* Posts by dan1980

2933 publicly visible posts • joined 5 Aug 2013

Your fitness tracker is a SNITCH says Symantec

dan1980

Re: Modern intelligence is highly overrated

@AC

It's not about things being un-crackable. As I tell people, if someone wants to get access to your data or your system badly enough then you can't really stop them.

For the average person, it's just about it being difficult enough to protect yourself from casual intrusions. If someone wants to track you - and specifically you - through your fitness tracker then they will. But then, if you're someone who warrants that kind of attention then you probably wouldn't be using one of these things anyway.

No one truly expects hardened, state-secret-level, security on a Bluetooth fitness bangle, but I think it's reasonable to expect that the data that you send back and forward would secured enough that you couldn't defeat it with an off-the-shelf single-board PC and some scripting.

Like I said - 'fit for purpose'. The data isn't super sensitive and you have the option to wear the device or not - you don't have to keep it on 24/7. For the purpose it is there for, a moderate level of encryption and security-mindedness is warranted and should be expected.

dan1980

And no one could possibly be surprised by this.

Those little trackers are a great idea and one can easily see them doing what so many other exercise gadgets fail to, which is to motivate people to exercise more.

The unfortunate truth - as with the glut of Internet-connected devices in the home - is that manufacturers just don't care about their users' privacy. Self-regulation doesn't work; never has. You can't rely on companies to keep their customers best interests at heart because that's not the way companies work. The only way to fix this perennial problem is to legislate and impose real penalties when companies don't respect their customers' privacy.

Of course, the core problem is that privacy is just not respected. Unfortunately, that extends to our government, so it's pointless hoping that they would implement any regulations to protect it.

One way to approach the problem is to say that any device that transmits or stores identifiable information in an insecure manner is unfit for purpose. I actually think that is quite a reasonable approach as these devices are sold on the merits of them exchanging data with personal devices and cloud services - most of them don't even have a display. Given that's the selling point, I find it reasonable to expect that that feature is implemented to a high standard, which demands security.

Users should PAY for their piracy says Turnbull

dan1980

". . . the government is determined to step into the policy gap left by the iiNet case, and if need be, we will legislate."

Two problems immediately jump to mind. First, the government is "determined", which is to say that they don't actually care what their citizens want - they have made up their mind and if ISPs don't tow the line voluntarily, the government will force them.

Second is that the government assumes there is a "policy gap". They have already decided that the system needs fixing and they are dirtying up their boots to come tramping in.

The only question, really, is which came first: the determination for a "solution" or the identification of the "problem"? Both are equally flawed so it doesn't really matter but, for what it's worth, I suspect the solution came first.

Turnbull to Big Content: Let your movies RUN FREE ... for a fair price

dan1980

Re: Some thoughts...

@Fluffy Bunny

No, I'm pretty sure you do have that right is Aus, the barrier is that you can't break the encryption, which makes it a somewhat moot point.

dan1980

@Steven Roper

I appreciate the reply but I am pretty sure this is just not the case. Fair use is just that.

A brand could mount a case that use of a trademark in a film/ad/TV show was particularly disparaging and thus qualifies as 'trademark tarnishment' but I think it would have to be a fairly blatant and harsh depiction. Simply having (e.g.) a Ford car in a crash would not do it. Nor would having a particular brand of Alcohol being a drunk's favourite*.

The fact is that you just don't need permission to use a brand in a movie or TV show.

Where you see brands removed or blurred out, what you are seeing is the studio looking for product-placement dollars. If you want McDonalds to pay to have their restaurants used in your film, you will be careful not to show Burger King.

Look at Transformers. All the 'hero' (Autobot) cars were fromt he GM stable. Note, that the evil car (Barricade) appears to be a Ford Mustang - the classic rival for the Camaro (Bumblebee), much the same and Commodore vs Falcon. BUT, it isn't a Ford, it's a Saleen. Small difference but Ford didn't want their car to be a villain, coming off second-best to the hero GM and so, while Bay could have used one anyway, he couldn't have milked any money out of Ford. Hence the Saleen.

As for Quentin Tarantino making up the 'Big Kahuna Burger' because "any display, or even mention, of any recognisable product or brand name . . . can render you liable for infringement action", well, I am not 100% sure about that! Personally, I suspect that he just didn't want to come off looking like he was doing product placement because they were talking about them being good. Actually, if you watch the scene, you'll see that they actually mention "McDonalds", "Wendy's" and "Jack In The Box" - all real fast food chains.

