* Posts by Steve Knox

1972 publicly visible posts • joined 16 Jul 2011

The Elder Scrolls V: Skyrim

Steve Knox
FAIL

@Boothy

Well, 40+ hours is less that the 72 hours I mentioned, isn't it?

Color coding didn't exist in Oblivion, either (Black-and white was a stylistic choice -- Oblivion was brown-and-tan) . Nor did categorization. This interface is a progression from the Oblivion interface.

More to the point, you've been playing for over 40 hours and STILL haven't learned to add stuff you use during battle to your favorites and bring it up with the Q key or assign it 1 - 8? I learned that in the first 2 hours!

Steve Knox
Happy

Interface Complaints

I've seen a lot of these recently, and I've come to the following conclusion. They always come from people when using an interface that is an upgrade to one they've gotten used to (WinXP->Win7, Office 2003 -> 2007, Oblivion -> Skyrim, etc.)

Usually the complaints come from people who've used the interface for less than 72 hours. They generally don't stop to think that the people developing the interface spent considerably longer than that using and testing it.

Then once the complainers have used the interface for a week or more (of usage time), they end up in 3 general camps: those who think the interface is good (usually ~65%), those who still think the interface is crap (~5%), and those who have no trouble with the interface anymore but are too stubborn to admit that they were wrong (~30%)

As I mentioned above, I've been playing for about 12 hours, and I'm already getting used to the interface, and I'm seeing why they did certain things the way they did, and have already figured out (without going to "hints" sites) how to do things like hotkey items/spells/shouts to 1-8.

But then, as old as I am, I still have a young and flexible mind...

Steve Knox

Save-A-Lot

But not necessarily for stability reasons. I'm using a low-medium specced laptop and getting good performace and had only one stability issue in over 12 hours of playing.

You'll want to save regularly because there are lots of ambushes that can really set you back a ways if you didn't save just before opening that door...

As for first- vs third- person view, I had tried third-person in Oblivion, and had trouble with the combat mechanics. So I play that first-person almost exclusively.

But I've been playing Skyrim in third-person, and it seems easier. The major difference from WoW is that in WoW, you don't actually need to aim.

Google flings Bing into search engine bin

Steve Knox

Well, to be honest...

I personally find my local paper to be the best for the weather forecast, I look at my watch for the time in New York*, and I don't have any need to convert currency. For other, similar, requests that actually are best answered by a web page, I find a site suited for the particular request I have. It's not that difficult. I generally find portal sites to be more of a bother than a quick search.

*even if you don't live in the same time zone (or have one of those multi-time-zone watches), it's basic arithmetic.

NASA: 2012 solar flares could DEVASTATE CITIES!

Steve Knox
Trollface

The author of this article is a troll.

You're on The Register. Get used to it.

Immigrants face £49k wage minimum to stay

Steve Knox
Mushroom

@Technophobe -- apt handle!

"Where is this going to come from with company accounts stretched to the limit paying for the more important things?"

Well, if IT staff is not that important to you, don't pay them that much. Pay what you believe is reasonable. Then when nobody wants the job, take a look at what your IT staff actually do and get it through your thick head that you get what you pay for.

Steve Knox

Then salary is being improperly defined/applied...

as its entire point is to be a direct reflection of employees' usefulness.

Comp-sci boffin aims to REPROGRAM LIFE ITSELF

Steve Knox
Boffin

All your base are belong to us

@higher base -- well, most modern computers do their processing in 32-bit or 64-bit chunks, but we don't generally call them base 4,294,967,296 or base 18,446,744,073,709,551,616. They commonly have a character width of one byte, but we don't call them base 256.

Think of it this way:

nucleotide = digit (CS equiv = bit)

codon = character (CS equiv = byte)

So base-4 with a 3-digit default character width would be a better *ahem* characterization.

Is the electromagnetic constant a constant?

Steve Knox
Boffin

NO.

1. He did use two telescopes: Keck and VLT

2. The two telescopse are in different hemispheres, but they do not face in opposite directions. They are separated by 45 degrees of latitude. This means that their vectors diverge by half of a right angle.

3. While (2) does mean that they observe different areas of the sky, there is some overlap, some of which was used in the study.

