* Posts by dan1980

2933 publicly visible posts • joined 5 Aug 2013

NSA: Yes, some of our spooks DID snoop on overseas lovers

dan1980

Only 12 criminals allowed to go free from the NSA - well that's set my mind at ease

While these invasions may be rare (not that there is any reason to believe they are) they show several things that should do quite the opposite of putting "the world's mind at rest":

1. NSA Safeguards are inadequate

2. NSA Oversight is inadequate

2. NSA Discipline is inadequate

In short, the NSA have taken a massive liberty with people's privacy but have completely failed to respect the great responsibility that they have to those people.

If the government and NSA are defending the legality of their surveillance programs on the basis of FISA approval - saying everything was legal because snooping was carried out only after approval by a magistrate - surely that then means that any person who undertook surveillance WITHOUT such approval has no such legal protection and has thus broken the law.

Let's ignore internal disciplinary structures for the moment - surely these people who undertook this covert surveillance and spying are guilty of rather serious crimes. No?

Here we see the massive hypocrisy with an agency that passes information outside the remit of its programs to other agencies such as the DEA so they can combat crimes but when someone internal has committed a crime, they allow them to go free.

Google reveals its Hummingbird: Fly, my little algorithm - FLY!

dan1980

Try searching MS with Bing . . .

I did this for weeks but gave up. The most inexplicable part was that the site I had the most trouble getting usable results from was Microsoft! (Technet, KBs, etc...) I found myself using Bing through the day but switching to Google anytime I wanted to search for MS content. After a few days I realised I was cutting off my nose to spite my face and just gave in.

dan1980

"Relevant"

Whenever any web-type thing talks about 'relevance' all I hear is: "la la la la advertising la la la la".

NSA in new SHOCK 'can see public data' SCANDAL!

dan1980

Yet more cards removed.

There's nothing new - it's just another indication of the mindset and goals of the US Government, working through the NSA.

It's a bit poetic really - you take all the data points and when you piece them together you have a very solid picture of what is going on with them.

What has been shown repeatedly and now without doubt is that all assurance of due process and oversight and best intentions are bunk. Each revelation (not that this is overly revelatory) has returned increasingly poor defences until finally they have fallen back to: "what we did was technically legal".

Whether any given program of collection was legal or not is largely beside the point; the issue is whether it is in the best interests of the people and, trumping even that, whether the people want it. It doesn't matter if you can point to some secret court setup by a secret vote that okayed secret spying in a secret decision.

The question the Government and the NSA have to ask themselves is: "If the people had full knowledge of what we are doing, would they approve of it?". It's clear that the Government and the NSA realised that the people would NOT approve of it because they lied and evaded and talked around the issue once they were found out.

In short, they knew full well that the people would not and do not approve but did it anyway.

Worse, once they were found out, everything they said to try and placate the people and explain their behaviour turned out to be a lie.

Elop's enlarged package claim was a cock-up, admits Nokia chairman

dan1980

Personally, I always assume carelessness over conspiracy and stupidity & ineptitude over maliciousness. That said, it is amusing to run through the possible scenarios in your head!

VMware to customers: STOP INSTALLING OUR SOFTWARE! NOW!

dan1980

TL,DR: saying "test all updates in a non-production environment" is easy but actually DOING it is a massive task requiring a good deal of time, money, coordination and staff that not all business can afford that.

---------------------

There is a certain snobbiness with some IT people that shows up a lot in these comment sections. It's typified by the feigned incredulity that anyone would ever apply an update without full, rigorous testing in a parallel environment.

While I don't doubt that many people here really do adhere to every best practice and follow every white paper to the letter, please accept that not everyone CAN do that. There may be people here who finished uni and went straight into a Fortune 500 company, supporting business critical applications and able to budget proper solutions. Good for them. BUT, in this modern world, IT is not the sole domain of large multinationals with turnovers in the hundreds of millions. IT systems are at the heart of almost every business - regardless of size or budget - and not every business can afford the kind of systems that those best practices and white papers call for.

The expense of implementing a REAL test environment is enormous. You must have identical servers, with identical interfaces, processors and RAM, identical network switches and routers, identical SAN infrastructure including representation of all tiers, likely with multiple units for each tier to replicate any redundant/striped configuration. If you have replication - as is the case here - you need test versions of all that hardware too. Of course you have to keep all the firmware up-to-date as well - servers, HBAs, NICs, RAID, HDDs, switches, SAN, backup appliances, etc....

Ditto for the software on the servers themselves, though of course virtual machines can be copied over to ensure up-to-date versions. VM or not, though, you will likely need to LICENSE much of the test environment if you will be running it for any length of time (which you should). Some software licensing allows for this but much doesn't.

You also need the space in your data centre/server room for this equipment and to power it and cool it.