* - See 'Flight', where Denzel Washington's character drinks Budweiser beer and Stolichnaya vodka. The producers didn't get permission from these brands. The brands complained about it but they couldn't force Zemeckis to remove the brands and can't seek compensation after the fact.

dan1980

Piracy* is illegal and it does hurt the industry (how much is up for debate). BUT, I just can’t find my way to accepting that it qualifies as theft.

Games/software/movie/music companies claiming this are doing a classical cake-and-eat-it-too. EULAs make it very clear that you are not buying a movie (or game, etc...) but in fact buying a limited license to use that content, with certain restrictions. Whenever arguments of EULAs and/or copyright come up this same point is repeated over and over. People claim they bought it so should be able to do whatever they want with it, but the producers say that that is NOT the case: you only bought a license to use the product under specific circumstances.

I can appreciate that – after all it’s not fair to use a song in an advertisement broadcast to millions of people just because you bought the CD. Of course, that contrasts with other ‘normal’ products; you can, for instance take a car you already own and use it in a movie without having to pay any more money.

I’m not suggesting this is odd or unreasonable, just that there is clearly a difference between content – like movies or music – and ‘real’ products.

And so, if there is such a difference, might this not also be matched by a difference in how unlawful acquisition of said items is treated? I’m not saying it shouldn’t be illegal to download a pirated copy of a movie, just that I don’t feel it really deserves to be treated the same as if you went into a store and physically stole a copy.

The real question is, when someone downloads 'pirated' content, what is being ‘stolen’? If there are 10 DVDs and you steal one, then there is a physical item that has been taken. But, if it is all digital**, what, really, has been taken? You might say that rights have been appropriated, BUT, as IP that is able to be duplicated infinitely, how do you calculate the value of any given copy?

To think of it another way, you would assume that the license only become real when sold to someone. If a ‘copy’ of the content has any intrinsic value, you could claim that you have infinite assets by virtue of the fact that you have the ability to make infinite copies.

Yes, yes, that's a semi-facetious - but not so much as it might seem.

The concept of 'theft' is well defined, philosophically, only in it's relationship to 'property' and 'ownership', terms which themselves are not as firm as might be thought. The only real, concrete definition of theft that is available without resorting to definitions by fiat is that it is the unjust deprivation of property from one person by another person.

A key concept of this is what it means to 'own' something in the first place. Possession is relatively easy to define but, as ownership is really only a bundle of rights agreed upon by social convention, theft must be defined as the removal of those rights. So what rights does a 'pirate' remove?

If someone steals my car, my right to drive it has been removed. Also my right to hit it with a golf club, paint it purple and jump up and down on the bonnet. But, if someone copies a movie, no rights have been removed from the 'owner'.

A content owner has the right to sell their content but a pirate has not impacted that right.

None of that is to say that piracy shouldn't be illegal, but theft is a criminal offence and to equate the two is ignorant or, worse, deliberately misleading.

* - Used for convenience, not accuracy.

** - Again, used for convenience - I realise that DVDs and CDs hold digital data too.

CIA super-spy so sorry spies spied on Senate's torture scrutiny PCs

dan1980

Re: why are they bothered?

While I do enjoy the comment (and have used a similar line myself) this really is a bit more serious. It's not just about spying on Senators but about removing information the Senators are using to investigate CIA activities. And then lying to them about it.

dan1980

This should be wake-up call for all these politicians. They thought they had control of this beast and they assured the public that everyone could be trusted because everything was correct and proper.

Can there be any clearer a message that these agencies view themselves as above the law or that, even with the best intentions, individuals can and do go outside of that?

Have they any idea how hollow all the reassurances and dismissals given to the public now sound?

If these people can't even be trusted to respect the US Senate, does anyone really believe they respect the privacy of the US people?

A modest proposal: Australian ISPs should JUMP at the chance to store metadata

dan1980

Re: re. "... churn to a rival ..."

@frank ly

"Does Mars ever occlude Saturn?"

Never. It can, VERY infrequently occult Saturn, but I think we have to wait another millennium for that to occur again.

Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers

dan1980

Subsidiaries are a core part of international business and one important part of this is that a subsidiary is a legally distinct entity. This means, amongst other things, that it must adhere to the local laws and regulations and also that its board must act in the best interests of the subsidiary, even if these are at odds with the best interests of the parent company.

In this case, if I am understanding it correctly, the data is stored and managed by the local subsidiary, and not directly by MS in the US.

I am no legal mind but it seems as though such a ruling would contradict the basic, legal principle of a subsidiary and thus undermine much of international business.

I mean, look at it from the other side - a subsidiary can engage in practices are legal in that country but might be illegal in the parent company's country. The parent is safe. This is why manufacturing companies can happily use CFCs and engage in all manner of ecologically unsound processes in their factories in developing nations but their US operations are not fined prosecuted.