4. Both telescopes produced both above- and below-expected measurements.

5. The dipole is not in alignment with the vector of either telescope.

All of this I got from reading the full abstract from arxiv. Pay close attention to fig.5 (supplementary at the end of the pdf) -- it summarizes most of the points above nicely.

Catholic Bishops: 'Would you mind not bringing guns to church?'

Steve Knox
FAIL

Nope!

The first quote is from Timothy, not Jesus. The second is from Paul.

The only statements directly attributed to Jesus are in the Gospels (and possibly Revelations.)

Steve Knox
Boffin

Wouldn't be Jesus, would it?

"God has created us to be truly free" is clearly a reference to the Old Testament creation story, and not the New Testament redemption story.

Themes of free will abound in the OT (although they often include somewhat nasty consequences...)

China outraged by US cyberspying fingering

Steve Knox
Boffin

If you'd actually bothered to read even the report's table of contents...

You'd have quickly seen that it's a narrowly-scoped report which deals specifically with economic secrets leaking from the US to other countries. It's not about individual countries and governments being responsible for hacking, but about loss of information of economic value from the US.

Hacking between US entities is outside the scope of this particular report because the information remains within the country. Hacking of foreign entities by US entities is out of scope because it would result in information gain, not loss.

So that's why they're not mentioned (and should not be) in this specific report.

Fujitsu boffins send DAN into storage fight

Steve Knox
Paris Hilton

So...

how exactly is this different from a VM cluster?

Can't you achieve essentially the same results just by, e.g, configuring your SAN as one big VMWare datastore (more likely several datastores, but still...) and managing the disk resources within the VM host infrastructure?

Want to avoid all private-data breaches, ever? Here's how

Steve Knox
Boffin

Wow.

Long interview about a very simple question, and still got it wrong.

Want to avoid all private-data breaches, ever? Here's how: DON'T STORE IT IN THE FIRST PLACE. That's the ONLY way to avoid a data breach.

The fact is, most systems store much more private information than they actually need to, simply because they can. Cleaning up that would go much further towards securing private data than any technological solution.

So I would add a 0th* principle to PbD: Minimize First -- don't include any private information that you don't actually need. This would help simplify the application of all of the other principles.

* Geek Pop Quiz: What other set of principles has a 0th entry, and what is it?

Critical Windows zero-day bug exploited by Duqu

Steve Knox
WTF?

“industrial industry manufacturers.” !?

So they manufacture industry for other industries?

Does this mean that, collectively, the targets would be called the industrial industry industry?

Disk drive crisis: Economists are terrible weathermen

Steve Knox
WTF?

Bit like...

blaming the weatherman for the clouds, isn't that?

We have about as much control over the phenomena that economists measure as we do over the weather. The only problem is that some of us don't understand that (ironically, usually the same people who don't believe how much we affect the weather...)

Could a snapshot plug your backup window?

Steve Knox
WTF?

Kicker?

Then came a kicker: "Snapshotting can be used for this and in no way contradicts the fundamental operation of backup."

Why is this a kicker? This reminds me of a conversation I had with a storage consultant just recently:

Him: "Snapshots and replication are NOT backups."

Me: "Because...?"

Him: "Well, you can't exactly take them offsite, for one."

Me: "But they are a point-in-time consistent copy of the data?"

Him: "Yes."

Me: "And you can restore from them?"

Him: "Yes."

Me: "And if your replication site is sufficiently separated from the main site, you can use it for disaster recovery?"

Him: "Yes."

Me: "So how is that different from a backup?"

Him: "Hmm... Well... Umm... Well, my field is setup, not backup; you'd have to ask my backup specialist -- but I'm sure they're not backups."

So do we have a "backup specialist" here who can explain WHY snapshots and replication should NOT be considered backups?

UK shamed in high-speed broadband study

Steve Knox
Happy

56k? You were lucky!

All we had was 300baud -- and we had to squeak the handshaking into phone ourselves!

e..e..e..rrrrrrglbfrgalfb

Printable transistors usher in 'internet of things'

Steve Knox
Joke

Thin Film Transistors?

Didn't they make displays a few years back?

World's stealthiest rootkit gets a makeover

Steve Knox
FAIL

<input name=title type=text value="" class="discussion" tabindex=5 maxlength=100 >

"Newer versions create a hidden partition at the end of the infected machine's hard disk and set it to active."

