Re: <facepalm>
Who writes these apps
The lowest bidder.
560 publicly visible posts • joined 16 Jan 2009
If it's only any good for one source & one speaker set then yes Bluetooth does that just fine. If OTOH they've achieved multi room sync without the complete walletectomy associated with existing players, including the recent new players in the field, then it is novel.
Personally, since it says Google on the tin it is certain not to work if your router blocks it reaching the mothership so it's not the multi room solution I'm looking for.
There probably is no internal SATA connector as such, the external one the cable plugs into will be straight on the drive PCB & poke through the case. I suspect this having dismantled a Samsung/Seagate M3 last week in the hope of having a usable case after giving up on the drive. I was disappointed. The drive didn't work right from the day it arrived and like an idiot I did not keep the packaging so could not return it. 3 minutes with a ball pein hammer did wonders to relieve the tension caused by weeks of failed backup attempts.
And to disagree with steve gibson once again (why break a good habit), using a security package that isn't being maintained any more is not the most clever move.
Why? TrueCrypt 7.1a is one of the most heavily vetted lumps of code one could choose to run. It's weaknesses are known and in the opinion of those who understand crypto deeply not significant.
Let's look at 4 scenarios and think what would happen in each:
1) A new vuln in TrueCrypt 7.1a is found by a whitehat; It would be publicised widely immediately, it would be headline news absolutely everywhere. Sensible folk then stop using TC.
2) A new vuln in TrueCrypt 7.1a is found by a blackhat or TLA; they keep it quiet and use it.
3) A new vuln in <something else> is found by a whitehat; It would be reported to the devs, some time later a new version would likely appear, there would then be full disclosure one hopes and some press coverage.
4) A new vuln in <something else> is found by a blackhat or TLA; they keep it quiet and use it.
2 and 4 are identical so lets discount blackhat attacks. I would know I was vulnerable far quicker in 1 than in 3 so I choose 1. It also put's the onus on me to do something should I become vulnerable rather than relying on the author of <something else> which is the way I like it.
YMMV.
"the real problem with airport security is the number of morons in the queue who have to be repeatedly told what to do. Thus slowing the whole process down."
Not to mention those too slow witted to take their wedding ring, watch etc off & put them in their laptop bag while queueing. Or those so poor at thinking ahead they wear badly fitting trousers needing a belt on the day they are travelling. Similarly hard soled shoes, wear flat ones that don't need to be removed. If the airport supplied liquids bag isn't up to your exacting standards bring your own.
My top level of ire is reserved for those idiots who when their bag is diverted into the search and swab row get angry with the poor sod who is just doing his job. All but one of these guys in the numerous times its happened to me has been careful and respectful of with my property. Like the scanners 1 in X bags gets a random search and swab.
They did do something with the wind gauge, they decided to ignore it. The automatic detector was taken offline and the meatsack on that console was going to do the monitoring if the 14:44 attempt had gone ahead.
As for the valves (two were sticking) they tried various things but I didn't hear them discuss your suggestion. Volunteers for the job might have been thin on the ground :-)
I wouldn't. We already have one house full of self serving, power seeking lying bastards. What use is another house full? Until Blair screwed it over the Lords was as close as you could hope for to the Douglas Adams principle.
I'm still confused about your quote that you stood by in the comments to part #2
"I might write it for Docker, once Docker has things like FT, HA and vMotion, but I'm honestly not sure why I'd bother, Docker seems like more work than AWS and doesn't offer a fraction of the flexibility you get when using a proper hypervisor."
Why should containers do this, surely that is the job of the hypervisor? Indeed you state in this article that containers will add to and not replace established technology and will run perfectly inside the hypervisor. We all know what happens to a promising new technology when it tries to be all things to all men. Is it the cost of requiring both that keeps you from using containers 'till the above condition is met?
Yes. Your point about cash being anonymous is exactly why we should care. Given the way western society is moving it doesn't seem at all far fetched that one day good old anonymous cash will be withdrawn. There are many things in the UK that you used to be able to do with cash but now can only be done with traceable payment means. If I ask myself whether the UK govt would like to be able to track and trace all money movements the answer is a resounding hell yes.
The expedited process, called "Track One", was launched in 2011, and Google has bagged 875 patents through the scheme. That's 14 per cent of the 6,187 patents passed via fast track. The next highest is Huawei, with 147 Track One patents.
Please don't think I'm defending Google, I don't like many of their business practices. Nor am I defending Lee, I know no more of her than I have gleaned from this article. However, your highlighting the fact that Google got 6 times as many fast track patents as the next highest company has absolutely no meaning whatever without comparison to the total submissions and analysis of the timeline.
So Google had 14% of the granted fast track patents, how many did they submit? If Google submitted 875 requests the story is very different to if they submitted 8750. Are the Google submissions 14% of the total submissions or 0.14%? How does Googles grant/reject ratio compare to that of Huawei? When did they submit them is pretty relevant too. If they submitted the first 4000 patents lodged under the scheme the question becomes one of how were they able to react so quickly rather than why did they get so many passed.