If the local subsidiary of MS is refusing to provide access to the data, this may well be against the US laws, but they are not bound by those laws and, as a separate legal entity, Microsoft's US operations are not liable for that.

Happy to be corrected, but that is my understanding of the situation.

Plug and PREY: Hackers reprogram USB drives to silently infect PCs

dan1980

Super low-brow but am I the only one who saw the image accompanying this story and though it was a feminine hygiene product?

Yes, Australia's government SHOULD store comms metadata

dan1980

Re: Terrible no matter how you read it.

It's already 'unchecked'.

Access to the existing metadata requires no warrant, no judicial oversight, and can be given to ordinary public servants - such as a Centrelink employee accessing mobile phone location data to determine if someone actually went to their job interview.

dan1980

Re: Simon is being prescient, sensible and is an exemplary Australian.

Trevor's input, while agreeably-worded, is already out-of-date. The correct time to start takin' names was at the end of the Howard era when Ruddock (as AG) basically removed all scrutiny and restrictions on access to the data that was already kept.

See, the problem is not the length of data retention per se, it's how that data is used and how strictly access to it is controlled.

If there was some way to have an absolute, iron-clad, concrete and inviolable assurance that such data would only be used for the most important reasons, and only after the strictest scrutiny - including but not limited to judicial oversight - then the length of retention of that data becomes almost a non-issue.

To be clear, I am not saying that people should have no problem with it, just that the length of the retention is irrelevant as those against it would be against ANY retention - be it for 1 year or 1 day.

So, the problem really is how the data is used, by whom, and with what oversight. Well, we know that already and the answer should disturb every Australian. The data is used by whomever wants it, for whatever purpose they want it and without anyone to monitor it. The last thing we want to do is increase the amount of our personal data available under so unsatisfactory a system.

And that's really the crux - if you (the police, ASIO, etc...) want MORE data under the appeal that you are prevented from solving serious crimes then first the system must be cleaned up and locked down so that it can only be used for those reasons you are arguing for.

Now, I don't think ANY data should be retained any longer than required for the provision of the service it was collected for, but the above is what needs to happen if the hand-wringing of the police and the others is to be taken seriously as anything more than a grab for our personal data.

While I deplore illegal dumping (keep Australia beautiful), I find it astounding that my council would be allowed to pull mobile phone location details for someone they suspect was responsible.

dan1980

". . . why should the private sector be asked to replicate expertise and facilities accrued at taxpayer expense?"

Because we elected a Liberal government - one hell-bent on privatising everything it can.

And, if you think for one moment that the government has any interest in actually securing the data to anything like the extent you mention (offline storage, transport on tapes, security-verified in-person access only, etc...) then I commend you for your optimism.

That would be no good at all for catching terrorists and pedophiles!

The problem is that the same logic and hand-wringing that sees the push for the data to be retained in the first place also pushes for it to be available at a moment's notice to whomever "needs" it, which, in practice, means far less security and scrutiny than such a treasure trove of personal information should have.

I know that this is besides the point of the article, but one only needs to look at what is happening with requests for the data that is currently available. In the words of Telstra, speaking to the Joint Committee on Intelligence and Security at a parliamentary hearing the last time this was looked at:

"If an agency is able to verify that it actually undertakes an investigation for a criminal offence, that it protects the public revenue or it has the ability to impose a procurement penalty or all three of those, then they have the right to actually request, lawfully, from the telcos, that information."

That includes requests from:

  • Centrelink
  • The RSPCA
  • Local councils
  • Blacktown anti-dumping authority

And remember, all of that is without a warrant, without any judicial oversight - it's available with little more than managerial sign-off; no reasonable suspicion or probable cause needed.

VMware builds product executables on 50 Mac Minis

dan1980

Re: sounds absolutely stupid

If every problem had just one solution, nicely documented and laid out, then I supposed we'd be out of a job.

Ours is to assess the criteria "it" depends on and spec accordingly. Sometimes the answer really is a near-blind adherence to a reference architecture. More than once I've been told the solution must use 'tier one' vendors only.

Custom-tuned setups can be far more efficient than white-paper solutions but known quantities bring their own efficiencies and shouldn't be discarded.

dan1980

Re: sounds absolutely stupid

It's all about scale.

It's similar to when you ask yourself how much time it's worth spending optimising/automating a process. If you'll only save 5 mins a day but it will take you a day to script and test and debug and document then it's not worth it.