Meaning it would take AT LEAST 1990s-era BIOS technology to stop!

This just in: Brussels shatters CRT cartel

Steve Knox
Coat

Meetings

"The cartel was operated on the basis of bilateral or trilateral meetings..."

But there were four vendors -- could they not all get together for a quadrilateral meeting? Or did they think that would be too square?

RIM lifts skirt, flashes 'new' OS at devs

Steve Knox
Meh

Yes

The way BlackBerry is going, their quality will eventually sink to those depths.

Robot resolves Rubik's Cube in record time

Steve Knox
Boffin

@jtr7670 - : D That's the kind of intelligent discourse I come here for!

@Mike Kamermans ("Humans don't solve Rubic's cube puzzles without knowing the rules for getting colors from one spot to another spot, either.") -- Some of us do. The first solver HAD to.

("But if we're going to talk philosophy, robotics and AI aren't about making robots "intelligent"") You're right about general robotics, but: Expand the acronym "AI", please. Then either change it or GTFO.

("Never mind that on a technical note, intelligence is an a posteriori evaluation, not a guiding quality. The actually useful quality measure is success at a task. Someone or something that has the potential to fail a task but achieves success, is said to be "intelligent", whereas someone or something that fails the task is said to not be intelligent (and someone or something that lacks the ability to fail cannot be rated). So talking about intelligence for robots is nonsense in the first place.")

Well, if you use that horrible definition for intelligence, no wonder you are unable to apply it to anything. Try this one on for size: the ability to learn -- or in more task-oriented language: the ability to 1) create strategies for dealing with a task, 2) test those strategies in a meaningful manner, 3) select and refine the successful strategies for application to the defined task, and 4) generalize those strategies for analogous tasks as well. Most AI nowadays can actually do 2 and 3 quite well, but need human intervention for 1 and 4. On a scientific note, intelligence defined this way IS measurable (although it takes careful testing and long-term observation) and meaningful.

@Richard Wharram ("That's how speed-cubers solve the cube.") I don't care about speed-cubers.

I care about the fact that every time a machine is built to perform a menial task faster than a human can, the mass media (unfortunately including El Reg in this case) use that as a proxy for intelligence, and the people and companies involved are all too happy to perpetuate that misconception, as it gets them some camera time and often lots of colored pieces of paper.

Mike Kamermans is right when he says that modern robotics and software is about optimizing systems to perform menial tasks to allow us to be intelligent, he's just sadly mistaken when he lumps AI theory into those fields.

Oh, and Anonymous Coward down below, as long as you include militant Atheism in your list of fundamentalist religions, I'm right with you on that one!

Steve Knox
Meh

Sure...

they can do all this stuff fast -- but only after being told how. Even CSII is just processing a predefined rulebase. We've developed performance but not intelligence.

Wake me when someone actually develops intelligent technology.

Facebook flashplodders lose appeal against 4-yr jail stint

Steve Knox

Correction

Actually, they did incite; they just weren't very successful at it. Should punishment only be meted out to those criminals whose efforts bear fruit*?

I agree with other posters that 4 years is disproportionate, but these guys are not complete innocents, either.

* Metaphorically speaking of course -- else we'd be considering a very different criminal code: "sowing with intent to reap", etc.

FSF takes Win 8 Secure Boot fight to OEMs

Steve Knox

@Rich 2

"... all MS are asking for is a facility to be included into the BIOS for their OS..."

Not quite -- they are asking for the facility to be included AND TURNED ON BY DEFAULT. They are also specifically NOT asking vendors to provide the ability to turn it off. They are very adamant that they will not require that latter feature, even though they could allay everyone's concerns simply by doing so. THAT is what bothers me -- it follows classic MS FUD strategy: don't actually do anything directly wrong, but use market position to imply that as a side-effect of your "completely innocuous" actions, some partners might "inadvertently" do something that restricts your competition -- and make sure not to do anything to prevent those partners from making that "innocent mistake."

More to the point, this facility isn't a feature that the OS can take advantage of. It's a feature that restricts what an OS or other software can do based on its signature (or lack thereof). So MS is NOT asking for something their software can actually use; they're asking for something that they can use to market their software (i.e, touting security). Since the certification program is supposed* to be about verifying ability to run the software and not about marketing, this feature should not really be required for certification.