Don't forget internet connectivity or private links either. After all, how will you test that a router firmware/OS update (not to mention a reconfiguration) won't introduce some bug, such as a memory leak (has happened with Ciscos before) that results in decreased router performance to the point where intersite replication latency increases beyond some invisible threshold and the process fails? This is something you might not see in a back-to-back router configuration because the base latency will be negligible and therefore an increase of, say, 30ms might not push it over the edge but when combined with a WAN connection at 10 or 20ms, will.

THEN, after all that is done, you have to actually run a representative workload on it and do so for long enough that any problems become apparent because some bugs only occur in very specific, unlikely scenarios but when they happen can be critical. That means that you have to somehow have live data to work on in your test system because otherwise it's impossible to have users working on the test system with dead data.

Best practice is also to test updates in isolation. Great, but how many bits of software and firmware need updates? You've got firmware, hypervisors, management consoles, OSs, support software, user applications, databases, LOB apps, monitoring and deployment software, backup and replication software, etc... That's just on the servers of course; you still have to look after the client machines, keeping them patched and updated but ensuring they can still access the systems. To do that, you need representative samples of all client machines too because you never know when some Windows update will conflict with the NIC driver and effectively render a portion of your machines useless.

Also, anti-virus . . . so much pain.

But of course, best practice is also to keep systems fully up-to-date and more than a few software vendors will offer only limited support (if any) unless your system is running all the latest patches and hotfixes right down the chain.

Oh, and you must have enough staff to cover the extra workload, but all companies have plenty IT bods anyway so that's likely not a problem for anyone . . . right?

So that's what's involved in testing updates before applying them and will cost a significant fraction of the IT budget to implement and maintain.

Something like the update in question should of course be tested but the question is how much do you test it? It might be simple to test replication but the point is that you don't KNOW what a given update might break so you have to test everything. What if an update breaks USB redirection but only with large (e.g. 2TB) drives or those formatted with FAT32? (Granted, that's not likely to be too critical but you never know.)

And, as a last note, perhaps some people who installed this update actually DID have a test system but it was just a simple host and so they were not able to test more advanced features like replication as they did not have the budget for the extra hardware.

Microsoft relents: 'Go ahead, install Windows 8.1 on clean PCs'

dan1980

Re: Insane

The reason for almost all otherwise unfathomable Microsoft restrictions is that Microsoft wants to force people into purchasing and using their products in certain ways.

I am not even slightly defending their decisions or saying they are reasonable - because I don't think they are - but that appears to be what is happening. It may well backfire and may well hurt sales but they're trying it anyway.

This spreads right through, from features to UI, to marketing and to licensing and pricing.

Microsoft mocks Apple and new iPhones in vids it quickly pulls

dan1980

Re: Stop trying to be funny - just make products people want to use.

. . . but then, what i was trying to get at was not so much 'unsurpassed' as 'not surpassed'. In effect contrasting their business dominance with other areas where Apple have or are looking to surpass Microsoft.

I accept that 'unsurpassed' was too ambiguous a word and lacked clarity but I like it in the comparative sense above, where the word doesn't imply that someone is the undisputed winner, so much as in the lead.

There are likely better words, though perhaps 'still unsurpassed' would have made my meaning more apparent.

I like the Reg and I like you folks; it's nice to be able to simultaneously have a discussion about technology and language with people who have intelligence in both. On an unrelated note, my pain meds have just kicked in.

dan1980

Re: Stop trying to be funny - just make products people want to use.

Dominant. Sold.

dan1980

Re: Stop trying to be funny - just make products people want to use.

Correct.

But also, 'unsurpassed' does not necessarily mean 'best', nor even 'best suited'. It can mean: to a greater extent than any other option - the leading option as it were. (Note that that doesn't imply the BEST option either - just the leading one.)

dan1980

Stop trying to be funny - just make products people want to use.

Everything else aside, at some point, you've just got to realise you aren't funny so you should stop trying.

My biggest annoyance with Microsoft at the moment is that they are trying to compete with Apple and in doing so have almost completely missed how Apple managed to, overall, grab such a large amount of market share.

In (overly) simplistic terms, Apple got where they are by offering something different - a different philosophy, different direction, different aesthetic. Apple stopped trying to compete on Microsoft's home turf years ago and once they made that decision, they were free to carve out their own patch; a patch they have made so lucrative that MS are now trying to succeed where Apple failed - fighting on opposition ground.

The Windows ecosystem is unsurpassed for most business use. I don't mean stacks of servers in a big Hadoop cluster - I mean PCs on desks. Microsoft are now eroding that by trying to compete with Apple. just look at the backlash over so many of their recent changes.

