Mary Pankhurst chained herself to the Houses of Parliament for female equality, you know!
Umm, Emmeline (Emily) ITYM
4259 publicly visible posts • joined 19 May 2010
It really needs Howard Wolowitz screaming during the launch to add some excitement.
Actually I was thinking how very relaxed about it they were compared to American launches I've seen.
This is in no way a criticism of the Russians, though, I thought it was refreshing to see how matter-of-fact they were about the whole thing - calm professionalism instead of artificial drama.
Vehicles, including main battle tanks, depend on police and guard services to protect them from vandalism. There is no way to prevent bricks though windows, keyed door, and knives through tires.
I think you might have picked a better analogy, I really doubt it's possible to chuck a brick through the window, or knife the tyres, of a main battle tank, and I'm not even sure you could successfully scratch it with a key...
Being a rather naive right-pondian, it amazes me that you Americans accept as business-as-usual what I would consider to be the height of amoral and corrupt practices in your local and national politics.
I don't think I view the world through rose-tinted glasses, and I know that British MPs are not paragons of virtue, but I find it hard to believe that the sort of bribery and political influence that is described in this article would ever be condoned in the UK.
@Mike Shepherd.
I agree that compared to take-off loads any forces will be small, but whilst all space launch vehicles are designed to withstand those launch forces vertically, I'm not so sure about sideways loads.
Would current US launch vehicles (for example) withstand the off-centre forces of installing the payload with the craft horizontal, or would that have to be built in as extra?
Court+Search warrant for specific object == Legal Oversight.
If it works for your bedroom closet it works for your phone.
There speaks someone with no comprehension of the ramifications of this case.
If Apple are forced to provide a way to bypass the security on this one phone, there will then be hundreds - if not thousands - of requests / court orders for the same to be done for other phones.
At that point, it is 100% certain that the code to carry out the bypass of security will no longer remain in Apple's hands, and will find it's way, firstly into the FBI's hands, where they will use it indiscriminately without oversight, and secondly into the hands of the criminal fraternity, at which point it's game over.
"As this case makes clear, we will investigate and pursue charges against individuals who abuse the financial information of American consumers."
I nearly spat my cornflakes over the keyboard when I read that, I was laughing so hard.
Yes, so Long is a criminal, and deserves to do time, but it's seemingly OK for banks and businesses to abuse the financial information of American consumers, but if an individual does it: Oooh, can't have that...
The BBC's reporting of this story contains the following gem:
The Report revealed up to 50,000 records of under-18s on the Police National Computer (PNC) may be incorrectly showing that their DNA profiles need to be erased after five years, when they should be stored indefinitely.
However, a number of problems have emerged which indicate that profiles are being wrongly kept on the database, including 4,650 profiles of people classed as "Wanted/Missing" on the PNC.
So if I read this correctly, any under-18 should have their DNA profile stored indefinitely. Surely this is wrong?
“The 'greybeards' are still going to be there to build the automation and build the interfaces and the programmatic ways that they want to interact, because they know their networks better than anybody,” West told El Reg at Cisco Live in Melbourne this week. “They have grown and lived in those things.”
Now Cisco thinks those greybeards, even the experts holding high level certifications like CCIE and CCNE, will spend less time rummaging around under the hood and more time talking to business people.
Speaking as someone who has a beard of the requisite colour, I don't think the second paragraph is true at all, given that it is recognised that we of the hirsute persuasion are the ones who make it possible for the clever automation and scripting to work.
In West's view, sublimating the CLI therefore means NetAdmins can make their other skills more prominent and profit as a result. That's a story plenty of Sysadmins were told as server virtualisation took away the need for server-related drudgery.
In my experience server virtualisation doesn't take away the need for server-related drudgery, it just adds an extra layer of complexity which also requires managing.
Whether a server is virtual or physical, it still has the same management requirements, and although individually a virtual server may no longer have the associated hardware management requirements, those just transfer to the host hardware - you still have to replace broken bits, just not on a per server level.
I came to say the same thing, it looks very much like a Scaled Composites design - not just the windows, but the tail too (which has traditionally been a way to tell designer's work in aeronautical circles).
Edit:
Having looked it up, it appears that Bert Rutan was not involved, but it sure looks like one of his.
@AC
What I don't get is why organisations don't use whitelists.
This is almost certainly not how the infection was introduced, it is much more likely to have been an infected attachment in an email.
And whilst you can try to minimise the risks there, (and software is available to catch most known infections) if you are in a public service environment like a local council, you cannot just block all emails with attachments, or from unknown addresses, as you will receive hundreds of perfectly legitimate emails which look just like the dodgy ones.
Some years ago our company staged a corporate event for the new improved version of one of our web-based products, where new and existing customer's representatives were to be given a presentation and then a live demo of the new features.
The company chose an hotel with conference facilities as the venue, and the week before the event, we of the sysadmin team went and carried out a full dress rehearsal to make sure that everything was in place and worked.
The presenter's rostrum had power connections and a VGA connection to the built in ceiling mounted projector, but no ethernet connectivity. However, there was an adequate WiFi connection, from an AP that was located in the roof space of the entrance hall to the conference room, as we later found out.
Using a laptop, as was planned for the day, the testing all went smoothly, so we were happy to report to the chairman that there were no problems with the venue.
Come the day, the presentation (Powerpoint, what else!) in the morning went well, but at lunchtime I received a panic phone call saying there was no WiFi signal, so they couldn't do the live demo section of the presentation, and the venue had no IT support.
I drove to the venue, and on arrival, some quick testing showed that whilst the conference room was empty, the WiFi worked as advertised, but once the room was filled with 300 guests, the signal just got soaked up by all the big bags of water wandering around (the guests), and never made it from the back of the hall as far as the rostrum.
The nearest accessible ethernet connection was the 24way switch located under the desk in main reception, so I grabbed a 100M reel of Cat5 out of the back of my car, and it was threaded from the rostrum at the front of the conference hall, out of the doors at the back, and along through the corridors to reception. Two quick plug terminations later, and all was well.
The chairman gave me some grief about not testing properly, but short of hiring 300 extras, what could I have done?
I did have words with the venue manager though, and explained that one weedy access point in the roof was no bloody use.