Re: The single biggest problem with turbulence
Turbulence can hit without warning, and if you've got the trolley in the aisle when things start getting bumpy, wedging it in place might be the best you can do.
2293 publicly visible posts • joined 10 Jun 2009
Also note that if you've got wings in a line and they then both go up 45 degrees, the angle between them is 90.
Especially on larger aircraft, it's always fun to point out the wings to kids before take off and tell them to look at the wings when flying. On the ground, the wings are hanging from the fuselage, in the air it's the other way round and the tips will be several feet higher as seen from inside the aircraft. A quick impromptu science lesson.
I can see a sudden rush of people going into their bank branch for transactions again, just like it used to be.
Except no, most people will carry on because in could never happen to them (until it does).
There are reasons I only do banking transactions from one machine at home, and even on that one I decline their offer to 'remember me'.
Having said that, my bank does use 2FA for on-line banking, and one of the reasons I only bank from home is because that's where the card reader is.
Sunny California uses the driver's licence (-se?) as official ID. Those who don't drive can get an equivalent official ID from DMV if they want to. Quite a few places ask to see it, often if you're making a large purchase with a credit card, but it's not the intrusive thing that would have been the UK ID card. You hand over your credit card (or swipe it yourself, or occasionally put it in the chip-reader slot) so they already know who you are, then they ask to see ID, so you show then your licence, which looks official and the photo looks vaguely like you, and that's it. No logging into a surveillance database that you bought such and such an item at a store, it's very low key and there seems to be no push to make it worse.
Now, if the UK had started along those lines they could probably be introducing their huge database around now.
For cable modems the US cable companies do at least allow you to purchase your own box rather than rent one of theirs. There is a list of approved boxes, although in searching for the ones that support VoIP I found several hens' teeth on the journey. So now I have my own box, it's been installed just over a year and has probably just about paid for itself in terms of saved rental costs. It works quite well too, unlike the one they'd been renting me up to that point (which they'd broken with a firmware upgrade).
It would be interesting to see how this works out with the TV boxes, there's a whole different product requirement there.
On the other side of things, I don't remember having a choice of box with UK cable, but then there wasn't an explicit line item for rental either, and part of the sales pitch was that if it broke they'd fix it or replace it for free. That doesn't happen if it's your own box.
Perhaps they need to learn a bit from BT and require the big almost-monopolies to provide access to the subscriber base similar to how ISPs have access to BT lines in the UK at a sensible cost. While not perfect, it would be a huge improvement over the existing arrangements where there is no effective competition. It is notable how the cable companies have improved their game when Google fibre has come to town.
That's changed - a lot of places in the US you're expected to swipe your own card in the reader, presumably for exactly the same reason. However, you often have to either show it to the cashier or hand it to them after swiping, it appears that they have to manually enter the last four digits of the card as some sort of proof that they've at least looked at the front.
I once suggested to my UK credit card company that they should find a way to assign a 5-digit PIN to people wishing to use their cards in the US which would allow them to work in petrol pumps and provide a bit of security while doing so.
You can normally use a foreign card, it just means you have to go in and see the cashier (and leave your card there, which is definitely dodgy) while you fill up, then go back in to complete the transaction afterwards. Or carry cash and use that.
Apparently Americans can't cope with having to enter a PIN (despite needing to for debit cards). That's the gist of what I got when my US credit card company upgraded me to chip-carrying cards. Even now, most of the readers I use have the chip slot taped up and people are expected to swipe the mag strip, so clearly there's still a long way to go.
Can the code be adapted and modified so I can run my own server inside my firewall and talk to all these IoT things? That's what would be really useful for me, so I don't have to trust my private information to unknown servers in the cloud which might be leaking or selling that information. So far the closest I've come to an IoT think is a couple of D-Link cameras which are expressly blocked from the internet by the firewall.
Surely it can't be that hard for the website to run server-side scripts for ad-loading? That would blow away the need for all the javascript crap on the client side, which would make things much more secure. All it needs is a link between host and ad server so that the host can pass a request for a URL to the ad server and insert that URL into the page it's about to serve. Doing it this way means the client only gets to load static images and much of the concern about a blizzard of tracking cookies goes away (not that the host can't pass on information to the ad server).
Even harder to block is if the images are on the host site, which is told which image to serve, so the client can't trivially filter images from the ad server. It also makes the host appreciate the bandwidth consumed by the ads and so applies a bit more pressure on the advertisers
I mean honestly, how many people didn't set Windows update to auto check, download and install updates on previous versions of Windows?
More to the point, I always go and disable automatic updates. The OS is free to tell me there are updates available, and I'll even let it download the files, but it doesn't do the upgrade until I say so.
If you've ever left a machine running a task overnight and come back to it the following morning to see the smug "updated" message and no trace of the work it was supposed to be doing, you'd probably be disabling auto-updates too.
There's also the previous history of borked updates - far better to let an update settle and make sure there's no outcry of "MS broke my PC!" before letting it loose on your own.
None of the people I know who run Windows 10 actually give a toss.
This might be because all of those who do give a toss have made other arrangements in order to avoid having to run Win10.
I have it on a virtual machine that I rarely boot up. It irritates me too much to use for more than the time it takes to apply security patches and even that's pushing it.