Likewise using commodity hardware. As Trevor says, the equation is usually different with commodity kit and you often have to buy more stuff than you would with big brand X. You'll also likely have to spend more time testing and tweaking your setup and build processes than you would just following a white paper or co-opting a vendor expert to assist in the build.

That represents an overhead that can make tried-and-trusted, vendor-backed kit preferable in certain situations. But, the larger the scale, the more you stand to save by deploying commodity kit so the more time and resources you can spend getting it right.

For a small deployment, you just can't justify buying test gear and experimenting. If you're filling a whole aisle then you can spend quite a bit because the savings from getting it right will be worth it.

Sneaker-maker Reebok cooks up performance-enhancing BACON

dan1980

Re: What the hell is CrossFit?

Right, so an even more ridiculous version of something I already don't understand. Got it.

dan1980

What the hell is CrossFit?

Is that something the readers of a tech blog should know about?

I ran once. Horrible experience; never catch on.

Recording lawsuit targets Ford, GM in-car CD recorders

dan1980

No, no, no Trevor - they represent artists: music creators; humans with souls and families to feed; people who have poured their life into creating their art and they deserve to be compensated. Otherwise your'e just stealing.

Oh wait, no, you're right.

dan1980

Can't these people go do something useful like play in traffic?

You, Verizon. What's with the download throttle? Explain yourself – FCC boss

dan1980

Even the most heinous, self-serving individuals want to be loved, deep down.

dan1980

Trevor, your scathing attacks add amusement to my days but perhaps in this instance Wheeler is simply on a mission to save face with the public (and the Government) by talking tough against a target that is already in the public eye.

Cisco says network virtualisation won't pay off everywhere

dan1980

Re: Cisco are probably right...for now at least.

@Tokoloshe

One thing you have forgotten is the effort required to rewrite for a different platform, which can be a significant hurdle.

There are two separate questions. The first is whether you go for SDN or not. The second, if you chose SDN, is x86 or FPGAs.

There is really nothing to touch custom-designed ASICs for port speed. The problem is that they are expensive in the long run and very static, with a relatively long time to market for new features. Working from x86, you can pretty much do whatever the hell you want and implement whatever new features take your fancy well before ASIC-based devices can.

Network virtualisation is pretty cool. The problem, so far, has generally been sub-par performance. This can be seen in the admonitions to link VMs to physical NICs one-to-one for best performance, rather than connecting them to the hyper-visor's virtual switch.

Anyone doing the latter is using virtual networking and already knows that it's very handy indeed.

dan1980
Holmes

Taking the statement at face value, Cisco are correct but it should be generalised to the entirety of IT, which is to say that no product or technology or solution is going to be the best fit for everyone, across the board, regardless of situation, no matter how 'hot' it is or how buzzword-filled the marketing or lavish and breathless the presentations.

Or, in other words: "duh".

'Things' on the Internet-of-things have 25 vulnerabilities apiece

dan1980

Re: Security framework

Yes, there are best practices and guides and test suites and paid-for services that will test for you.

The problem, however, is that all those things cost money, take time or both, and everyone is in a mad rush to push as much new product as possible. And they all just love having shiny, starburst-backed bullet-point features for their marketing.

dan1980

Re: What Things did they test?

@frank ly

What things (and vendors) need and what they require you to provide are often quite different things.

The push for data, data and more data is in full swing and every company wants to know as much about you as it possibly can. This is one reason why some big companies are buying businesses that seem to have very little to do with their core products.

British Lords: Euro 'right to be forgotten' ruling 'unreasonable and unworkable'

dan1980

Re: Or we could all just grow up

@Ken Hagan

Yes, that would be ideal, but we both know that we do not live in an ideal world.

The concept works well for arguments about, e.g. pornography or (subjectively) offensive content as it's the person doing the searching, in general, who is being offended.

Unfortunately, the problem here is that it's the person that is the subject of the search results being impacted. As per my previous post, one clear scenario is when going for a job. Recruiters, as well as internal HR staff routinely run searches on candidates and, in a depressed job market where there is a surplus of applicants for each role, it doesn't take much to put a resume into the 'no thanks' pile.

dan1980

Here is the deal: either search engines are responsible for the results they return or they are not.

It's should be that simple. Whatever you decided, you live by it. And that means that when the vice president of <insert giant movie conglomerate here> comes over for dinner at your country house and complains that illegal torrents of <insert comic-book-adaption/sequel/remake/rip-off here> are far too easy to local via an Internet search, you must tell him/her that implementing a regime for removing those search results is simply "unreasonable and unworkable".

Remember, though, these are the same people who find it reasonable and workable to block entire IP ranges based little more than a 'please' from content providers.

