* Posts by PyLETS

682 publicly visible posts • joined 11 Jul 2011

Page:

Review: Intel 335 240GB SSD

PyLETS
Boffin

7% overprovisioning and a data protection nightmare

Knowing that you have securely deleted unwanted personal data seems easier to achieve on spinning media.

The overprovisioning is likely for blocks to be put out of active use, due to having exceeded safe write cycle limits. Presumably also marked out of use blocks will also contain last written data intact, ready to be found again through investigation of disposed of equipment, likely involving personally or commercially sensitive data.

There's an article here which needs to be researched and written. So when will reviews of this kind of equipment include information about secure deletion capabilities of these devices, or do purchasers have to compromise environmentally safe electronic disposal by shredding and burning disposed devices in recognition of Data Protection Act obligations to delete sensitive personal data ?

Panasonic: We'll save Earth by turning CO2 into booze

PyLETS
Boffin

long time before they match cost of sugar beet or cane if ever

Harvest the sugar, ferment it to between 15 and 20% alcohol and distil, using the dried leaves and stalks to fuel the distillation process. And before some smartarse asks "what about the fuel used to drive the tractor ?", a farming friend of mine reckons that 10% of land would be needed to grow biodiesel to power agricultural machinery, compared to when 25% of agricultural land was needed to feed the horses.

Also when you use the ethanol as personal or machinery fuel, the C02 goes back into the atmosphere.

Hydrogen on demand from silicon nanospheres - just add water

PyLETS

price of caravan fuel cell fuel

I looked at the specs and prices for fuel cell fuel from the nearest dealer of these to me : At 0.9 litres methanol fuel /KWh and 20 litres costing £110, that's £4.95 per KWh

https://www.roadpro.co.uk/retail/product_level_2.aspx?prod=EFOY+Fuel+Cells+

Kim Dotcom's locker may be full, but the cupboard is bare

PyLETS
Mushroom

packages of bits can't be made scarce

Canute's lack of control over the tide springs to mind. It doesn't mean that music in other forms isn't valuable, e.g. played on the piano in my home, going to a live performance for which tickets are sold, music used to attract arts council grants or sell other goods commercially or written to promote other events etc.

Musicians' livelyhoods can't be equated to destruction of the Internet, or an Orwellian programme of spying, monitoring or control over it. I know many musicians but none who want that.

China turns to no-name handsets: Android - without the Google-iness

PyLETS
Mushroom

Protection racketeering and corruption inversely related to commercial effectiveness

The same argument applies to the costs of doing business in places where bribes are neccessary to buy off corrupt government officials or as protection money to Mafia gangsters.

"Perhaps as China is brought out of the Wild West into the patent-fee paying trade community, then no-name handsets won't suddenly seem so cheap."

Very funny. Perhaps the Chinese have more sense than to burden their technical innovators with the cost of having to support the inflated salaries of millions of patent lawyers and patent officers ? I don't think so many of the low quality mobile phone patents being litigated and negotiated in the US due to this protection racket would ever apply in Europe. Many of them would never apply in the US, if the defendants could afford the litigation cost more than the Danegeld required for settling out of court.

So, perhaps someone could explain why having millions of bad patents has a positive effect on doing honest business when it's very widely known that corruption and racketeering have a negative effect ?

So whose army is going to bring China into the "patent-fee paying trade community" then ? That would seem to me a bit like a historical rerun of the Opium Wars.

'End of passwords' predictions are premature - Cambridge boffin

PyLETS
Boffin

Cracking is inherently parrellel and IPV4 death throes

All an attacker to do is split the dictionary range into however many machines are run in parrallel to do the job. You can still expect most passwords to be crackable on a large enough botnet even if the hash algorithm is run iteratively on its output for 10,000 iterations, sufficient to give a noticeably longer login time on most desktops or servers. Keeping passwords secure requires your enemy does not obtain a copy of the stored hash and is locked out after a certain number of guesses. What will break this is carrier grade NAT installed due to IPV4 address depletion, because locking out an attacker after 10 guesses means locking out many of your honest users as well.

We trust computers to fly jets... why not trust them with our petabytes?

PyLETS
FAIL

Not convinced a market can handle this requirement yet

Markets are wonderful resource-allocation mechanisms in environments where we have backups due to their chaotic nature. But this article proposes we entrust our backup storage to a market, where vendors with cash flow problems are likely to tell untruths, especially when questions are asked about their reliability, and we want computers to be able to see through such lies made to them by other computers ?