These kind of ads and marketing decisions are just more of the same - they're still playing catch-up on those "I'm a Mac; I'm a PC" ads

The thing that Apple has always done well is to create an image and follow it. When looking at anything Apple - be it a store or an iPhone or an advertisement - I feel that everything about it has been vetted against a very simple set of design and image principles. Microsoft are so damned piecemeal because they want a slice of every pie.

Turnbull floats e-vote, compulsory ID

dan1980

Re: None of the above

Voting is mandatory but moreover is a right of all Australian citizens. Having photo ID, however, is NOT mandatory as we are not (yet) a police state with internal passports and are not required to have our documents with us at all times.

I had an argument with one of the polling officials a few years back when they asked me for my driver's license. I told them I didn't drive (whether or not I do is irrelevant). He then told me I couldn't vote. I asked him if only people who drive were allowed to vote, which confused him for a bit. He then asked if I had a proof of age card and I told him that I didn't drink either. (I so do - far more than my doctor is comfortable with.)

He called over the person with the most impressive lanyard, whom I then continued to argue with off to one side. She confirmed that I needed photo ID and wouldn't budge from that position. I asked her what would happen if I didn't vote and she said I would get a fine. I pointed out that I was in effect being fined for not having a photo ID and that that was rather odd seeing as there is no legal requirement to have a photo ID.

I told her that I had never needed photo ID to vote before and she said that that those were the rules and that was that. I got a fine and replied with the explanation that my polling official had prevented me voting. Never heard a thing back.

Not that it mattered as my seat is about as safe as a set can be.

Now the real TL;DR....

It is fundamentally un-constitutional to require people to have a photographic ID in order to vote. While the question of whether the constitution does in fact guarantee the right to vote was up for debate for a long time, it was fairly much settled in the affirmative in late 2007; Australian citizens have a constitutional right to vote.

Section 41 of the Constitution states that no adult with the right to vote for at the state level shall be prevented by any Commonwealth law from voting in federal elections. That of course dates from the colonial period but taken with s7 and s21, and the (relatively) recent judicial interpretation that they do in fact guarantee the right to vote, the Constitution states that no law shall prevent people from voting.

Constitutional rights have legal primacy and cannot be changed or negated by legislation.

Passing legislation that REQUIRES people to show photographic identification has the side effect that anyone without such ID would then be denied their now confirmed constitutional right to vote.

You might say that the requirement to enrol to vote is therefore unconstitutional and that you should be able to vote without enrolling. It's not been tested but you can indeed vote without enrolling, which is called a 'declaration vote'. Exactly how that works I am not sure but whatever.

Sure, having photo ID might be a requirement of setting up a PO Box but then access to a PO box is not, so far as I am aware, a constitutional right.

Storage rage: Like getting a nice steak and being told to only eat 80% of it

dan1980

Re: Fragmentation

Nice explanation - thanks. (And have an upvote.)

One question I've always had is how this logic applies to modern storage setups. Surely in even a basic RAID 5 situation the idea of sequential writes is a bit moot - no? Extend that out to a SAN arrangement with data distributed, striped and replicated across multiple already striped arrays and surely the idea of sequential data is even more confusing. Extend that further to TIERED storage systems, where different bits of the data are striped across different sets of arrays and may be moved back and forward from NL to SAS to SSD to cache and I just can't see the concept of 'sequential' even having meaning there.

I'm not contradicting you, I just don't understand exactly; how does this work in modern arrays, striping and replicating data in myriad complex and (allegedly) self-optimising ways. Of course, if you use a tiered system then I would assume that free space would be very important to allow data/block mobility across the tiers, but not for the reasons of keeping things sequential.

I very much get your point about free-space lists and that makes a lot of sense to me. Personally I always try for a MINIMUM of 10% buffer across pretty much anything that even vaguely looks like IT equipment and mostly aim for 20%. BUT, much of that is prudence on my part due to my acceptance that I don't understand all the ins and outs of every technology and so am better safe than sorry; I have always suspected that people with more familiarity with things could spec a solution with much less 'waste'.

US military: 'Help us build the ROBO-WARFIGHTER OF THE FUTURE'

dan1980

Barring the sunsets (I'm sure they're lovely), I'm not confident you've refuted our cowardly friend.

$3.50 for 5900KJ (68% of a healthy adult intake). Of course, I concede that that may have been your point.

New! Yahoo! logo! shows! Marissa! Meyer's! personal! touch!

dan1980

Interesting, but pointless.

I kind of like the old logo.

That said, I am fascinated by the design process and the details, though I don't really care for the 'waisted' look in lettering.

Looking at the way it was designed and the reasons, it's interesting and quite clever but just another example of design-by-committee - something that almost always ends up looking like it was designed by, well, a committee...

While on the complete other end of the spectrum (boring and safe), it reminds me of the London 2012 marketing - the logo and those horrid characters. Everything was chosen to signify something or other that some stakeholder though was important and the result is an unfocused mess.