I am no fan of copyright infringement but I am a strong believer in the basic right that people have to their own privacy.

It's not about (as @Neil Barnes said,) the right to make an old blog post disappear, but the right to get content that OTHER people have written about you de-indexed.

Here's a theoretical scenario . . .

Image that you were the subject of a particularly virulent blog posting where the poster was prosecuted for libel but the content was still available by search when your name is entered. Recruiters 'Google' your name routinely and don't necessarily stop to vet the information.

Microsoft rolls up more Windows Server 2012 R2 updates

dan1980

Re: Pure genius

The problem here is that when people post as ACs and have an argument between them, it's very difficult to know who's who.

Whatever the case, you need licenses beyond that required for Office 365. I don't see this as a problem because you're not going to deploy SCOM just to monitor O365.

Short version - it's a 'nice to have' addition to SCOM for those already running it and also using O365 - though I still don't know what the difference is between this MP and the one already available for 2007 R2.

dan1980

Re: Pure genius

@AC

I am having trouble understanding exactly what you are saying - the blank nature of text communication means subtlety is lost.

So, the explanation is that this article is, despite the title, about an upgrade to System Center 2012 R2, which is a suite of management products that one would install locally to support your IT environment.

The component in question in this thread is the new 'Management Pack', which is an add-in for System Center Operations Manager (SCOM/OpsMgr). This particular update is clearly aimed at companies with split deployments - either with in house systems and e-mail/Lync/Sharepoint hosted on O365 or with branch offices operating with O365.

For those deployments, they may well already be using OpsMgr to monitor their in-house systems so it's a valuable addition to bring the hosted portion into the same 'pane'.

For those running this, what's the difference between this one and the one already available for 2007 R2? Is it just that the old MP doesn't work on 2012 R2 and it has taken this long to release one for 2012/R2? Or is it an expanded MP with new functionality?

dan1980

Server 2012 R2?

I think we might mean System Center 2012 R2.

Canada's boffins need A WHOLE YEAR to recover from China hack attack

dan1980

Re: Tokens

@Powernumpty

Huh?

I am not trying to be intentionally rude but can phrase this no simpler way: what are you on about?

I need to access my Internet banking "in a trusted manner" - what do I need to do? Like the vast majority of people, I browse the Internet via a dynamic IP address, assigned and changed periodically by my ISP

What exactly are you suggesting the process be?

The simple truth is that the vast majority of systems with data of interest to 'hackers' have some path to the Internet, even if the system itself is not supposed to be accessible. That is the reality of the modern world because any data worth having is worth making accessible to multiple people. Data that is never accessed is not really worth having, after all.

The problem here is not unique to computing - it is a conflict between utility and security. I mean, if you have a shop, you can go a long way to preventing shoplifting if you make sure the door is locked at all times and an armed security guard rejects anyone without a verified appointment. Admittedly, some stores do indeed operate that way, but for the other 99.999%, such an approach goes against the goal of running a store, which is (generally) to sell goods.

dan1980

The title of this article seems a little misleading to me.

It implies that there was damage done that will take "A WHOLE YEAR" to repair, when it seems to me that the attack simply uncovered inadequate security that will take a year to bolster.

The moral of the story is for other agencies and governments and private businesses who might be targets to start reviewing and improving their security now.

Or don't - it's only data that's the property of your citizens (having been paid for by their tax dollars) that's at risk.

Keep your iPhone calls private, whispers Signal

dan1980

In the near future . . .

News just in: Signal acquired by Facebook, Inc.

Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees

dan1980

Re: No Surprise

@Fluffy Bunny

First, kudos for the alternating icons - amusing : )

That aside, I think I found out the misunderstanding you are working on, which is that one single data set - "global mean surface temperature" - is all that is required to settle the argument one way or the other.

If you think this then you are mistaken. There are numerous measurements that go into assessing the broad catch-all of 'global warming', which is better understood as the system retaining increased heat energy.

Demanding that all this heat energy must manifest neatly as the most easily understood (for us lay-people) measurement of 'surface temperature' is to either fail to understand the depth and breadth of the science or to deliberately misrepresent it. I will give you the benefit of assuming the former and suggest you do some serious research on all the various measurements and variables that are tracked. Specifically investigate the measurements of ocean heat content, which relates to heat energy stored at depths to 700m, in contrast with the few millimetres recorded by the satellites measurements used for the surface temps.

dan1980

Re: A Physicist and a Chemist

@Tatsky

"So the question posed here is if a huge volume of CO2 released into the atmosphere over a period which did not see significant change in temperature recorded, then some other factors must have an impact on climate change which we are not fully aware of."