MegaUpload showed us that cloud storage is not inherently as reliable as storage we manage in house. What this proposes seems much worse, but no doubt we'll be seeing plenty of purveyors of emperor's clothing to cost reduction specialists who will be in another job in six months' time where they will be unaccountable for their current decisions.

Sheffield ISP: You don't need a whole IPv4 address to yourself, right?

PyLETS
Gimp

IPV6 transition can happen now

It's already happened as far as I'm concerned - home network and hosted server and applications I maintain all upgraded to run dual stack. That's even though my best available ISP (Cable offers better speeds than ADSL) is IPV4 only, so I tunnel IPV6 over IPV4 using protocol 41. I had to do something similar to get Internet in the late eighties by tunneling IPV4 over X25. Well, now that FTTC makes better ISPs available in perhaps the next 18 months, my existing one (Virgin Media) is going to have to offer dual stack pretty soon, or I'll be ditching them for one of the ISPs which are offering IPV6 natively. At least Virgin Media don't block protocol 41, like some crummy ISPs do.

I suspect most consumer equipment could be firmware upgraded to run dual stack, and ISPs providing tunnel servers more locally could support consumers they can't firmware upgrade without requiring hardware replacement.

Tiny Brit island stranded after £10m undersea fibre plea sunk

PyLETS

@Keep Refrigerated

Either give up the territory if you're not prepared to maintain it, or dig into your pockets!

Being able and willing to do some good and helpful things for a population which wants to remain a British Overseas Territory doesn't mean UK mainland and Ulster taxpayers are obliged to do everything for them or tell them to become independent when they don't want to.

China turns the screws on netizens with real-name registration plans

PyLETS
Big Brother

Yes my ISP know my name

It's not difficult to know who lives long term at any particular address given the local political parties have the unedited version of the electoral register. But my ISP doesn't know the names of everyone who uses my WiFi or the wired network on my side of the router. In practice I can imagine many Chinese users sharing login credentials in practice if such become required routinely to get through the web proxies. Next they'll be locking up users for doing that.

I'd also hazard a guess that the restrictions on IPV4 address availability and the inevitable breakage which comes from multiple NAT layers work pretty much but not entirely on the side of the Chinese great firewall management. IPV6 seems potentially like a breath of fresh air in comparison, as it appears to allow for all sorts of unofficial and potentially interesting ways of privatising address management and routing.

The 'Digital Economy' in 2012: A big noisy hole where money should be

PyLETS
Big Brother

transaction costs, recombination and non-enforceability

The idea that because content creation status is stuff which can be owned it must therefore be controlled leads to the evils identified in the article concerning non enforceability, and the well-known and malign effects resulting from attempted enforcement against private non-profit making individual users. Having some kind of IP registry could help identify who owns what, just as the Land Registry did with another kind of property transaction. But that isn't going to be the whole story due to the transaction costs resulting from attempting to identify and control individual use especially where multi-layered recombination of content is involved, e.g. as in TV documentaries which can't legally be reshown due to rights negotiation logjams.

In my own industry (software) many if not most content creators (including myself) have abandoned the idea of charging for use of content due to the transaction costs associated with layered recombination overwhelming product value. So we free the source code and charge for education, training, consultancy time and support instead.

The fact is, so long as we have computers and networks the detailed actions of which are not under corporate direction content distribution can't be controlled. I for one don't want to live in a society where it becomes an offence for me to tell someone else how to find a working Pirate Bay proxy server - the idea of the courts controlling what we're allowed to know is as ludicrous as the superinjunction.

The acceptable solution has to be to get commercial beneficiaries pay for supporting what individuals who make no profit from use of content can be enabled to do with it, and to stop pretending what ISP service is for or that currently infringing uses can or should be prevented. This only works if the ISP or blank media manufacturer or importer pays a rate similar to how a shop pays to be licensed to play any music on its premises. People who make money out of something can afford a cut to the content creators for providing the content - but this should be a simple license paid by the commercial beneficiary for all content covered as a single contract, not hundreds of millions of individual contracts to individual content creators. Those who make money out of something can be traced and chased relatively easily while non commercial beneficiaries can't. It should then be up to the content creators through their collection societies which do the tracing and chasing to divvy up the rewards amongst the creators and crats.