On the Yahoo! logo, specifically, it's not a good sign. When a company starts with an 'edgy' logo in its youth and then later, once it has grown, changes the log to something that 'references' the old one, it's a pretty sure indication that said company is no longer young, edgy or dynamic.

dan1980

Drinking is always the right answer.

Reports: NSA has compromised most internet encryption

dan1980

What baffles me is that this work is not done by politicians or generals or bureacrats, it's done by IT people.

Now, sure, much of the problem is with the government co-opting mainstream tech companies to force them to use their talent pool to work for the NSA (effectively) but surely much of the unpalatable spying is being effected by IT people hired by and working directly for the NSA - with knowledge of what they are doing.

Right?

How does it happen that the best and brightest are willingly working to destroy the privacy and freedoms of everyone else? Is it that they go in with an attitude that they will make sure they stay ethical and then just slide? Or are there really enough people who actually believe this is a good thing?

'World's worst director' plans Snowden-inspired movie comedy

dan1980

While I can imagine some reasons investors might fund Mr Boll's productions (the aforementioned tax reasons), I am at a loss as to why anyone would agree to 'star' in one. Okay, sure aspiring actors take what they can get, but I've seen people whose names I actually know. How does that happen?

Torched £30 server switch costs phone firm millions in lost sales

dan1980

Re: Citation needed

I don't know Delran or the supposed phone company involved. I don't even really know exactly what 'configuration management' is.

BUT, I suspect the point is that the phone company didn't actually understand the configuration of their systems such that they didn't know that there was a server responsible for this process. Perhaps they thought it was handled elsewhere, by a third party.

The idea of implementing a 'configuration management' process is a bit odd but typical. The problem is that everything is managed by segmented teams with defined 'processes'. Sounds good but the result is that there is no one who really understands the system as a whole. Banging another 'process' over the top of that doesn't really address the issue.

If this is a 100% true story, I suspect that the phone company in question had lots of processes in place, managed by teams who didn't communicate with each other and this server just got 'lost' as it didn't fit neatly into those processes and/or teams.

While these comments are often quite well populated by people who are about doing everything exactly by the book, I'd wager almost everyone who's been is IT long enough has 'lost' or 'found' a server they never knew existed. Usually it's during a change - often a migration but sometimes a failure.

As one of the posters remarked - there's really no substitute for a dedicated sysadmin (or team) who understands the system and makes it his/her job to ensure that things work. The larger the system, the less that is possible but processes will never be able to replace the efforts and first-hand knowledge of that one odd dude with the ill-fitting shirt and abrasive attitude complaining about every change to the system.

And, regarding the specific question of the "£30 switch", perhaps it was some power switch? Or perhaps he meant 'network interface'?

TDK calls it quits on tape media thanks to 'difficult environment'

dan1980

I still love you tape.

There are several benefits of tape but the most important is portability. Yes, in the volumes that some companies use, it's not portable in the pick-it-up-on-the-way-out sense, but from a legal point of view, tape is far more portable than storing all you backups in a cloud service consisting of thousands of spindles distributed across multiple physical locations.

While it's possible to overcome the issues with, say, cloud backups by throwing money at it for larger pipes, etc... no amount of money with make those solutions portable in the same way tape is - especially in smaller quantities.

It's also good from a records management point of view. All the legal firms I deal with still maintain an archiving system based around bits of paper arranged in vertical files, shuttled about in archive boxes. The beauty of that system is that (with proper management), records are stored out of sight, out of mind at a specialised, offsite location and destroyed once the retention period has elapsed. Tape has similar benefits.

'WTF! MORONS!' Yahoo! Groups! redesign! traumatises! users!

dan1980
Megaphone

"Modern", "streamlined", what?

I rarely swear in the comments section and could easily avoid it now but have decided to go with it.

Why the FUCK do software companies continually FUCK up interfaces? WHY??? Who the fuck is making these decisions? Who the fuck are they testing them with? FFS.

Invariably, the redesigns have the following in common:

>> They are described as 'clean' and 'streamlined'.

>> They reduce the information density - sometimes drastically.

>> They never address any of the usability problems that people actually want fixed.

The redesigns are almost always geared toward forcing users to interact with the software the way the vendor wants, rather than allowing them to choose how to use it themselves. Options they don't want people to use are removed or buried and defaults are changed to reflect the desired usage patterns.

MS are the kings of this but not even close to alone.

And anyway, what does "we value customer feedback but won't be changing anything" (paraphrased, of course) mean?

Storage vendors: You're next over the cliff after the server salesmen

dan1980

This reads like a suicide note from Alex Jones.

dan1980

Re: Strictly American viewpoint on a Global issue

Amen.

Man, every time I hear people going on about stuff like this, all I hear/see in my head is some stereotypical bro with his shirt off chanting "U-S-A, U-S-A!".