Well, that is one question - and a valid one - but there is another which is to ask whether "global mean temperature" is the only measure of global warming, or whether other measurements - such as lower tropospheric temperature, near-surface air temperature, ocean heat content, glacier mass balance, etc... - show evidence of the "huge volume of CO2" having any effect.

A scientist should indeed be trained in analysis and interpretation of data. But, using that training to assess only a single data set is not conclusive. That is not to assign any fault to the scientist doing so - it merely highlights a potential pitfall of applying an analysis to data when you are not familiar with the field in question and thus don't know that there are other data sets available.

dan1980

Re: Tax attacks

@Charles Manning

You need 'specialised equipment' to measure many things - resistance, current, temperature, electromagnetic radiation, humidity, seismic activity - so what?

You can measure the levels of CO2 yourself and consumer-level equipment isn't expensive at all - $200 USD or there abouts. As with most measurement devices, you can get cheap ones for casual use and super-expensive, super-precise ones for professional and academic use.

All the things mentioned above are not evident to humans at small magnitudes, just like CO2, but one can still measure them with the appropriate instruments.

Sure, you can feel temperature but you can't detect a 0.1 degree change unless you use a suitably accurate thermometer. Likewise seismic activity, which occurs near-constantly but goes unnoticed except by the 'specialised equipment'.

CO2 is no different. If you think you can't 'feel' CO2, you may be right depending on your definition of 'feel', but you can certainly feel the effects at high enough concentrations. Try breathing in the fumes from dry ice. Not toxic, but can give you a big headache.

Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales

dan1980

Re: Clever...

@Trevor_Pott

"[Microsoft] have put concerted effort into pissing off customers, partners, developers and staff."

Ha ha! Yes, that is probably the way to phrase it; the level of animosity they have built up simply cannot be accrued by carelessness or stupidity.

What MS have done is to let their desired business model drive their products. That's perfectly fine. And, when your business model is to provide innovative products or be at the forefront of customer service or technology or whatever then you can have a great relationship with your clients.

When your business model is (as stated) "something, something cloud; something something mobile", it tends not to work so well. Even less so if you pair that with a financial imperative to make as much money via subscription revenue as possible.

MS are not lacking talent and I still hold a torch for them - there is such a wealth of smarts and good engineering in many of their products that I often have to sit back and say "wow - that's cool", but more and more of that is sacrificed with each new release to better align with their all-consuming drive for juicy monthly income.

The thing that always set MS apart for me was not one achievement or perfect facet but instead the finely-tuned marriage of user functionality and customisability with administrator control, all managed by a fairly easy to use and (for the most part) logical and intuitive GUI. Once 2008/R2 and the associated server applications came through, you also had a very powerful command line and scripting solution too.

Like I said, I still carry a torch for them (unlike Trevor!) which is why their current focus on fucking over the user in pursuit of recurring monthly revenues upsets me so much.

Ethicists say Facebook's experiments not SO creepy

dan1980

It's always 'tempting' to assume that people are swayed by the media but the researchers offer the following 'alternate hypothesis' which I feel is likely the more accurate one:

"Yet another alternate hypothesis is that those who are most likely to disapprove of the ethics of the Face-book experiment, or of research studies in general, were more likely to seek out hear about it from friends or see coverage of it in the media."

For example, those in tech circles are more likely to be privacy-oriented and also more likely to read tech blogs and news sites (like this), that will have coverage.

Data retention saves Australia from TERROR says Labor MP

dan1980

Data will be abused, lost, stolen or sold. Likely all of four.

It is never a matter of 'if' but 'when'; it is inevitable.

The only solution, then, is to collect and keep as little data as possible; the bare minimum required for provision of a service and for it to be destroyed once it is no longer needed.

The type of data the government is talking about does not need to be collected so it shouldn't.

dan1980

I live "on Australian soil". My family lives "on Australian soil". My friends live "on Australian soil". How about if you ask us if we want to trade away out privacy for this apparent security.

Because I, for one, fucking well don't.

Microsoft wants to lure biz users with fondleable Windows 8.1 'Apportals'

dan1980

Re: Welcome to the 21st century...

@The Real Tony Smith

"Your server OS has a graphical interface? Why?"

Because I thought we were discussing @IT Drone's statement:

"Instead go thin client to give users a follow-me-anywhere, server-based virtual desktop experience. MS Windows Server doesn't look like a Windows 8 kiddy-tiles desktop rather a more enterprise-friendly Windows 7 desktop with a proper Start menu and all."