The year GNOMES, Ubuntu sufferers forked off to Mint Linux

PyLETS
Linux

many choices of desktop manager

I think this currently means Linux on the desktop is likely to appeal to those like myself who like having such choices, but many users don't, which is also likely to continue excluding Linux from the (declining) mass desktop market. Unless someone with a large share of the hardware market, access to distribution channels, willingness to annoy Microsoft and Apple and who wants to avoid software purchase cost at the expense of greater software support cost decides to sell competitively performing and priced PCs preinstalled. A Google or Canonical tie up with Amazon maybe, or some deal involving all 3 ?

Interestingly that as the desktop declines, to be replaced in many cases by tablets and smart TVs, Linux is doing very well in non desktop computers.

Canadian man: I solved WWII WAR HERO pigeon code!

PyLETS
Boffin

security by obscurity

invented public-private key encryption but due to the usual utterly short sighted british civil service mentality , decided not to reveal it"

Cryptography was considered by this culture something to be kept secret as it was thought your enemy would then find it harder to break. They were aware enough in the seventies of Kerckhoff's Law in relation to the requirement to be able to rekey a system in case an enemy learned a security system design, so by rekeying the hardware implementing this cipher could remain secure, but this came from a culture where non-disclosure of system design was genuinely believed to keep a system secure for longer than would otherwise be possible. The Bletchley Park WW2 Enigma crack was still kept secret until the late seventies and there was a cold war on, because the captured Enigma hardware had been sold on, to new customers who were assured it was still secure and upon whom the UK intended to spy.

Yes it's a very real shame in many ways that such important discoveries were sat on and languished unused - or used little as a consequence. But not publishing Clifford Cocks' public key system until 1997 didn't have such a negative effect on the development of British computing as keeping the Bletchley Park work under wraps did until the seventies. Even so, the more widely usable parts of the Bletchley Park work were reinvented in UK academic and commercial circles - at the cost of a significant few years of development, enabling IBM to capture most of the early computing market.

Raymond's Law: "given enough eyeballs, all bugs are shallow" adopted by the NSA when the SELinux Mandatory Access Control patch was contributed to the Linux community, and the understanding that cryptographic systems were best selected following public peer review e.g. as with the AES design competition, would take another 20 years or so to be widely adopted as the more sound engineering practice.

Wikipedia doesn't need your money - so why does it keep pestering you?

PyLETS
WTF?

Useful to scrutinise charities

I think the RSPCA is also overdonated in relation to the service they provide and in relation to charities which help people not animals. Clearly both the RSPCA and Wikipedia do useful work, but givers do need to think about sustaining smaller and also worthwhile charities which need smaller funding over longer terms to be effective. One thing Wikipedia do which I support and which I suspect gets up Andrew's nose is their take on freedom of information in relation to copyright business models which intend restricting such.

ICANN'T believe it's not Apple: Vatican wins domain-handout lottery

PyLETS
Boffin

Where the money hits the fan

No doubt ICANN execs are dreaming up their next years bonus packages right now. At the expense of making brand protection more expensive, and making life much easier for those wanting to register something.like.yourbank.whatever . Countries wanting non-latin TLDs have been able to have these for years, see RFC 4185.

Perl programming language marks 25th birthday

PyLETS

A perl program I wrote

And I've run it every year for the last 14 to format my Christmas card address list into labels - 3 columns per sheet of 24. Perl was much better than shell scripts for more complex tasks, now superceded by Python for the kinds of work I used to use it for.

Coming soon to a theme park near you: Shocking ANTI-PIRACY NAG ADS

PyLETS
Flame

trivial and obscurely written patents

It's in the interests of patent lawyers to obscure and dress up a trivial and obvious development when helping write an application with complex and obscure language and it's in the interests of patent officers to accept a sufficient percentage of such applications or the application fees dry up. Those sitting in judgement of patent cases are likely to have been patent lawyers themselves earlier in their careers.

Given a license to print money at the public expense, who wouldn't run this press at full speed ? If you have made the mistake in career choice to be a genuine innovator rather than a patent lawyer, you've now got the prospect of fraudulent EU wide patents which can be litigated against you despite being written in a language you won't understand unless you are technically and legally highly fluent in French, German and English.

Pentagon hacker McKinnon will NOT be prosecuted in the UK

PyLETS
Childcatcher

Is there talent there that can be used by anyone ?

In the case of Robert Tappan Morris who was dealt with for a much greater hack (the Morris Worm) much more leniently and appropriately, he went on to become a computing science professor. In McKinnon's case, not being able to do anything useful for the last 10 years - during what should normally an extremely formative period of life - will have restricted his possible avenues of employment - and ability to contribute his talents to the good of society.

