnerability.

Non-trivial software products often get a lot of small potential-vulnerability fixes as part of routine maintenance. Code inspection, refactoring, static or dynamic analysis, or testing catches the odd UAF or BOF here and there, and it more-or-less silently gets fixed metastatically within some other development effort. If developers have to allocate a CVE for each of those (or even one for each batch of them), we'll run through a lot more CVE identifiers, to the point where they're unusable, and increase the cost of making these small fixes.

Cigna sued for using software to deny healthcare insurance claims

Michael Wojcik Silver badge

Re: Unchecked algorithm?

That's what Cigna claim. The plaintiffs claim otherwise.

Michael Wojcik Silver badge

Re: Not quite right

I've had US health care my entire life, under various types of plans – "conventional" (which isn't anymore, and hasn't been for a while), HMO, PPO ... – and none of them have worked the way you describe. With HMOs it is often required to get a referral for out-of-network non-emergency care. All the PPOs I've had have approved payment after treatment, not before; there hasn't been any pre-approvement process.

Aliens crash landed on Earth – and Uncle Sam is covering it up, this guy tells Congress

Michael Wojcik Silver badge

Thermodynamics would like a word

David Fravor recounted a similar story. In his case, however, he was training for combat in Iraq and flying over the sea in 2004 when he and his colleagues spotted "a small white Tic Tac-shaped object" with no visible rotors or wings.

The object jammed the radar of the aircraft and did not emit any infrared radiation like normal propulsion systems.

So either the "Tic Tac" was at thermal equilibrium with the environment – like, oh, a lighter-than-air balloon – or it was running on stored mechanical energy, since it clearly didn't have any sort of heat engine. Or, far more likely, it was a hallucination or optical illusion. Or just made up. Hey, those explanations also cover the lack of a radar signature. How about that?

An "advanced technology" that doesn't obey thermodynamics is tantamount to magic. These aren't aliens, they're witches, and they've figured out that they can enclose their brooms for greater comfort.

Honestly, the amount of arrant nonsense and paucity of actual evidence in these accounts beggars belief.

Michael Wojcik Silver badge

Re: Millions of Parsecs

[b] bend space and step instantly between origin and destination, [c] use FTL propulsion

Any way of sending any signal faster than C breaks causality. Personally, I'm hoping to keep causality intact; I think that's a much better option than FTL travel.

TETRA radio comms used by emergency heroes easily cracked, say experts

Michael Wojcik Silver badge

Re: And again ..

Looks like the encryption algorithm was intentionally weakened by intelligence agencies to facilitate easy eavesdropping.

...

And I would like to point out that that’s the very definition of a backdoor.

Bruce Schneier

I'll take the opinion of an actual professional cryptographer in this case.

Michael Wojcik Silver badge

Re: Really need to fast track a NIST style open radio design competition

Oh, what a load of rubbish.

For one thing, RSA is not an "algorithm[] for streaming data". It's an asymmetric cipher.

DES is certainly too weak (the key's too small, and it's vulnerable to linear cryptanalysis) for modern security, but we had 3DES since 1981, and in a streaming mode (CFB, OFB, and CTR were all documented well before 1994) it's a stream cipher with no published cryptanalysis requiring less than ~284 encryptions if you rotate keys on a reasonable basis (i.e. before 232 blocks, to prevent Sweet32 attacks).

For TETRA purposes, where attackers have few routes to drive a large number of known-plaintext encryptions, even RC4 would likely be fine.

TEA1 is just a bad, deliberately-broken cipher.

AMD Zenbleed chip bug leaks secrets fast and easy

Michael Wojcik Silver badge

You're patently wrong; there's a working proof of concept, and extracting useful information from a corpus of exfiltrated data is a long-solved problem. But thanks for playing.

Michael Wojcik Silver badge

Re: Dumb Questions

Those are good questions.

Not particularly, since they're answered by Ormandy's article. I don't understand why people take the time to post questions but not to check to the primary source.

When vzeroupper is speculatively executed, and then that branch is discarded, the zero-upper bit for that YMM register is cleared. That should restore the previous upper 128 bits of the register; but in some cases that portion of the register file has already been reused by some other thread (because the zero-upper bit was set during spec-ex and the Zen 2 RTT incorrectly considers that committed), and in that case the upper 128 bits that were "restored" to the thread that performed vzeroupper will be the data stored by the other thread.