I assume he was, when talking about servers, describing Terminal Server/RDS. If you think a CLI-only interface is a good fit for that then be my guest!

My point was simply that comparing the interface on 8/8.1 to 2008R2 is not really proof that a server OS GUI is better, as the equivalent server OS is 2012/R2, which looks the same as 8/8.1.

dan1980

Re: Welcome to the 21st century...

@IT Drone

Unless, of course, you're running Server 2012/2012R2 on the back-end, which very much does look like Windows 8/8.1 with ''kiddy-tiles".

Windows 2008R2 looks like Windows 7, 2012 looks like 8 and 2012 R2 looks like 8.1. This is one of my chief gripes with the new OSs - why the hell is my server OS modeled on a phone interface?

Yes, not having personalised desktop PCs is a great idea - I agree (not in all circumstances, of course). But it's not accurate to imply that simply switching to a server OS changes the interface from what it would be in the desktop equivalent. If you're talking about deploying an older version of the Server OS then fine but you could also deploy an older version of the desktop OS and avoid the "kiddy-tiles". (Of which I a not a fan.)

dan1980

Re: They are doing it again

"There must be better ways to relieve the burden of IT support from users' mistakes than simply locking everything down and treating everyone like children."

Maybe, but so long as this is an added option available for sysadmins to use I don't see what the problem is. I'm with Khaptain, above, give us choice in how we do things. While I think each version of Windows has removed choice, this decision adds it.

Is it a brilliant idea? No. Could MS have used their time to do other, more important development? Sure. But you don't have to use it and it doesn't take anything away from what is already there.

Ever since MS made it so much more difficult to deploy custom start menus in Windows 7/2008 R2 (compared to XP/2003), I've been hoping they'd bring this back. In XP/2003 all you had to do is point the start menu to a network folder via GPO and it "just worked".

And, well, some bosses do want users treated like children so, while that policy may be debatable, it's good to have the tools to do it, should we be asked.

Murdoch calls for ISPs to be liable for users' activities

dan1980

Re: FIRST AGAINST THE WALL

@Phil W

Really? I just sit about whinging and then use it anyway.

What, you mean your life isn't governed by apathy? What a strange way to live . . .

dan1980

"This still rankles in the halls of News Corp, which says what it wants is “workable and technology-neutral provisions” to protect it."

That's a reasonable request. However, so to is the expectation that there are "workable and technology-neutral provisions" to protect carriers. A telephone provider is not liable for illegal activity committed over its service so if we are to be 'technology-neutral' then an ISP should not be liable for infringing behaviour conducted over its service.

Right-on Uncle Rupert!

Or does it only apply the one way?

Being technology-neutral must apply both ways for it to be fair to all. Murdoch only needs to look to his own operations. What about reading the newspaper online? Let's just go to the first, alphabetically, in Australia - "The Australian". Reading the terms, one can share the subscription with members of your household (which is reasonable) but not anyone else.

That seems reasonable but a printed copy can be shared with whomever you want. What about companies that buy a few papers and have them in the foyer or the lunch room? What is the online-subscription equivalent? To be technology-neutral, one must allow for a company to sign into their subscription on a kiosk PC or a tablet so that visitors can use it.

What about if I want to find all the reviews of my restaurant from various papers, cut them out and make a framed collage to display in my window? (Which looks awful, but whatever . . . ) Am I allowed to do the same with a digital copy of the articles and copy/paste them all together on my website?

The same goes for online magazine subscriptions vs the printed equivalents. Even more so, in fact as magazines are generally published less frequently are the articles are less time-sensitive. This means people can buy a magazine, read it, and then give it to a friend or leave at work or drop it into the doctor's waiting room.

Where's the 'technology-neutral' equivalent of that?

And this goes to the heart of the matter and the hypocrisy from content providers. On the one hand, they want to treat digital and physical media the same - most notably their insistence that copyright violation is indistinguishable from stealing and should be viewed and punished in the same way.

On the other, they want to treat digital copies as subject to special rules and restrictions not applicable to the physical equivalents.

For what it's worth, I think that the two different media should be treated differently because, well, they are different. There's just no getting around that. The point, however, is that you just can't go treating them the same in a legal context. That means that you can't go about wringing your hands because your online content is being treated differently in by the law, when you treat it differently yourself.

Say goodbye to the noughties: Yesterday’s hi-fi biz is BUSTED, bro

dan1980

Re: Sigh,,,

Sigh indeed.

Sonos make great stuff but the flexibility of those Squeezebox units is unparalleled. You've got IR remote, front-panel control (for the Boom and Touch) and wireless via any number of options, like tablets, phones or PCs/laptops. As you can control them via telnet directly or HTTP commands through the server, you can even write custom interfaces with very little work.

You can also control one unit from another, allowing me to go from the kitchen (Boom) to the bedroom (Touch), sync the playlist and then tun off the kitchen player - without needing to use a phone as the remote.

Little bit more restricted with the alternative systems!

And none of this is really a big change, anyway.

You still have music coming from one or more sources, piped to an amplifier and then to speakers. The only real change with much of this is that the amplifier is inside the speaker enclosure, which is really not that odd at all, or even that new.

What has happened is that all the technology has progressed to a point where all-in-one streaming systems are now small and affordable. And that's excellent - really. The only important measure of a music system is how much enjoyment it brings you and these systems are just great fun (once setup!).

For some people, though, their enjoyment comes from a more traditional setup - sometimes born from the pursuit of ultimate sound quality, other times simply because they love having quality, well made gear. Music is an emotional experience and the method and process of playing it should not be discounted.

I have both - a quality, separates, system in the lounge fed by a CD player but also with a SB connected up and streaming through the house. Sometimes it's a random-all selection on the SB, other times it's a full run through a CD, chosen after many minutes of consideration, and listened to in a darkened room, positioned on the couch dead-centre for best imaging.

The point is that these systems don't replace 'real' hifi systems - they compliment them. If they replace anything, it's more likely they replace the lower-end all-in-one systems and cheap micros that people without audiophile leanings buy.

Sonos knows this, which is why they offer their other units to connect to existing systems as another source.

The only thing missing from the Sonos range is a battery-powered option. There wasn't one in the Squeezebox line either but I get around it by using SqueezePlayer on a phone piped to a Bluetooth speaker. The 'walled garden' the is Sonos offers good consistency and quality but means you've got to wait until they decide to implement a function or fill a need.

Watch: DARPA shows off first successful test of STEERABLE bullet

dan1980

Re: It's been done before.

@Voland's right hand

"Firing a missile out of a gun which after that deploys active guidance systems has been the de-facto standard for tank-on-tank weaponry for 20 years now."

As you rightly say, that is a guided missile - i.e. self-propelled. There are, of course, non self-propelled munitions, such as the Copperhead but, again, there is a fundamental difference in that the trajectory is a more pronounced arc than that of a bullet and it's steering is done by affecting the descent portion of the flight - gliding towards the target assisted by gravity.

No such luxury is allowed for a small projectile like this.

There is also a longer range and thus more time for the round to correct its flight. Sure, this bullet may be designed primarily for longer range shots but, as it requires a special, smoothbore barrel, any gun using these projectiles will be unable to fire conventional rounds and thus be limited in utility.

Perhaps that's not really an issue, though, as presumably there would have to be a fairly sophisticated target selection method, which might preclude engagement of targets of opportunity anyway.

And the size difference is a pretty big thing, seeing as a guided projectile launched from a standard tank gun is some 6 times larger than a .50 cal cartridge. That has repercussions not just for how much fanciness you can fit in but the durability of the round as well.

FCC commish: We don't need no steenkin' net neutrality rules

dan1980

Cost-benefit analysis

On the one hand, I agree that one should never just assume that a given goal is desirable. That's no way to make policy affecting a varied group of citizens and businesses with differing requirements, interests and points of view.

O'Reilly and Blackburn say that you shouldn't jump to the conclusion that Net Neutrality is a good thing without doing a 'cost-benefit analysis' but yet they seem perfectly happy to jump to the opposite conclusion.

While I agree, as above, that you shouldn't just take something as fact, what is the scope of such a cost-benefit analysis? How far into the future does it look? How accurate can it be without predicting future uses of the Internet? A lot of the problems with laws dealing with technology - be they patent laws or those dealing with retransmission (see the Aereo case) - stem from the fact that many of them were penned before the existence of the technologies and uses that they now cover.

Also, what metrics would be used to do this analysis? Would you just take the ISPs' word on how much the reporting will cost them? On their internal speeds and capabilities? On traffic from edge providers or CDNs? More likely, O'Reill is simply working off an assertion from ISPs that consumers would be worse off. Trust us . . .

dan1980

@Al Jones

Right you are - most consumers wouldn't be able to understand the reports. But of course that's irrelevant. What is relevant, however, is that they are required to be transparent so that those with the ability to digest it all can do so and then inform the public. Often this task falls to media outlets - like The Register - who obtain the information, ask those in the know, get comments from the providers and then explain it all to their readers.

I don't understand most of the stuff that gets published by my government but, again, the media and independent experts process this and relay it to the public.