A hundred hours community service served locally to McKinnon's residence when the crime he admitted was commmitted would have been appropriate. Destroying someone's career prospects through his persecution by threatened extradition for a decade is a great loss to all of us.

File-sharing mom begs US Supremes to void bloated RIAA fine

PyLETS
Pirate

Kafka's Trial and peonage

I've read it, and it's a depressing book, describing circumstances seen through the paranoid imagination of someone suffering a severe mental illness made worse by cruel parenting. What they are putting her through is similarly inhumane, but unlike Kafka's imagined trial, this one is really happening outside of her head.

Peonage is all too depressingly a real form of debt slavery which keeps being reapplied to vulnerable people in order to exploit them for profit. "I own my soul to the company store" is part of a song describing this bookkeeping trick being used to keep vulnerable workers in a lifetime of servitude to their exploiter. It's a systems used by loan sharks very openly today, and by those pimping off illegal immigrants and child prostitutes also.

Effectively the US courts are saying to her that the RIAA own her, and everything she ever earns in her lifetime belongs to them. It's a form of slavery brought back in arbitrary manner reinforced by the US feral courts, and entirely at odds with the intentions behind the US Constitutional Bill of Rights. I hope she wins a legal battle against the form of slavery described as peonage more generally.

Republican staffer fired for copyright reform suggestions

PyLETS
Pirate

Re: Think interests not bribery.

"As much as copyright reform may excite the geek, it is not a big winner politically."

That depends how much it excites the 2% who might vote on this basis, and how many of them live in marginal constituencies. 2% voting on a single issue in marginal constituencies can concentrate the minds of mainstream candidates on this issue wonderfully, if these 2% are well organised.

Revealed: ITU's deep packet snooping standard leaks online

PyLETS
Boffin

Re: Yet another reason...

"To rent a server in a hosting centre and tunnel your traffic to it."

Worth doing if server and its address is shared between a number of users who can each plausibly deny any connection to particular packets, or is located in a country with more sensible privacy laws than where clients are located. If used for purposes of a single user in a place with similar laws and enforcement, all it does is shift monitoring of traffic from network belonging to ISP A to network belonging to ISP B.

Plausible deniability of particular packets if the server has multiple users probably also doesn't extend to the situation where traffic analysis makes correlation of unencrypted external packets with encrypted VPN packets, presumably associate by shortness of time interval and traffic size, so pleny of chaff on VPNs needed to obsure this association. Deniability also doesn't work too well if the hosting provider can provide the investigating authorities with binary copies of the (typically virtual) server image at any time to relevant authorities who can work out from this the relationship between internal users and externally monitorable packets. Some of the advanced virtual machine tools advertised now which offer live migration of VMs between physical hosts for load balancing etc, suggesting this kind of forensics to be entirely feasible.

So I think this privacy technique is only valuable to the extent you trust the laws and enforcement of the server hosting nation, or the extra cost of the attacks described to cause attackers to go after lower hanging fruit.

Littlest pirate’s Winnie-the-Pooh laptop on the way home

PyLETS
Pirate

Re: Shooting your own foot

If the jack boot is used too much, the whole notion of copyright is likely to be lost on the masses and then what?

What happens next is that Pirate Parties tell their supportes which candidates from other parties to vote for in a few marginal constituencies where Pirates are not standing directly. Useful for Pirates to stand in a few constituencies to help get the message across. Other parties learn rapidly how unpopular extreme copyright is, and learn that sucking up to big media interests wins them fewer votes than it loses them. Eventually we get copyright law reform to take non-commercial use outside of the system and to reduce copyright durations. Artists who have something genuine to contribute needn't worry - there's plenty of money to be made from live performances and commercial use of recordings. As to how popular the pirate message on this is, just count the numbers of up and downvotes here on this forum.

Forget fluorescents, plastic lighting strips coming out next year

PyLETS
FAIL

Re: State intervention may well result in de-civilizatory effects

End subsidies to carbon burning and I might agree with you - then there would be a genuine free market and those wanting to stay incandescent can pay the bills. We all pay these subsidies e.g. through insurance costs against more extreme weather, but that's only a small part of it. Problem with putting up electricity bills by ending these subsidies is too many grannies freezing in the dark unable to afford their leccy bills. So that isn't going to happen, and the state is forced by all our politics to intervene to encourage reduced wastage, give a fair break to nuclear and renewables and keep bills affordable. You can't change that so you may as well get used to it.