Android users were more organised and had filed their tax returns by the end of February, whereas iPhone users were still trying to figure it out right up to the 18th April deadline? Also, when did the H1B cap kick in? Once again, Android users figured out there was no point for this year after that point and stopped looking.
You'll just create a market for stolen credentials - access the site and it'll show you for free the ID details for a well-known politician, so you can enter those to go further into the site 'legally', where you can go buy a bunch of other ID credentials. Then you can go surf happily.
If all the websites are required to verify with a central database, then that's one hell of a scalability problem, not least a security one. If it doesn't have to verify then there's no onus on the individual to provide anything identifiable. Also, you can only verify the details provided, or are we all supposed to fit cryptographically-protected fingerprint or iris readers to our PCs, phones and tablets?
A good learning experience for the students on the perils of data loss.
I know for my final year project I had the document on a floppy disk at home, one at work and used a third to transfer the file from one place to the other. Plus a hard copy print-out updated at intervals so I could at least type it all in again if necessary. I don't think I suffered any disk failures, presumably Murphy was too busy picking off the low-hanging fruit at that point.
I still have a 16MB USB stick. It is in a plastic case, not titanium, it is not bent and it still works. I think it cost me over a £/MB at the time.
I've also still got a machine with a 5.25" drive on it that still works, having found some disks that fit it the other day and wondered what was on them.
Oh, and a TI-58 calculator, baby brother of the TI-59 but without the card reader.
I assume the quick fix to that is to run your own local DNS server(s) and block DNS at the firewall for any local IP/MAC address except that of the server. That forces everyone on your network to use your local DNS rather than use Google or OpenDNS. An exploit that was good enough to be able to spoof the DNS IP/MAC might still get around it. It also assumes that the local DNS won't forward incomprehensible packets on the basis that it wouldn't know where to send them.
You missed the option to forward it to someone else on the company email list, preferably someone with a similar enough name. I occasionally get email for the person whose name appears below mine in the company directory although never in the category described in the article.
Then I'd remove the email catch-all and let the stuff bounce back to sender to teach them to type it properly. It's a minefield to be party to the email of others without an official policy and you're better to just not go there. Hell, paved, intentions, good and all that.
Part of the problem is that the "good" guys were caught with their fingers in the till, so even the ones who were supposed to be looking after our best interests are not to be trusted either. That's why we need a new system, the old one has broken (assuming it was ever not-broken).
Sorry to mess with your stereotype, but these days, engineers carry tool cases or even briefcases,
So she turns up with a briefcase. Is that where she keeps her briefs?
I have to admit when I saw the picture and the implication of in-your-end-o, I had flashback to some Star Trek comedy sketch where someone shouted "Scotty's been grabbed by the Klingons!"
This is why I don't like cloud-based IOT things. It's got to talk to a hub controlled by me inside my firewall and not leak useful data to a third party.
Having recently been burned by the Nook GB exit and the loss of about a third of the books I paid for on the platform (the rest won't get lost now...) I'm not feeling the love for having my stuff beyond the firewall.
I don't think I qualify as a PHB, and my shadow IT is at least done in cooperation with the official IT, but they don't know what I need and I do. It involves a Linux VM in the server room which I get to set up as I see fit. I managed to strew a couple of banana skins for the unwary, I forgot that the default set-up doesn't allow root login either via SSH or at the GUI screen, so despite giving the password to IT, they couldn't get in until I set them up a user account with sudo privilege. (IT uses remote desktop to the GUI, I use ssh so I didn't even think of it.)
You only need look at the BBC's article about ten things that might have been April Fools but weren't to realise that reality is rarely outdone by the comics.
1st April is the only day of the year when people critically evaluate what they read on the internet. the rest of the year it's obviously all true.
When I asked the management to prioritise the ten projects, six of them were assigned priority one, three priority two and one priority three, which didn't really solve anything.
You can try to resolve that by comparisons. Take two of the priority one tasks, ask the management which one is more important, preferably in email. Repeat with other pairs of apparently equal tasks until you get an ordered list and am email trail to justify it. Then work on the list in order. It doesn't stop management being an arse later but it might help. Try to avoid circular references so that A>B, B>C and C>A, which may need a bit of thought and deduction when asking the questions.
I'm interested in why I got so many downvotes - is it because I implied criticism of Apple and the fanbois got upset? I'm actually on their side on this one, but I can appreciate the way the FBI are fighting their propaganda war. Until they produce the actual iPhone properly cracked and reveal what was on it, it might all just be hot air and sour grapes on their part. Saying they've done it but not passing on any information about how it was done or proof that it was done is, as I said, a kick in the nuts. They probably didn't want to risk a long drawn-out court case and possible adverse verdict at the end, so they've found a way to back out of it.
VNC is promoted as 'easy'. The problem is that the only easy thing about it is the 'getting hacked' part. In my experience SSH is easier and better, so it is hard to fathom why people keep messing with VNC.
It has its uses. Mostly I use ssh because all I need is a terminal window and that will do pretty much what I want. Where VNC comes in handy is where you need to set up a GUI application for a remote user, such as my father, who can be a tech support nightmare. I can set up a VNC session as him and either see what error he's getting on a GUI program or configure it properly for him. While it's theoretically possible to set up Thunderbird (as an example) entirely with text files, it's a lot faster with a GUI.
That doesn't mean I dispense with ssh - I need that to get in to the machine and start the VNC session, which then gets taken down when I've finished with it.