(Though I've got to say - the recent launch of an Australian Amazon presence is very cool.)

dan1980

Re: Believe a forecast?

So close to an upvote (we all crave them, surely . . .) until that last sentence.

Sage 50 activation blackout: Shops sent back to paper age

dan1980

Always a "small" amount of customers . . .

Why do PR always say that only a small amount of customers were impacted? Do they really think that makes them look better or that people are that dumb? If someone's business has been crippled by a fault exactly how much better do they feel when told that only a few customers are affected?

Over here in Australia, I've experienced similar problems with MYOB's live service: it's Amazon's fault. Apparently.

As a customer (well, tech support calling on behalf of a customer) I don't CARE if it's due to Amazon - you sell the software, you designed the systems, so YOU are responsible. If there are issues with the cloud provider chosen then it's your fault for using Amazon or not making provisions for service continuity in the event of an outage.

You might say that the end users are similarly at fault but it's a much simpler matter for a large software services company to implement a redundant database configuration (say, hosting their own pervasive farm for backup services) than it is for a company to somehow implement a redundant accounting, inventory and payroll system.

As with DRM (mentioned above) - the assumption from the vendor is that their system will always work perfectly so things like constant connectivity and continual re-activation are coded in relying on that. People should design such software with the assumption that it WILL fail at some point and build in measures to allow paying customers to work around it.

Vietnam crimps online freedom of speech with 'Decree 72'

dan1980

It may be damned hard to enforce but that's the scariest thing about it. The more unenforceable a law like this is, the more the government must make up for it by making the penalties overly harsh.

It might only catch a few people but you can be sure that those people will get a very stiff punishment for it, just to discourage others.

Selfie twerks its way into the dictionary

dan1980

Re: Selfie, Girl Crush, Twerk

I suppose the thing to remember is that 11 year olds will one day be in their 40s and 50s and may well still use words like this, if not actually partake of the practices. (Let's hope . . . )

I mean, it might be cliched but who hasn't heard a grandparent (or parent, age depending) refer to something as 'hip'. It might evoke images of Grandpa Simpson but my own grandmother has said that in reference to some young people.

The word 'hip' would have at some stage seemed very made up and confined to young people who didn't use proper English, but those young people grew up and the word stayed with them, even though it was superseded by new words that the next generation of young people coined.

When it comes down to it, by the time Miley Cyrus is 70 and her grandchildren are (hopefully) good-naturedly humouring her when she tells them how she caused quite a stir in her day 'twerking', those grandchildren will have their own words for a whole host of things and Miley may be wondering how those can even be considered words.

Qld Health starts briefing industry on IT refresh

dan1980
Paris Hilton

Re: Here's a start . . .

The key thing is to not start looking at a solution until you have properly identified your needs.

Doing it the other way round almost guarantees a solution that isn't ideal but that way of doing things is pretty much a government specialty.

I suppose that comes from governments wanting to make big noises about anything they're doing or planning to do. Oppositions (and the media) often criticise governments for wasting time talking and planning but not actually doing. So from a government perspective, it must seem better to start a project NOW and have it blow out by 2 or 3 years (and millions of dollars) than to spend a year planning properly and have it delivered sooner and in budget.

At least they can say they're doing something. (No one seems to care if they're doing ti right.)

Paris for the shameless self-promotion without substance.

dan1980

Here's a start . . .

*Step 1* - Set up a group to oversee the implementation and draw up a draft budget.

*Step 2* - Engage a dedicated 3rd-party consulting team to review the current systems and assess needs - they should speak with all project stakeholders including (and especially) end-users.

*Step 3* - Engage a separate systems integration team to scope a solution, directly addressing the criteria listed in the review.

*Step 4* - Create a firm budget and timeline.

*Step 5* - Get you legal team to draw up a contract. Make sure it is detailed, listing specific processes, outcomes, timelines, budgets and appropriate penalties for failing to meet any of them. Set mandatory review points, both by schedule (to assess progress) and at the completion of any major function/component. Reviews should include representatives from all stakeholders.

*Step 6 * - Review, test and communicate continually.

Or, to simplify: plan properly, budget properly, manage properly and review properly.

Let's go one simpler: treat it as if it was your own money.

Engaging a single entity to do it all and just letting them get on with it has the potential to be quicker and cheaper if it all works out well. Unfortunately, it is almost assured to work out quite badly indeed, costing far more in overruns and 'fixes'.

Take the time and put in the work to plan it out properly and you will almost always come out ahead with a more functional system that better meets your needs, delivered far closer to on time and in budget.

Tesla tops $20bn as Elon Musk claims arm-wave design tech

dan1980

So, just to clear this up, is Mr Musk saying he can design a rocket from the ground-up in this fashion or that he can select from a bunch of pre-designed components and wave them into place?