EU joins Google, hippies, Uncle T Cobbleigh in fight against ITU

PyLETS
Boffin

Re: Extra-Territorial Reach

There are an infinite number of bad things the ITU could hypothetically do, and are very unlikely to do based on their history, constitution and good reputation. If you don't want to be ignored by crying 'wolf' or claiming that the sky is falling down once too often about potential landgrabs the ITU has never seriously considered, then don't accuse the ITU of being likely to carry out behaviour entirely at odds with the history of what it has done in the past and does now.

One job the ITU has done well is manage allocation of international dialling codes to member states, and much more consensually and much less contentiously than what ICANN is currently up to concerning top level domain names.

Google's Drive + Gmail: A 10GB Dropbox killer

PyLETS
Big Brother

no such thing as "free" storage

If it works on operating system A but not B then this file storage system isn't using standard filesystem protocols. Which means when it does work on Linux you have to install some proprietary device driver to use the so called 'free' storage. Best done using a virtual machine used for nothing else, if you must and if you care about knowing what the software on your main machine is doing.

You may also want to consider only storing remotely if encrypted sharing the key with a friend you wish to share the content with or using asymmetric crypto - and if you look at the small print in the T&Cs and to the extent you can, you'll find that you're generally signing away your first born - e.g. the ability of some corporate to mine your personal data so they can more effectively target advertising at you.

Sony to do what Apple can't: Remove its batteries - sources

PyLETS
Mushroom

Sony needs to split into 2

It's a schizophrenic organisation. One part is concerned with making copying easy - consumer electronics e.g. a TV set which faithfully copies a signal into a moving picture. The other part is concerned with making copying difficult - the media division because that's what they sell.

So we have a company with one division which has a vested interest in sabotaging the other. Let the 2 have an amicable divorce and get on with life separately.

DNS servers filled with wrong Kool-Aid, big names waylaid in Romania

PyLETS

Re: Google's free DNS service

Used it temporarily and experimentally because it's IPV6 accessible at 2001:4860:4860::8888 and at 2001:4860:4860::8844 . So it enables a IPV6 only machine to resolve IPV6 only servers.

Probably more secure to setup and use your own DNS resolver, but it's another service to operate and maintain.

Badges for Commentards

PyLETS

Re: Awarded to user handle instead of account?

When I changed my handle for one single post only I wasn't allowed to change back, so since then my non-anonymous activity is under my second choice of handle. As to anonymity, anyone who googles enough could probably associate both my new and old handles without much difficulty.

Sandy Island does exist - on a 1908 chart

PyLETS
Meh

Re: Fake islands as copy protection

Another reason why the origins are likely to have been forgotten. This kind of deliberate error, e.g. as was used in published log tables for the same reason, had to be kept a closely guarded secret known to very few involved in the publication, because otherwise someone copying without mapping would more likely be able to discover the deliberate error making it worthless.

Something constructed as a deliberate trade secret is more likely to become forgotten forever when it dies with those who remembered it, and the original publication goes out of copyright.

Google, Apple, eBay shouldn't pay taxes - people should pay taxes

PyLETS
Boffin

Tobin was right

"Don't use the facilities e.g. roads."

A more useful facility provided by government for the purpose of taxing corporates is willingness to adjudicate contracts through the civil courts. Corporates and everyone else could be made to pay taxes based on money not legally transferring in respect of contracts becoming enforceable until a transaction tax is paid. A flat rate on each transaction could be taken by the financial service provider at point of payment, unless the recipient is a charity. This doesn't sit too well with continuation of use of cash, but the latter is getting as obsolete as the idea corporations shouldn't have to pay taxes because they can offshore if you ask them to. Corporations don't like handling cash anyway, so if the Tobin tax rate on transfer of payment is low enough (say 1% or less) this won't cause a large shift to using cash due to the security costs being greater than this for heavy cash users.

This would begin to rectify the injustice of the Forex dealer paying a tiny fraction of 1% on what he sells in taxes while the woman who cleans his floor paying 40-50% in taxes and loss of benefits for every pound she earns.

European Parliament votes to fight ITU internet power grab

PyLETS
Boffin

Nobody can regulate Internet traffic flow

You couldn't regulate who uses the English language either for similar reasons.