* Yeah, I know...

Intel mad for power, but stacked-up dies keep MELTING!

Steve Knox

@James Hughes 1

Illiterate trolling and brainpower are, sadly, very much not mutually exclusive.

Furthermore, there is a difference between choosing to use "bad*" language and needing to. In my experience, experts often choose to use such language when talking about a topic that is close to their field of expertise, because like many humans, they are somewhat emotionally involved. I learned long ago that judging someone's intelligence from their outward appearance or choice of language is a sure way to alienate oneself from some very intelligent people.

My primary point was that AC2 assumed a lot of things from very little information. My secondary point was that posting AC in response to an AC in a conversation that very much hinges on identity-related information (expertise and salary) is somewhat ironic.

* and really, "wanker" is your limit? Really? You must have a hard time reading the comments here. Sure, nobody here needs to use such language, but they do -- very frequently.

Steve Knox
Mushroom

On the third hand,

perhaps AC OP is a senior chip engineer, and knows a lot more about a lot more than you think, AC2 (and is possibly paid more than both of us combined.)

Or perhaps before presuming to know who an AC is, you'd like to present your own bona fides?

Did a Seagate sales bloke just say 5TB drives are coming?

Steve Knox
Coat

Loose, v.t.

To shoot, discharge, let fly.

It's what happens when you open the case and spin up the drive. Centifugal force and all that. Bits go all over the place. 40 trillion of them are almost impossible to clean up.

Opera brings fondleslab-style reading to bog-standard web

Steve Knox
Boffin

Not So

'"commodity territory, where they’re still amply rewarded"

contradiction in terms but they'll probably want to think so.'

No contradiction. Commodity doesn't depend on price (Gold is a commodity, and it's doing pretty well these days.) A commodity is simply something which is homogeneous across vendors -- something which app code _SHOULD_ have been from day one.

Would you trust a dot-bank site more than a dot-com?

Steve Knox
Flame

Fixes Something

Well, .bank could definitely fix the corporate issue, as there would be a vetting process.

Part of the vetting process could be a security check (e.g, does your site require TLS 1.1+), which could help fix the technical issues.

So it could fix "anything", but it's certainly not going to fix "everything".

But no, let's piss on partial solutions and wait for a system that fixes everything. That would truly be pointless.

Nanotubes, sulfur expand battery storage

Steve Knox
Joke

Didn't

SiS try that...?

Steve Knox
Trollface

Nano: "difficult to manufacture and therefore prohibitively expensive".

... which is why it features prominently in Apple's product line.

Deduplication: a power-hungry way to streamline storage

Steve Knox
Boffin

Yes, you do.

"No, surely not. Large hashes are sufficient; look at how e.g. git works. It uses a 160-bit hash. Presumably you can make arguments about being more likely to be hit by a comet than to suffer a hash collision."

Only an idiot would make such an argument. Even a potential cometary collision is a rare event. Furthermore any cometary collision decreases the chance of a future event, as the comet involved is removed from the roster of collision candidates. Finally a cometary collision is, given the current state of technology, difficult to avoid.

A potential hash collision, on the other hand, is guaranteed to happen every block write after the first. And every block hashed increases the chance that the next block will suffer a collision, as there are more blocks to collide with.

According to http://en.wikipedia.org/wiki/Birthday_attack, an ideal hash function would have, on average , roughly one collision for every 1.25 * sqrt (2^160) = 1.25*2^80 unique blocks hashed. 1TB = 2^28 blocks, so on average, you'd see a collision once every 4TB of unique data. (Git uses 160-bit hashes for its objects. Since very few code projects have 2^40, let alone 2^80, objects associated with them (linux kernel 2.6.30 [the latest version for which I could find this statistic] has approximately 28,000 (i.e, less than 2^15) files), and collisions between projects would not be a problem, Git would rarely if ever have a collision issue.)

But since many of the organizations using these dedupe technologies have petabytes of data, (and can write terabytes per hour) and collisions are _100%_AVOIDABLE_ (simply by doing the bitwise comparison you so quickly disparage), dedupe developers have wisely chosen to compare blocks when hashes match rather than assuming that they are the same when there's ever-increasing probability that they are not.

Steve Knox
Boffin

Windows Server 8 IS coming...