Normally in entertainment if you know with absolute certainly where the plot is going and what the ending will be be there's actually little entertainment in it. It is certain where Whisper is going though just how much circling they do before they gurgle out of sight isn't clear yet. Nevertheless I shall immensely enjoy the show, there hasn't been one so utterly predictable, deserving and amusing since Phorm.
This will be interesting to watch as various legal systems will be involved. China will of course do absolutely sod all about the counterfit makers. The American legal system would, if FTDI were American, defend it to the ends of the earth. But FTDI is British and if there's one thing the Merkin legal system likes to do it's screw a foreign company. If I were Fred Dart I'd be closing down the US listed company, the UK legal & political systems won't offer it any help. The UK doesn't have a class action mechanism so the legal system here is unlikely to do anything for the consumers. FTDI might find themselves under the spotlight if they have breached the computer misuse act, if so there will be years of court procrastination that end with a slap on the wrist.
One thing is for sure, the only winners will be the vampires lawyers.
I don't know how this myth ever gained traction. Almost none of the shortcuts I had ingrained into my fingers work post-2007.
It gained traction because Microsoft said it was so, it was both true and a whopping fib at the same time. The direct ones such as ctrl+p mostly did I think survive. What we lost wholesale was keyboard navigation of the menus. If I had a pound for every time I've typed alt+f, v or alt+f, u and immediately cursed Ballmer to hell and damnation I'd have a considerably smaller mortgage by now.
I don't read IP theft for economic gain in this, just inserting back doors for NSA use. The sudden shut down of TrueCrypt springs to mind, perhaps some in the team began to have suspicions about the motives of their colleagues.
The unfortunate thing is that Snowden or not, this would eventually have leaked out,
Yup. Humans are unreliable, naive to think a secret as this big could be kept indefinitely even with careful compartmentalisation.
I recently implemented a whitelisting system for a client, the one in an orange wrapper. The customer was sufficiently clued in to understand the flip from blacklisting via antivirus & the like to whitelisting. It was quite easy to set up but eye wateringly expensive. Really quite unbelieveably wallet wilting and yet the orange box solution is at the cheaper end of the whitelisting scale.
It needs a few of the AV firms to start offering a whitelist alternative, priced at double the cost per seat of their blacklist product is would sell. The current whitelist products are orders of magnitude above the cost of AV.
The reg are doing a lot of this lately. it is just an excuse to drop some more links into the article, presumably there's some ad network referrer profit involved. Best thing we can do is make sure we don't click the links. If you are interested to read the link copy the visible web address into a new tab
Sounds like a normal project to me.
Manager: Right, this is the kickoff meeting for our notspot project. Our target is all these sites by the end of 2013 which means we need to start installation at the end of the month.
Engineer: Not a chance, we've craploads of engineering to do before we can start planning sites. Once the sites are validated then we need permission, access rights and a hill of other paperwork. Only then can we start thinking about installation.
Manager: The project plan shows that we will deliver this many sites by the end of 2013.
Engineer: The project plan was drawn by a salesman therefore by definition it is bollocks. The information we have received from the customer is riddled with errors and inconsistencies. With the number of engineers assigned it'll take a year of back and forth to the customer just to get our starting info usable.
Manager: You'll just have to manage with the resources we've got in the time shown on the plan.
Engineer: Why have we got so few resources? The budget for this is huge.
Manager: I've no idea (thinks: oh yes I have - kerching). I'll ask for more at the next management meeting (in a fly's eye I will).
Engineer: There isn't even any time on the project plan to allow for planning application delays.
Manager: Good point. I'll instruct the planning team to start making our applications now.
Engineer: Look you moron, put down that yacht catalog and try to listen. There is no point getting permission until we validate what sites we need. We can't do that until we can select our sites in a sane fashion and we can't do that until our customers give us good quality data.
Manager: I will not have such negativity on my project. We'll change the project plan to show design, engineering, planning application, regulatory requirements and construction as parallel tasks then do the documentation at the end (thinks: Money will have run out but I'll quit before that happens & I'll be cruising in the new yacht this project will pay for).
Engineer: I give up.
Using the bullshit scheme that only HD manufacturers believe in $7k for 64000 GB is $0.109/GB
Using sensible numbers it is $0.117/GiB
Since anyone sane would use RAID5 at the very least the it goes up to $0.134/GiB minimum unformatted.
After formatting it'd be slightly more and usable space would be a little over 50TiB.
That both sucks and blows at the same time but not it the way you'd want of a vacuum cleaner.*
* To be fair it's fine so long as you empty it when half full, change the filter every time (washable thankfully) and change the HEPA filter twice a year. Got a soon-to-be-banned 2kW Miele now.