Michael Wojcik Silver badge

Re: Parsing the data

how do you make sense of whatever happens to be in the registers when you get the chance to read them?

You do realize there has been a tremendous amount of published research on this, right? That we've had unauthorized-read vulnerabilities for decades, and people have been turning them into exploits for nearly as long?

Tools for extracting useful secrets from corpora of exfiltrated data are widely available. They use pattern-matching and various heuristics.

There are examples of this for Zenbleed specifically in Ormandy's article. This information is not hard to find.

Michael Wojcik Silver badge

Re: Parsing the data

So how many string operations are likely to be processed as vector operations?

A great many of them. Read Ormandy's article. See his proof-of-concept exploit.

Michael Wojcik Silver badge

Re: Parsing the data

UTF-8 or sometimes ISO8859 are the order of the day, and just counting along an array of bytes until you get to a zero byte is no longer enough to work out the character length of a string.

It is certainly enough to get the byte length of the string, which is what strlen is mostly used for. There are a vast number of strlen calls taking place in modern OSes. And, in fact, on EBCDIC OSes too, since code point 00 is NUL in EBCDIC as well as in ASCII, and C is quite often used on the remaining EBCDIC systems (z, i, etc).

Michael Wojcik Silver badge

Re: Also, I just noticed...

As Ormandy points out, there's a lot of code that uses the YMM registers, and a lot of code that uses vzeroupper. glibc's strlen is the example he walks through. Writing Javascript that causes the browser to call strlen should not be difficult. Expanding that into a full exploit might be, though.

As researchers such as Daniel Gruss have shown repeatedly, microarchitectural vulnerabilities often are exploitable in unexpected ways. Assuming this can't be exploited in Javascript would be a large leap of faith.

Tesla's Dojo supercomputer is a billion-dollar bet to make AI better at driving than humans

Michael Wojcik Silver badge

Re: Did his Muskiness..

Unless you're a dualist (and if you are, well, so sorry to hear that), but that idea is probably true at sufficient scale. A big enough net, enough data, and enough training time, and you'll get a Boltzmann brain (or more likely a whole bunch of them).

But it would be wildly astonishing if the Dojo system were large enough to exhibit any sort of truly surprising1 emergent behavior.

1As opposed to the "gosh wow" we're incessantly hearing about LLMs and other large transformer models, which IMO have yet to be surprising. I am frankly baffled by the enthusiasm some very intelligent, well-informed people have for these systems.

Michael Wojcik Silver badge

Re: "But then, you get to, like, 10 million training examples, it becomes incredible"

The aim of getting autonomous vehicles to outperform humans is a low bar.

Yes, but it's still not an easy problem, because of the really, really, really long tail – the vast array of improbable cases.

How many cases of "driving at highway speed and a significant part falls off the vehicle in front" are in Tesla's corpus? That's happened to me a couple of times. How many of "a significant part just fell off this vehicle"? I towed a Jeep once that had a wheel come off after the axle sheared, due to a manufacturing defect. How many of "driving down the highway and there's a vehicle on its side in the passing lane, facing back down the highway"? That's happened to me three times, once at night in a heavy snowstorm. How many of "oil slick on a hill on a curving country road" – I had that once. How many of "some random dude trying to direct traffic around a truck that's double-parked on a city street"?

Have Teslas FSD'd over Hardknott Pass, or other roads with sufficient grade that you can't see the road surface in front of you? I've done a few of those. (Actually I don't know where Tesla camera mounts are; maybe this isn't an issue.)

Humans are rubbish at maintaining vigilance, but surprisingly adaptable to novel situations.

Michael Wojcik Silver badge

Re: "But then, you get to, like, 10 million training examples, it becomes incredible"

Training on "good drivers" is a fool's errand. They almost never get into trouble, so the AI isn't going to learn anything from them.

I am not a fan of autonomous vehicles, and particularly not of Tesla and Musk; but I don't think this argument is valid. The system isn't, for the most part, learning from drivers. It's learning about driving situations and about probable effects from causes – or more precisely, what the distribution of an event is given the previous window of N events. (Note "event" is defined broadly here, as "a snapshot of input from the sensors". So it will include situational information such as weather.)