But the link you provided goes to a general Windows 8 blog -- lots of client stuff, not much server stuff. Might I suggest

http://www.microsoft.com/en-us/server-cloud/windows-server/v8.aspx

instead?

Gay-bashing cult plans picket of Steve Jobs funeral

Steve Knox
Facepalm

Jobs's birth father was Syrian-born Abdulfattah Jandali -- I'm guessing that's close enough for these morons -- or they just want some more publicity.

Please consider these people the worst that our poor country has to offer, and don't judge the rest of us by their stupidity. And Please, PLEASE, waste no more column space or bits on them.

The iPhone 4S in depth: More than just a vestigial 'S'

Steve Knox
Thumb Up

"personae au gratin"

Well played, sir. Well played.

Crazy square barcodes can point your phone to MALWARE

Steve Knox
Facepalm

And here is where every system fails:

"..apart from the fact users might be more trusting about a non-human-readable QR code than a conventional URL."

Yes. Sad but true. People are often more trusting about something they CAN'T READ to verify for themselves than about something they can.

Some of us are very smart. On average, though, we are really damned stupid.

Samsung reveals release for 5in tablet

Steve Knox
Boffin

I believe you'll find the Note has a stylus, but doesn't require a stylus. While a stylus-free touch interface is cool for consuming content, it's very difficult to create content (e.g, taking notes*) well without a precision device like a stylus. People's fingers are just too fat.

* See what I did there? Yeah, I did that thing.

Pandemonium as Microsoft AV nukes Chrome browser

Steve Knox
Headmaster

"Chrome behaves in some respects like a trojan. It just happens to be that the users have asked it to behave like that."

A trojan is by definition software that does things that users have specifically NOT asked it to do.

Chrome behaves in some respects like _spyware_.

Steve Knox
Windows

MSE and non-MS browsers.

Both Avast and AVG, and most of the other free antivirus products, are tending towards graphics-heavy interfaces with lots of "pay for our full version" popups.

Many users of Chrome and Opera use those browsers because the minimal *ahem* chrome that gets in the way. MSE is the free AV equivalent to that, at least for now.

Ah for the good-old days, and F-PROT for DOS...

Amazon's Kindle Fire is sold at a loss

Steve Knox
WTF?

Android killer?

You can't kill what's deep inside you.

Microsoft takes the Android profit, the Wonkas take the pain

Steve Knox
FAIL

Loss leader

Look it up, Andrew.

Firefox devs mull dumping Java to stop BEAST attacks

Steve Knox

'"The researchers settled on a Java applet as their means to bypass SOP". Ok, so the guys that showed the exploit chose to use Java to do so. That does not mean that there aren't other ways to do the bypass. What about Javascript?'

JavaScript is subject to SOP BEFORE it's run, so crafting JS to bypass SOP is much more difficult to do -- kind of a chicken and the egg problem. Also, since every browser's implementation of JavaScript is different (often even between major versions of the same browser) any discovered exploits of this would likely affect only one or two major versions of one browser.

There are TWO exploits here. The first (the vector) is the exploit of an unpatched Java flaw that allows bypassing of SOP. That requires a fix by Oracle, and they have not been forthcoming about whether/when they will do so. The second (the payload) is the JS injection into the SSL stream.

Even if the BEAST payload didn't exist, the fact that Java allows a means to bypass SOP at all means it can be used to deliver all sorts of nasty exploits. So even though Java is not responsible for BEAST per se, it is currently a weak platform. It is also the only known vector for BEAST at this point, making disabling of it a plausible candidate for a short-term workaround.

Nobody (that I know of) is claiming that disabling Java will resolve the underlying issue with SSL. However, from what I know, that appears to be a weakness with the specification, meaning a complete fix is likely to take some time and effort to implement. So it would be folly not to at least consider ways of minimizing the attack surface in the meantime.

Ex-Microsofties' IE6 kill squad hits UK

Steve Knox
Meh

Yeah but no but yeah but..

"don't forget that when these apps were written ie6 was STANDARD."

Except it wasn't. There were established standards and ie6 was deliberately written to be incompatible with them. (Earlier versions were, to give MS the benefit of the doubt, accidentally incompatible with the HTML and CSS standards, but MS made the conscious decision to make IE6 default to IE5 compatibility, rather than standards compatibility.)