There's lots of ill-informed FUD behind this article. What ICANN regulates isn't traffic flow or what the Internet is used for. The Internet is a protocol, more akin to a language than any controllable thing. The job involves how the blocks of addresses are allocated and, more importantly, how the namespace (i.e. the DNS) is organised at the top level. ICANN, which does this job, would prefer to remain under California law instead of becoming responsible to everyone. What they do is more profitable for their executives that way. All the IPV4 blocks are gone and IPV6 space is unlikely ever to get short whoever manages it, so raw address management isn't really the issue here.

What's really at issue here is who manages the DNS naming root. ICANN seem to want to be able to pimp top level domains eg .whores to the highest bidder for executive profit. No way the ITU have ever been guilty of messing around in this sort of way with the international dialling codes, which they do manage uncontentiously. There's also some standards work to the extent this can be agreed - the ITU may be slow and bureaucratic, but that's the problem of working based on consensus.

In practice there's nothing to stop the ITU setting up an alternate DNS root zone if they want to and anyone else can. That's because it's a small file and easily obtained. OK if everyone wants to use your version of it, it helps to have some pretty powerful and reliable server clusters to serve it in every continent. It's then a question of where those who configure DNS clients choose to point these.

Evildoers can now turn all sites on a Linux server into silent hell-pits

PyLETS

Re: How it might be installed?

No system is secure against someone with physical access and a little determination. BIOS chips can be switched, and EvilMaid type attacks can be made against disk encryption if used to obtain the encryption key. This particular exploit wouldn't even need a reboot if the kernel module is dynamically loadable.

How Intel's faith in x86 cost it the mobile market

PyLETS
Boffin

No fluke - it's down to who has access to the source code

Mobile phone users generally are likely buy the phone and not the OS. It's the developers who choose the OS. Windows users will have to stick with X86 or migrate painfully because they usually don't have the source code for their applications, and so can't recompile these to run on a more advantageous hardware architecture. Apple corp and Linux users are able to change hardware platforms, due to having access to the source code needed. The Windows ecosystem requires so many third-party binary drivers and other binary blobs, e.g. Adobe's media viewers, that they can only migrate to a different instruction set by paying a massive emulation cost or losing most applications, which is what Microsoft are belatedly trying with their ARM surface.

Hackers break into FreeBSD with stolen SSH key

PyLETS
Boffin

How strong is their package PKI ?

It's difficult to install a Debian package without a developer signature or without knowing about the package lacking one. So there would be little to be gained by an attacker compromising a distribution server if the trojanised packages won't install and if they throw up warnings to users who have installed the default distribution keys. A successful attack on the PKI without anyone noticing (if that were possible) could be more serious. I'd hope the BSD developer community have taken similar precautions. Always a good idea to check the SHA1 hash signature on the .iso installation disk if doing a new install, which should give some degree of confidence in the default keys which come with the distro.

Patent trolling to go under anti-trust spotlight

PyLETS

trademarks quite useful

I'm in favour of a copyright system balanced in the interests of society as a whole, with shorter terms and enforcement limited to commercial use only. But trademarks don't create a monopoly, because anyone can create a new trademark to compete with existing players. Trademarks do reduce marketplace confusion, in the sense customers recognise trademarks and if they are enforced they mean you don't need to carry out an entire supply chain validation for everything you purchase yourself because you can obtain some level of confidence that someone else is doing this for you. I like to know when I buy organic that that's what I'm getting for example. The Soil Association and other reputable trademarks in this area help me know this to be the case. Remove legal protection of trademarks and it's difficult to see how you would distinguish dangerous fakes in the marketplace from reputably manufactured and supplied items.

If you wouldn't buy your medicines based on Internet spamvertising or at a car boot sale then I think this point is clearly enough made.

Boffins biff over ‘twisted radio’

PyLETS
Boffin

use smaller cells

Greater bandwidth per square kilometer is available on mobile networks by using more and smaller cells and lower power and range. If a cell transmitter is on every lamppost and domestic WiFi, and the signal level required based on weather and day/night conditions is negotiated by transmitters and receivers, frequencies are reusable at shorter distances between transmitters sharing the same frequency. Perhaps we could call this 'Cell Division Multiplexing'.

Astronauts (or other 'nauts) could find life on Mars quite healthy

PyLETS
Go

Carbon needed also

Storing hydrogen is much easier once turned into hydrocarbons, e.g. using Fischer Tropsch process. .

Using the hydrogen as hydrocarbon fuel, you'll need similar quantities of hydrogen and oxygen as you derive from water electrolysis.

