Well, If I'd have known
The cleaner sat on them. He.. um.. farted." I would have a new chair too!
6072 publicly visible posts • joined 10 May 2010
3-D printer = Robot? I've seen a bit of press for 3-D printed houses. Just one example.
https://www.dezeen.com/2021/05/06/3d-printed-home-project-milestone-eindhoven/#:~:text=A%20boulder%2Dshaped%20concrete%20house,the%20key%20on%20April%2030.&text=The%20home%20was%20designed%20by,the%20shape%20of%20a%20boulder.
It doesn't seem a big leap that one of these rovers on Mars could have a 3-D printing arm. Water for your slurry becomes the issue.
this iMac is the last computer I buy? What if it checks all the boxes for me? What if it is fast enough for my needs?
Just playing the devil's advocate here... I would never invest personal cash in Apple directly, I have bought some second hand and even more donations, all machines that can be upgraded to some extent, 2gb of ram to 3! whoo hoo!
"All seems to be making a point but without any actual useful outcome."
Correct you are! But this whole exercise surely paid lots of people lots of money, and looks good on their CV. If you call that useful outcome...
Remember Gordon 10 in your report!
Big Brother icon because he's probably here in the dungeons of El Reg Forums and Comments taking notes.
I saw a whole different story unfolding... Little Jimmy saying what's this red one do? Little Johnny not to be left out, says watch this! And proceeds to push one of the red ones with smug confidence. The button depresses and pops to the out position and silence in that area. All that can be heard is the pitter patter of little feet scramming into the distance!
If the crims can encrypt the data, does that mean they can also have a peek? Would be very nice to find the folder containing which companies have Malware insurance, and which don't, and which companies are more or less secure, as I know these questions are asked before insuring any company...
Colorado was one of my points of interest should I have to move back to the USSA... I have many friends there, and a few relatives, shame really. My family loves vacationing and visiting relatives there and camping in the mountains. Looks like the south of France has moved up a notch on the list...
Not in the first two worlds, but I believe that some 3rd world countries may...
However, a quick google informs me that in late 2020:
there are 492 Boeing 747s in service, stored, or on order with airlines worldwide. 157 of these are passenger aircraft. 35 are in use, while 122 are in storage. Of these 35, 21 are passenger versions of the Boeing 747-400. Lufthansa is one of the only airlines operating a significant number of 747 aircraft for passenger flights.
https://simpleflying.com/only-35-passenger-boeing-747s-remain-in-service/#:~:text=According%20to%20Cirium's%20analysis%2C%20there,of%20the%20Boeing%20747%2D400.
I stand corrected!
True Boilermaker is shot of whisky and a beer, the braver souls would drop the shot glass in the glass, and hammer it back in one go... Others would sip both. I learned this at my dad's knee, the guy I'm slowly becoming! And I have the greatest respect for both the old man, and his old man, they are both missed daily.
The kind that show up and bark a few ill thought out orders and storm off, only to return a few days with newer, better, ill thought out plan! Only to show up next week and call a meeting to come up with a better plan!! That was a year in hell... two times with two different bosses.
Spawn of satan as he has the biggest mouth of the icons available!
IMHO the modern browser is too powerful. Found this interesting read...
Attacking the internal network from the public Internet using a browser as a proxy.
https://www.forcepoint.com/sites/default/files/resources/files/report-attacking-internal-network-en_0.pdf
We have shown a chain of attacks that can all be made from the public Internet, even in face of a
firewall: via a victim browser you can look for hosts and open ports on the internal network, fingerprint
the open ports and finally exploit them. The only security issue needed for this attack chain to work is
that the service to exploit is vulnerable to CSRF. Other than that, every step of the attack relies on things
working as intended.
Yes, they run in packs... and usually run a waste disposal entity. Dipping your beaks in places not welcome by Organized Crime is a way to end up as death statistic. You gots to be part of the system, or an opponent.
There is plenty of room for small time Johnnies, but usually that operation will be "absorbed" by the group already controlling the area. It really is a corporate structure, not so may laws.
Disclaimer, I grew up near Chicago and lived there for 3 years while in Uni, while working the food service business. It was all loosely connected, with a few names at the top. Some had the same last names as politicians, coincidence to be sure...
I find myself doing another easy task while companies piss their money down the advertising sewer, I come back when I can click skip add>> I know it can be attention jarring to switch gears, but welcome to IT, where if you're not changing gears once a minute, you're doing it wrong!
No matter how good the advert is, I rarely, rarely! I say! buy anything offered up by google or any other mechanism. I buy when I'm in need, then I shop around. In the long run, somebody will actually save money! And not even know it... Sad isn't it?
Snake oil for all my friends at the bar!
I had it on LP\45s for the house, I had it on 8-Track for the car, before I had it on Cassette for the car, before I had CDs in both places, thankfully these days, I am using a thumb drive with more music than I can listen to in 10 car trips to work.
Don't believe the hype!