When you've trained a system with a large corpus of such events, then you can impose a set of rules on top, telling it how to weigh outcomes.

What the drivers do matters only insofar as their control inputs also constitute events.

In other words, in this sort of training exercise, the system isn't learning how to drive; it's learning what driving is, as a large collection of probability distributions with a time series of inputs as priors.

Watchdog mulls online facial age-verification tech – for kids' parents

Michael Wojcik Silver badge

Known Ages

patterns in its training dataset that are associated with known ages

Such as the Age of Security Theater, which we are currently well in.

Really. "Known ages". Such as, say, 39, an age which scientists have recently discovered.

What happens if someone who's an unknown age gets scanned?

Judge lets art trio take another crack at suing AI devs over copyright

Michael Wojcik Silver badge

Re: Extension of the Existing Situation

JK Rowling sued (and I think won) an author because the book focused on a magical child going to a magic school

Because she invented that concept in 1997, and novels such as The Little Broomstick (1971) and The Book of Atrix Wolfe (1995) never existed.

I'll admit Rowling's version is far worse, so maybe she has some grounds for complaint there.

Michael Wojcik Silver badge

Re: Extension of the Existing Situation

Why do you think your process of generating a work in the style of another artist is equivalent to a large transformer model doing so, in fact or under the law? That's a rather glaring assumption.

RIP Kevin Mitnick: Former most-wanted hacker dies at 59

Michael Wojcik Silver badge

Re: But why tho...

My mother died of pancreatic cancer a few years ago, and in her last several years she was pretty stress-free. Others I know who have succumbed to the disease were also not what I'd consider "stressed" (at least not significantly beyond what I've experienced as the norm).

The topic of this thread is just selection bias, I think. There are quite a few famous tech figures; it's not hard to find a handful who have died of various fairly-common causes. Pancreatic cancer may be responsible for "only" on the order of 104 deaths in the US each year, but that's still a pretty big pool.

And relatively wealthy people will be more likely than the population at large to die from a cause such as pancreatic cancer, because they can afford a lifestyle and medical care that will improve their resistance to a number of other more-common pathologies. Reducing the likelihood of generally-more-common ends shifts probability mass toward the less-common, treatment-resistant ones. (As someone noted above, pancreatic is so often fatal because it's detected so late.)

Social media is too much for most of us to handle

Michael Wojcik Silver badge

Oh, everyone has something to teach you – if nothing else, precisely what sort of idiot they are.

Not everyone's teaching is worth your investment of time and attention, of course. We have actually developed some decent mechanisms to help people filter that; they're not perfect, but they do a lot of the work. Social media largely lacks them.

Michael Wojcik Silver badge

Re: I did something similar

Indeed.

Back when I still regularly read Usenet – which I started on in 1990 (I know, I was late to the party), though I'd used various BBSes and the like before that – there certainly were people whose names I'd learn to recognize. There were some who were famous in that context, like Kibo; there were some whose names I recognized from meatspace, or whose outside activities I'd become aware of over time. There were even a few I eventually met in person, and in a few cases some I formed close relationships with.

Aside from that last group, I'm not sure I'd claim I "connected" with any of them in any significant way. I was interested in what they had to say, perhaps. I learned from them, and perhaps taught some. But the same is true of the thousands of fiction authors whose work I've read, as part of my literature studies or on my own, and I wouldn't claim any connection with them.

How many of these social-media connections have any life outside a few posts? Any actual emotional or intellectual relationship?

Pesce started his piece by suggesting that having a lot of social-media input is (or so he thought at the time) a good way to learn. Well, there are already plenty of excellent ways to learn – far, far more than any of us could possibly explore in our lifetime. I've yet to see any evidence that social media offers anything of substance not to be had elsewhere.

Under CISA pressure collab, Microsoft makes cloud security logs available for free

Michael Wojcik Silver badge

Re: "forging tokens"

Depends on your definition of "forging", I suppose. In some contexts, it's used to mean something along the lines of producing a document that falsely attests to provenance and authenticity, regardless of the document's accuracy in other respects. Under that sort of definition, using a key that's shouldn't be authorized for this purpose would be a sort of "forging".

In the forensics and cryptoanalysis of PKI-based attacks, "forging" seems to be used in a number of ways, so I can't really fault Microsoft for their use of the term here.