Oxygen needed for breathing and growing hydroponics should all be kept within a closed system to avoid energy and material losses, and to recover C02 needed for the FT process. As to how much energy you need over how long a period, from that it's possible work out the size of a nuclear reactor or the number of square metres of solar panel. The development of flexible solar panels may eventually result in tens of thousands of square metres of solar collector being rolled up like carpets and not needing to weigh very much, so don't write this tech off as a competitor to nuclear based on how rapidly solar thin film technology is likely to develop compared to nuclear over the next 30 years.

There's no way we could send all of what's needed for this to Mars this decade, but I wouldn't entirely write off what may become possible given appropriate developments in materials technologies and minituarised manufacturing capabilities within 20 - 30 years.

Race for new top level domains now officially a lottery

PyLETS
Flame

Degrading the Internet for profit

Growing the number of TLDs creates increased costs for those wanting to protect legitimate brands and gives more opportunities to crooks seeking to create a website mimicking your bank's. And no doubt it makes ICANN directors exceedingly rich - just look at the size of the application fee. That's what comes from allowing a California company to control the global namespace. Whatever else you may say about the bureacracy and glacial speed of the ITU, no way they would allow profit making confusion in the area which they control concerning international dialling codes.

Hold it! Don't back up to a cloud until you've eyed up these figures

PyLETS
Boffin

wrong way around

If the sensible place to keep your data is where you process it and where your users can best access it, then keeping the main copy on a hosted server in a datacentre with professional operators, high speed multiple routed links close to the Internet backbone, secured power supplies and rigorous physical access controls makes more sense than locating it where I'm located. So in my situation the data is processed on the so-called "cloud" and backup occurs using the faster side of my ISP link, i.e. my download bandwidth. Also makes sense to automate it, encrypt it, and only download the differences. Rsync, SSH and Cron are my friends here.

I guess the exception described in the article is the seemingly legacy business model where most of the access and nearly all of the users are local to the site where you work. I guess that way around still applies in some internal data heavy environments, as opposed to where the bulk of your input and output relates to your external as opposed to internal relationships.

El Reg mulls Forums icon portfolio shake-up

PyLETS
Joke

A muppet

As to which one, well Kermit or Miss Piggy ? To be used for responding to a comment or commentard so described.

EU approves push to get the unknown security in ARM chips into use

PyLETS
Boffin

trust and betrayal are recursive

Technology is so complex that nobody starts a new software or hardware design entirely from scratch. Which means all the technology we develop has an element of trust in the layers from the past being built upon. A classic paper describing this trust issue from a software perspective is Ken Thompsons's Reflections on Trusting Trust . Hardware is just as complex, hidden and layered. Even if the chip design were open source, this wouldn't prevent the possibility of evil microcode features.

Devs cook up 'leakproof' all-Tor untrackable platform

PyLETS
Boffin

@koolholio: Re: Looking forward to see-ing this

As to reverse engineering, I supect you're not looking at the risk the developers are trying to defend against. The issue of anonymity isn't only to do with what plod breaking down your door and taking away your equipment can find. It's also to do with whether plod can identify the right door to break down, and my reading of this article suggests the latter risk is being defended by this development, and not the former. No doubt work could be done to combine techniques to defend against both risks, e.g. using encrypted hard disk partitions etc.

Steady Antarctic ice growth 'limits confidence in climate predictions'

PyLETS
Boffin

Re: Higher temperatures =

No it makes sense. Faster moving glaciers calving more icebergs will cool down the surrounding sea more, so more of it will freeze on the surface. That's a local effect though. Doesn't prevent the whole earth getting warmer on average. Local anomalies don't account for what's happining globally when taken in isolation, but that's the model journalists, as opposed to scientists tend to assume. We never hear about the greening of the Sahel, for example. We only hear about the Sahel when its drying out. So we can't rely on journalism which is interested only in local anomalies for useful information about what's happing globally.

Slideshow: A History of Intel x86 in 20 CPUs

PyLETS
Boffin

680x0

After the mainframe my first real micro computer was an Apollo Domain workstation based on this Motorola chip series. Must have cost my employer about 15 grand at the time. My first home computer was an Einstein, based on the Z81. Also worked on VAXes and Primes, but these were minis, not micros. We had an IBM 286 with 5 inch floppy disks in the lab but it was more a curiosity when we first got it than a practical tool. We did get it talking TCP/IP, but needed proprietary add on software to achieve that.