Not that the latter system wouldn't have it's uses, just that it's not quite designing a rocket.

Silicon daddy: Moore's Law about to be repealed, but don't blame physics

dan1980

Re: No improvements in chip architecture for economic reasons?

Even if it proceeds exactly as you say, that still breaks Moore's law, which essentially says that the cost per-transistor will effectively half every two years.

The reason Moore's law has been so unerring is at least partly due to Intel baking it into their road-maps and business plans. And the reason they have done that is because process shrinkage leads to bigger profits. This is important as increasing the 'speed' or 'power' of their chips does not necessarily make good business sense whereas shrinking the die very much does.

That's why Moore's law has continued - economics. Once the economics of reducing die size looks unfavourable, Moore's law fails.

That's not to say that CPUs won't get more powerful, just that they won't double the "complexity for minimum component costs" ever 18-24 months as is currently the case.

dan1980

Adding another layer onto a CPU will almost certainly INCREASE the cost per-transistor and, therefore, regardless of performance, will instantly break Moore's law.

The crucial 'at minimum cost' part of Moore's observation really relies on process shrinkage. That's not to say some other mechanism won't take up an exponential growth again, but it will be after Moore's law has been broken.

Such an exponential growth would be far more reasonably measured by performance (e.g. FLOPS) than 'complexity' or, more simply: "the number of components per integrated circuit".

Remember - Moore's law is not about performance.

dan1980

Re: Human Brain 1000000x more powerful than a computer

@ewozza

More powerful? Well, that all depends on the measurement.

'Speed' and 'power' are well-defined terms. The problem is that to use such terms in such a way that they are useful, you have to be very careful to define exactly what you are measuring.

If you said that a Ferrari was faster than a bus you'd think you stood on pretty solid ground. And you'd be correct if you were measuring how quickly each vehicle could carry the driver to a given destination. But, you'd almost certainly be INCORRECT if you were measuring how quickly you can get 50 people to a given destination.

That ambiguity is why Moore didn't talking about power or speed; he talked about transistors. So, saying the human brain is "1000000x more powerful than a computer" has nothing to do with Moore's law.

Of course, I don't believe that you were implying it _did_ but, again, the question of what is more 'powerful' - the brain or a CPU - cannot be answered unless you define exactly what qualities you are assessing and what measurements you are using to come to a conclusion.

At any rate, the brain is not comparable to a CPU (which is the subject of Moore's law and this article) but to an entire computer; hardware and software. The brain has specialised components for processing different senses, short term and long term memory, speech, etc... It also has very sophisticated 'firmware' to pull it all together.

The brain does use a fraction of the power of a modern HIGH POWER processor but then 1/1.1 is a fraction so that's not really helpful! Average numbers are about 20W for the brain. That sure is less that modern Intel desktop and server CPUs but is more than the latest Atoms.

You might argue the brain is 'more powerful' than an Atom CPU but again, it really depends on what you are measuring.

As for questions about orchids etc..., that's not a CPU problem - that's a software problem. Anyway, you have to feed all the data points into the CPU. Saying a CPU can't understand an orchid is irrelevant because a brain can't either if it's removed from sensory input!!!!

United Nations to grill US over alleged NSA bugging of its HQ – report

dan1980

Re: Shows the danger of encrypted voice communications

Remember as well what we have seen with the revelations of the NSA passing information to the DEA. No reason to think they don't do exactly the same thing with other 3-letters like the SEC.

Oz retailers crying wolf over incomplete data

dan1980
Flame

. . . That said, I realise there are lots of smaller retailers out there who are essentially in the same position the consumers are in.

It's not a great situation.

The most annoying part of it all is that these companies are able to outsource production, support and even shift their profits around through overseas subsidiaries to avoid paying tax, but they seem determined to restrict consumers to purchasing through one designated chain rather than shopping around for the best price.

dan1980
Devil

The so-called 'bricks and mortar' shopping industry has dug itself a huge hole in much the same way that music companies have.

The industry built a certain structure to exploit the conditions that existed pre-Internet shopping. It revolved around the various links in the chain being gate-keepers, using restrictions and inflexibility as a means to dictate terms - restricting competition and thereby allowing them to keep prices artificially high.

It's unnecessarily wasteful and results in higher prices for consumers. But, the conditions were such that customers were forced to accept it.

Internet shopping has allowed individuals to bypass the deliberate restrictions and anti-competitive behaviours of those gatekeepers but now those gatekeepers are complaining that they are being hard done by.

What we see emerging, though, are those same restrictions being applied through the online shopping system with certain vendors preventing online store overseas selling their products to Australian customers, thus (again) artificially restricting the way consumers can purchase goods.