But your point is good, in that it helps to provide technical accuracy.

ChatGPT study suggests its LLMs are getting dumber at some tasks

Michael Wojcik Silver badge

Not under just Earth-gravitational compression, no. The problem is underspecified, of course. It's physically possible to compress quite a lot of feathers into a bucket, however "bucket" is defined. So both answers are wrong with some probability, but the "bucket is denser" answer is wrong with higher probability...

... unless we're also including the bucket itself ("the density of a bucket of feathers" doesn't definitively imply it's not included), in which case all bets are off. If I were to use, say, a galvanized steel bucket that I have here and fill it with feathers, the resulting agglomeration would definitely be denser than a single feather.

So it's a stupid problem, and people declaring one answer or the other is obviously correct haven't given it enough thought.

Michael Wojcik Silver badge

Re: ChatGPT getting dumber at programming

Real greybeards wrote their own much smaller, more elegant, more efficient, and more capable rubbish-code generators decades ago. Copilot et al. are just really expensive reinvented wheels.

You know, I don't think I'm joking about that.

Michael Wojcik Silver badge

Re: ChatGPT getting dumber at programming

I don't know what you (and five upvoters) have been reading, but it's discussed plenty in the literature already, considering how young this field is.

See for example Will GTP Models Choke On Their Own Exhaust?, a post from Ross Anderson, which links to a paper from his group on arXiv investigating this issue. It's also been raised (in a technically sophisticated fashion) in places like LW posts, so it's not just researchers in their day jobs looking at the problem.

The lay press and J Random Tweeter may not be flagging the issue, but actual, like, researchers are hardly keeping silent about it. Which is hardly surprising since the problem is prima facie evident in the training strategy.

With limited space for tourist attractions, Singapore bets on augmented reality

Michael Wojcik Silver badge

Re: Tourism???

Agreed. Wikipedia says the permanent population is around 5 1/2 million, so if "millions of tourists" are visiting each year, that's a significant portion of the population. Why cram more in? (Yes, the tourists are not all there at the same time. It's still a measure of "tourism density". Indonesia has 50x the population and 2600x the area; it's hardly surprising it also sees more tourists.)

Of course, the problem with having a Tourism Board is that attracting more tourists is pretty much their reason for existing. So that's what they'll do, whether it makes sense or not.

Michael Wojcik Silver badge

Re: Okay, not going to knock it

I can imagine school children on trips using their imagination, and not needing to have every goddamn thing handed to them on a platter.

AI maybe on everyone's lips, but it's not what's driving IT spending

Michael Wojcik Silver badge

Re: The hype bandwagon changes it's tune, but keeps on rolling...

Two. OO is clearly established, and there are a number of real-world fuzzy-logic applications, often in areas like industrial control.

Other hyped technologies lost their lustre but actually succeeded in a quieter way. "Mobile" was a source of much scrambling for a while, and technologies like WML were the rage, but then hardware caught up and mobile apps became just another mundane deployment option. There's a lot less chatter about Big Data these days, but there's still a lot of big-data processing and data science happening; people just stopped treating it as something exciting.

There are hyped technologies which found some market success and then plateaued, failing to reach the heights some people forecast. Wearables and home assistants are good examples.

And then of course there were those that succeeded only in niches, like Fourth-Generation computing and blockchain. (From the latter I'm excluding good applications of proper Merkle graphs.) And the ones that still attract a lot of hype with little to show for it, such as VR.

Personally, I am still wildly unimpressed by LLMs and other deep-transformer-stack applications, but I suppose we'll see.

Michael Wojcik Silver badge

Undistinguished vice president analysts? Sure. I mean, can you tell them apart?

Google toys with internet air-gap for some staff PCs

Michael Wojcik Silver badge

Re: Internet for reference purposes.

You could implement that now with a couple of VMs (or a VM and a host OS). One VM has Internet access but restricted access to the corporate network, and the guest OS only allows signing on as a limited-privilege account (with maybe some provision for installing approved software by the end user). The other VM has access to the corporate network, source repositories, etc, but not to the Internet.

If you run a grownup windowing system, such as X11, you could even have your side-by-side application windows.

Michael Wojcik Silver badge

Re: WiFi -gap

In fact it doesn't even need air. You can vacuum-gap it. Those crazy electromagnetic fields just don't care.