Coffee next on climate chopping-block

PyLETS
Pint

@AussieCanuck46: Re Hops

Was that Northern Brewer, Fuggles or something more southern like Goldings or Hallertauer ? The regional variation in UK ale depends upon the suitability of these hops to the local climate. Anyway, if it gets really hot, you could always use a very close relative of the hop plant in your beer instead, the cultivation of which needs more sunshine ahem... A lot more musty, not quite as bitter, and gives a somewhat more dozy high. As it happens, you can use various bitter herbs to flavour ale and improve its keeping qualities, but few are as good for the purpose as hops.

Sock-wielding movie pirates go to prison

PyLETS
Big Brother

@Kristian Walsh

Nobody is stopping you expressing yourself freely.

Try explaining that to

George Hotz in relation to his publications concerning Sony network and games console technology ?

Then there the reason Adobe got Dmitry Sklyarov locked up before he was bailed and forced to stay for months thousands of miles away from his family until the corrupt case against him was thrown out ?

Then there's the case attempting to extradite Richard O Dwyer not for hosting any infringing content but for publishing links.

And don't get me started on Kim Dotcom who was arrested and had his hosted servers seized due to alleged infringement by his customers.

The war taking these prisoners is against the free exchange of information certain influential business interests don't want you to have, who are able to buy laws restricting what you or I are allowed to publish and do, not because this infringes what they claim to own directly, but because it makes it more difficult for them to control access.

PyLETS
Big Brother

@nigel 15

"everyone's heard of IMAGiNE. and very good they were too. Don't know where they're going to get the money. they didn't sell these things."

Money seems unlikely to be the motivation. The politics concerning who controls what you are allowed to see, hear and do in order to see and hear what you choose, and what you have to pay has become a cold war, and this is one of the front lines. Copyright holding corporations, their owners and their agents getting rich to the maximum extent regardless of who gets locked up or extradited or why, regardless of artists being forced into poverty and having their best work locked up and made unpublishable by unfair contractual terms, and regardless of heritage destruction when owners lose interest and others are in fear, or maximum freedom of expression and privacy of communications. But you can't have both.

It's official: No 10 mandates 'open systems' options for Sir Humphreys

PyLETS
Boffin

Getting off spreadsheets

Grid-based editor sounds great until you mention escape sequences. Why bother "getting off spreadsheets" when they that already?

Because spreadsheets tend to assume a data model based on the concept of the data represented being inherently 2 dimensional and belonging to the individual sitting at the PC on which the spreadsheet program runs, rather than being inherently relational (or some other non 2D model) and belonging to the organisation the individual works for. I've encountered a few use cases where the spreadsheet model is entirely appropriate, but many more where it isn't and creates problems throughout the organisation which owns this data as a consequence.

I'd suggest doing a bit of analysis on the purpose of the data, where it comes from and where it goes to in the next few spreadsheets you see, and figure out whether using a spreadsheet for this job is recasting the problem as a nail because this hammer is the only tool understood by whoever decided to do things this way when it started being done on a computer.

UK's Intellectual Property Obliteration office attacked by Parliament

PyLETS
Boffin

@Kristian Walsh

"If you don't accept the concept of copyright, there's no reason to obey the terms of any open-source licence, after all."

There are many variations on the theme of accepting or not accepting the concept of copyright, because there are various understandings of what this concept means or should mean. So it's not as black and white as you suggest. It also seems pointless to start out from the viewpoint that only one of these understandings is "right" because if copyright exists in law, this law and future versions of it are governed by politics. And it's not as if might (i.e. the ability to influence legislators into passing your preferred expression of copyright law) is always right.

To the extent any law is political and controversial, it becomes reasonable to accept the parts of it you don't want to be used against you, or the risk of the parts of it you don't intend keeping catching up with you.

Copyleft is also enforced, to the extent that developers of copyleft software intend extension of rights granted to software distributors to be transitive to their customers. I personally quite like the idea of being able to modify the software in my mobile phone, router or telly, and the copyleft licenses used by these systems and their active enforcement by some of the developers enables me to do this.

PyLETS
Boffin

Re: Erm, M Gale...

It's the job of the IPO to take a balanced view of IP rights and enforcements based upon the interests of UK society as a whole, not just in terms of one form of commerce, and certainly not just in the interests of those selling IP. The broader interests of UK society as a whole in having a proportionate IP system includes respecting various other rights which conflict in some senses with copyright and patent property rights.

Page: