Re: after seeing a documentary about Geronimo
TBH it would make more sense for ASF to stick to it being a patchy web server, with no NA connection.
C.
3261 publicly visible posts • joined 21 Sep 2011
Sure, OK. Here's the story you were thinking of.
https://www.theregister.com/2004/08/03/segway_tenmph_shame/
ur welcom
C.
"Did ‘accommodation’ include hospitality and bar bills too"
No, just the hotel room. Dinner, lunch, and drinks have been paid by myself or expensed to my publisher as necessary. Qualcomm got me here to attend the summit's breakout briefings, and that's about it.
"Were your flights Business or Cattle Class ??"
I live in San Francisco. My flights were normal seats, so cattle class? It was about a four-hour flight in which I read a (printed) Patrick Hamilton novel. Bonus points if you can guess the title.
I love that you're looking for scandal here but while Hawaii is a lovely place, and I've personally been many times as a Californian transplant, I've been working this week, either critically covering Qualcomm's announcements, or acting as Reg editor from Maui time.
C.
Far be it from me to do Qualcomm's PR for them but these chips are basically geared for gaming and photography, with enough oomph for modern apps and browsers.
If your mobile use-case only covers part of that - or the walled gardens of the OSes holds you back - then yeah, they will seem a bit limited. A lot of the 8 Gen 2 silicon is dedicated to things like real-time ray tracing in games (eg) so if that's not your cup of tea, it's a waste of transistor gates.
C.
"Almost entirely nonsense"
Well, we said it's important but - as the article goes into - not the only thing to do. Education is good but systems in place to block, contain, and detect are also important. I've made that clearer for people in the piece.
Also, as we said, someone may impersonate your IT staff so rate limiting won't help here, but phishing education and other defenses might. Finally, MFA spam really does work. There's been loads of times where it's worked, so limiting attempts and what not isn't a given at orgs.
We just had a load of phishing attempts against us too by someone pretending to be our CEO. The attempts failed but we still did a round of internal messaging/education about it afterwards as well as reviewing defenses and operations to make sure everyone's on the same page.
C.
"Instead of repeatedly sending out such notifications, surely the system should lock the user out completely after X number of rejections"
Yes, that's discussed in the piece lower down. It's an option. You may not want to use that option as it could lead to a DoS-like scenario against staff but you might instead consider setting a rate limit anyway.
I've made a note of that option higher up in case people don't make it to the end.
C.
No - we're reporting exactly what Mondelez claimed. It said damage was done to its equipment and software. Damage in this case is defined as "physical loss or damage to electronic data, programs, or software, including physical loss or damage."
I can add this point to the piece but it seemed obvious to us and others.
C.
Arm says Nuvia's architectural license was non-transferable without Arm's permission (and quite likely renegotiation). Qualcomm argued back that Nuvia's architectural license largely overlaps Qualcomm's own license with Arm, anyway. Largely but not fully, crucially.
I've heard that Qualcomm already went through this with Arm when Q bought CSR in 2015. CSR had an Arm license that Qualcomm had to ask for, and got, permission to continue using and its derived technologies. Now this time, Qualcomm thinks it's OK to use Nuvia's license as it has done so and any complaints from Arm are just about greed and bullying.
C.
FWIW, this is Desktop Tourism, not a review or product recommendation. It's a series where we take odd, non-mainstream stuff, and see if we can work on it for a month. It appeals to those of us who like experimenting with kit from time to time, rather than always using the basic obvious solution.
We've done things like a Raspberry Pi laptop in the past and later this year, we'll write up an exotic RISC-V device that's fun and a PITA. So, yeah, think of this as a series of stranger things we've used for work just out of curiosity rather than a purchase recommendation.
I'll make that a bit clearer in the blurb box and make a note of the mainstream Intel Core i3 NUCs and what not in the piece.
Also: if you've found a Maxtang box cheaper or more expensive, then, good on ya. When Simon (who's based in Australia) looked around for pricing, 300 USD was the figure he generally found for the device.
C.
1. You can still call it El Reg. We still do internally and publicly. Myself and TR's senior editorial staff have been at The Reg or with our publisher for ten or more years. It's not like we've forgotten the past.
2. We're constantly experimenting with headlines to find the right balance between being unique and amusing and not off-putting for new folks. Sometimes titles go too obscure, sometimes they go too dry. We've got a sub-headline right now on the front page stating "You can kiss my Californian ass, says ad giant" and a headline "Why are PC webcams crap?" and boffins and so on... there's no corporate watering down. We're just trying to make our humor and our take on the IT world a bit more accessible for everyone.
If any part of it reads like a sales seminar, shoot me. That's not the intention, and not what we want to do. We want to make stuff that's informed, accurate, and independent.
3. I'm British. I live in the US after living in the UK. I know Blighty's going through some weird shit right now, and how we're perceived globally is perhaps not quite optimal. But TR switching to US spelling isn't part of that, and your thoughts about the UK being "quaintsy" is something you need to figure out for yourself. TR changing to American spelling isn't commentary on the UK.
It's that the internet sees US spelling and thinks "international or American" and sees UK spelling and thinks "England". Which can be a bit frustrating when we're writing about non-UK things a lot.
4. One day it would be great to translate TR into other languages. An English version is obviously going to be available and prime.
Above all, we're just being honest and open. We could have just not said a thing.
C.
> is highly insulting
It's not an insult - it's just a reflection of what's expected globally.
> the tagline "biting the hand that feeds IT" is gone
It just got moved to the end of the page to tidy up the masthead.
> Bring back Dabbsy
We parted on good terms, and wish him all the best – he's on his Autosave is for Wimps Substack.
C.
1. What was the error - we jump on correction emails within minutes if someone's working. We strive really hard to fix issues ASAP.
2. We're not using speech recognition. If you see typos or brain blips like that, it's because we've got something else on our minds, such as technical accuracy -- I'd rather a story is a fair representation of reality with typos than perfectly written but total BS.
C.
It's a way to obfuscate the Windows API calls used by malware to make reverse engineering more tricky. It's down at the executable level, where the program imports functions from libraries. See:
https://www.ired.team/offensive-security/defense-evasion/windows-api-hashing-in-malware
C.
Kinda irrelevant, no?
Women want to be given a fair crack at getting these particular technical jobs that use their brains and skills, and if they get the job, to be treated fairly and thoughtfully as equals. It's pretty straightforward.
Go talk to The Register of construction about those other careers.
"If you want equity, then it has to be done at every level and every job"
Uhm, why?
Edit: My "why?" meant: why does it have to be all or nothing? Why can't we start with IT seeing as we're an IT crowd.
C.
That magazine article is dated Oct 8, a day before the latest statement we saw from LH (on Oct 9, our story published Oct 10) contrary to that magazine article.
So it's up to LH to clarify what's going on. Last time we saw, LH was saying ATs are too dangerous for checked baggage.
Edit: LH has U-turned mid-flight. AirTags are now allowed, and we've added an update.
C.
As much as some of us like IT Crowd, gotta pay respect to the origin of the quote: They Live.
https://www.youtube.com/watch?v=Du5YK5FnyF4
C.
It's pretty clear, right off the bat, this is a code-level issue, with patches for vulnerable apps rather than changes to the protocol.
Yes, the protocol is mentioned, in that, a study of a protocol may not only uncover shortcomings in the protocol design but also may indicate where there will likely be problems in implementations [triv.]
Don't forget to use corrections@theregister.com if you think you've spotted something wrong, please.
C.
The general-purpose cores in the X280 are 64-bit RV64GCV CPU cores. As the name suggests, RISC-V is quite RISC.
RISC-V uses letters to represent extensions and features. GCV basically means the CPU cores support the base (bare bones) RISC-V instruction set plus support for integer multiplication/division, atomic operations, single and double-precision floating point math, compressed instructions, and vector math, and some other bits and pieces.
RV64GCV is all you need to run an OS like Linux and applications. It's fit for general purpose, and includes vector math support in hardware.
C.