"now 10 years later we have the situation that ie6 is still firmly entrenched in businesses because standards have changed and newer browsers dont work in the same way, companies have a few options."

Correction: standards have, for the most part, NOT changed. Microsoft has (to some degree) given up on trying to change them to their (non-standard) way. This isn't entirely one-sided, however. Some good standards changes were actually begun by Microsoft (XMLHTTPRequest, for example).

As for the options companies have, you've missed one:

4. Investigate whether the app is ACTUALLY incompatible with IE7/8/9 -- I've seen quite a few cases where companies read "IE6" in the system requirements line and gave up without even trying.

In most cases, one could write to the standard and not really fall foul of any IE6/standard problems. It was only when writing (then edgy) CSS styles or (then bleeding-edge) AJAX applications or (sadly all-too-common) crappy browser sniffers that would break even when minor versions of IE were changed that problems arose.

But developers being what they are, they wrote to the bleeding edge, and now we're suffering the bloody consequences.

Steve Knox
Mushroom

The Right Way?

So the "right way" is to have everyone download still-insecure code to their desktops, and use it to process still-non-standard web apps? Just keep applying kludges to kludges and never actually fix the underlying problem?

UniBrowse - a layer which sits atop your IEs and makes you look and act like a throwback.

I was HOPING they'd brought consulting services to actually FIX the underlying issues, but instead it's just more lipstick for the pig.

FCC's net-neut rules now official

Steve Knox
Thumb Up

"Lawful"

Actually, it could easily be argued that, without the word "lawful", the FCC rules would be deemed unenforceable as they would be tantamount to government endorsement of crime. While logically absured, that position is legally defensible, and given the deep pockets of many of those opposed to these rules, they'd find a lawyer to do it.

As mentioned above, "lawful" in the US still means (at least at the time of this writing) "not expressly forbidden."

In general, yes, the rules are pretty good. For those upset about the mobile laxity, remember that the US is slightly behind the rest of the world in mobile technology, so over here it's still much slower and more expensive for the operators to implement than fixed data services.

How the Yahoo! homepage predicts your clicks

Steve Knox
Joke

Really?

No-one's done this bit yet?

"...it predicts clicks [for users based on] what browser they use."

I can do that:

Opera users: ( well, we're to smart to fall for that ; P )

FireFox users: prefer anything with "Open Source" in it,

Safari users: go for anything with a picture of a partially-eaten fruit in it,

Chrome users: click on anything that asks for your personal information,

and [all together now]

IE users: Click On ALL The Malware Links!

I saw Facebook's music service 3 years ago. Done properly

Steve Knox
Mushroom

@DZ-Jay

"But nobody is trying. Everybody is too busy patting themselves in the back coming up with random ideas that do not necessarily add value, nor solves any real problem. And when they're not, they're lamenting how "big business" gets in their way."

Virgin tried. They created a value-adding product by working with the existing industry -- and that's what killed their project.

I tried. I created my University's first website in 1994. It was essentially an intranet before that term was even coined. It allowed students to research options, plan their courses with their advisors. Then the head of admissions heard that a website could be used for advertising. We sat down and discussed it, he promised to make sure any changes would keep the useful parts. The resulting site, built by his consultants, was a proprietary abortion which was useless for students, and didn't even work in most versions of Netscape (which it was ostensibly built for.) Access to the course catalog, staff directories, building maps, all the useful bits had been removed.

A lot of people are still trying. The problem is, for each one of us running around getting the necessary approvals and building actual functionality, dozens of hacks are throwing stuff out there without getting anyone's approval. So we get lost in the static. Even when one of us gets through all of the hoops and manages to get something of value out there, there's likely a pirate equivalent that's been there for several years that's crap but free, so people jump on it.

Steve Knox
Mushroom

Answered your own question there.

"Why have engineering values gone AWOL?"

....

"And then, weeks before it was due to go live, two of the suppliers in the music industry got cold feet,"

Ambition and optimism have been stifled by fear and greed, If it's not the content suppliers worried that their material will be pirated, it's the marketers trying to make sure everything is locked down so that your have to see things through their "message". If it's not them, it's the tech companies and patent trolls buggering the whole thing up with patent wars and deliberate incompatibilities in shortsighted attempts to create "lock-in."