Competition trims fat and (hopefully) makes things more efficient. The old structure deliberately restricted competition and those responsible grew very fat indeed. Now (too continue the metaphor,) they are too heavy to compete in the newer, lighter environment of internet retail so they are trying to hobble their competition rather than, well, compete.

Guardian teams up with New York Times for future Snowden GCHQ coverage

dan1980

Re: But.... but...

Illegal?

Probably not. One of the most worrying things is that what is being done is perfectly legal. The problem is that it is is legal based on:

* Legislation that was passed in private

* Continuing resolutions by publicly-elected members subjected to secrecy restrictions

* Secret judgments made by a secret court not subject to any oversight

So the problem is not that this behaviour is illegal, it's that the various governments have secretly voted themselves ridiculously broad powers enabling them to essentially do what they like. Further, where (in the US) they might fall foul of the fourth amendment, the have side-stepped that pesky stricture by invoking 'national security' - you can't challenge the government in the supreme court if you are never allowed to now what's going on.

In fact, legally, you can't ever challenge the legality of the system. In other words, even the government has acted illegally, it is still illegal to try to stop that behaviour.

Screw you, Brits, says Google: We are ABOVE UK privacy law

dan1980

Re: Nuts

@AC - 6:42

> "Under Irish law, a company is where its management team is. This is an anti-avoidance measure which means you can't set up a company in Ireland, and run it from Ireland, and register and pay taxes in Andorra. It keeps Irish companies resident here for tax purposes."

Not quite.

What you say is true, but only for certain values of 'Irish companies'.

What happened was that a few decades ago, British and Irish tax law allowed for locally incorporated companies to be tax resident wherever their 'effective management' was. In other words, an English or Irish company could be tax-resident in a foreign country. About 20 years ago, the UK abolished this to keep local profits at home, forcing companies incorporated in the UK to also be tax-resident in the UK. Ireland followed suit but made a crucial exemption for foreign-owned companies.

That is the key piece of the puzzle as it allows a foreign company (like Google, Apple, etc...) to set up an Irish company that is tax-resident in some offshore tax haven like Bermuda.

Now, to be able to do that, the foreign company (e.g. Google) must have an actual presence in Ireland. This is why the arrangement is called the 'Double Irish' - it requires TWO Irish companies.

There are many complications in this system and it does indeed require the use of a particular piece of US tax law that allows this to be packaged up neatly but the point is that it is the legislation in Ireland that supercharges this, resulting in truly miniscule amounts of tax being paid.

Skipping steps and simplifying a lot, the relevant US code allows two companies to essentially be considered as just one company - the parent company - under certain circumstances.

This, in itself is not helpful. After all, if there were two Irish companies, both tax-resident in Ireland then who cares if one is a subsidiary of the other and charging royalties? In the end, an Irish company is earning profits and subject to relevant tax. The loophole only reaches its potential when coupled with the Irish loophole that allows a foreign-owned corporation to setup an Irish company that is tax resident elsewhere. THAT arrangement is why there is value at all in the US ability to disregard the Ireland-based Irish company in favour of considering only the Bermuda-based Irish 'parent' company.

> "The "problem" for other countries is that they don't have this anti-avoidance measure. They allow under their laws for local companies to be registered elsewhere."

That's also not correct.

Google US cannot be registered in Ireland. It doesn't work that way. However, Google can create a subsidiary company called Google Ireland and incorporate that in Ireland. That kind of subsidiary law is the same in almost all countries because subsidiaries, by definition, are legally separate entities. Without that, multinational business pretty much couldn't function.

Remember that subsidiaries don't have to have anything to do with the parent company's business. For example, I could be an ISP in the UK and then set up a subsidiary company in the US that owned a chain of florists. That US florist chain would be governed by US tax laws but any profits it returned to my parent company in the UK would be taxed in the UK. That's the normal state of things and that has nothing specifically to do with the Irish-based tax avoidance strategy.

Both the US and Ireland have anti-avoidance measures that prevent locally-incorporated companies being tax-resident in foreign jurisdictions (almost always tax havens). The difference, as explained above is that Ireland grants an exemption to this when the locally-incorporated company is owned by a foreign corporation.

To make the difference clear:

* If an Irish company creates a subsidiary in the US, US tax laws will force it to be tax-resident in the US and subject to US tax at ~35%.

* If a US company creates a subsidiary in Ireland, Irish tax law allows that subsidiary to be tax-resident in Bermuda and so subject the Bermuda's tax laws and subsequently taxed at 0%.

Hope that makes the Irish loophole clear.

If the problem was simply the US then there would be nothing special about Ireland and you would have all kinds of great names like the "back-to-back British", the "Indian iteration" or the "duplicate Danish"

-----------------------

Please note, I am not passing judgment such tax avoidance strategies. Opinions vary as to if this is a good or bad thing with some claiming that these strategies, which allow Google to pay less tax, also allow them to invest that money back into the economy, building data centres and headquarters and employing thousands of staff, construction workers, contractors, etc...

Forget hackers - storms and snafus are bigger threat, say infosec bods

dan1980
Holmes

Re: Cyber attacks/cyberwarfare = the new yeti?

TL;DR - Worry about 'cyber attacks' but don't stress too much about full-on 'hacking'.

-------

It's pretty obvious, anecdotally at least, that completely non-malicious events are the main cause of downtime. That's not to say humans aren't to blame, because in my experience stupidity, laziness and false-confidence are the main causes of issues.

But, to headline a story "Forget hackers - storms and snafus are bigger threat" is a bit misleading.

Here's Dan's friendly advice: DON'T 'forget hackers' but DO realistically assess the risk.

Having been a consultant I have had many clients ask how safe they are from 'hacking'. I usually tell them that there is always more that could be done and there is always risk but that, realistically, no one would be interested in 'hacking' them.

That's the crux of it.

Cyber attacks come in four forms:

1 Un-targeted, mass-distributed attacks (malware, website XSS, etc...)

2 Opportunistic attacks

3 Targeted attacks from disgruntled employees/contractors

4 Targeted, concerted efforts

The first two are what 99.9% of companies should focus on and the strategy to mitigate those risks is simple - conceptually if not in implementation:

* Patch bugs and keep software up-to-date

* Keep a good security/virus/malware solution up-to-date

* Adhere to the principle of least privilege

* Prevent users from installing software (so far as feasible)

* Enforce a strong password policy

* Monitor your links and general server health for any anomalies

But perhaps most important: educate your users. Have a thorough written IT policy that is reviewed periodically and advertised regularly. Make sure all staff have read it and understood it and make them sign off to say they have read it and understood it. Repeat this at least once a year and whenever it is updated. Make sure there are clear disciplinary consequences for users who do not follow the policy.

As I tell my clients, the settings and restrictions implemented from the IT side is NOT an IT use policy - it is the means of enforcing and monitoring an IT policy.

<Got a bit sidetracked there - you can tell I've tried to get this across to more than one stubborn client.>

The third attack - one undertaken usually by people known to the company like previous or current employees - is not overly common compared to the first two but is still the most common TARGETED attack so is worth spending a bit of time addressing. The simplest and most prudent step to take is around your password and access policy; make sure everyone has a strong password that is regularly changed and that staff are made aware that they are fully responsible for their password and should NEVER give it to any other staff. That means that us Sysadmins are never to ask a user for their password - we must instead reset it.

Really, most of the steps for mitigating the first two attacks apply to this as well as such attacks will usually be of a low to intermediate technical level and if not successful at first, are likely to be dropped.

To get from protecting against the first three attacks, to protecting against the last is a BIG step. Sure there are little, sensible things you can do but in the end, a truly determined effort will breach most networks.

This is the 'hacking' most of my clients are talking about and the reality is that it's a non-issue for most companies.

An analogy for the whole thing might be dying. (Sorry for the dark tone.)

Natural causes, disease and accidents are the most likely causes. Have a smoke alarm, don't fiddle around with the electrics, look before you cross, exercise, eat healthy, etc...

Malicious attacks on your network are similar to malicious attacks against your person. Sure, they're less likely than disease or accident but that doesn't mean you shouldn't take reasonable steps to avoid being mugged.

Without drawing a parallel for every type of cyber attack, real 'hacking' is like being murdered by a hired assassin - exceptionally hard to protect yourself against but for the uncountable majority of people, it's just not an issue. Some people of course are more likely to be the target of an assassination attempt and so it is with companies and their IT systems. Those companies at risk of such an attack take very detailed, very expensive precautions and these require CONSTANT monitoring - just like (e.g.) presidential security.

Sherlock, because it does seem all rather elementary now that I've bashed it out.

UK mulls ban on tiny mobiles to block prison smugglers

dan1980

A typical government response.

Being in Government would be an ace job - you'd never need subtlety, intelligence or even a working knowledge of the issues at hand or technology in use. All you is need is a big hammer do deal with all those problematic nails you keep seeing everywhere.

The ineptitude of our various governments (no different in Aus) would make for truly amusing fare but for the fact that these monkeys have unprecedented control over our lives and seem infinitely more concerned with looking tough than with being effective.

It'd be like if you took your car to the mechanic because you had a misaligned wheel and when you came to collect it they presented you with a scooter instead. When questioned they'd explain that the wheel was too difficult to fix so they sold you car to the scrap yard and that'll be $7,000 for the scooter, please.

Yahoo! Japan drops UPS systems, crams batteries into servers

dan1980

Unless I am wrong, the story didn't say there weren't generators in the equation, just that such a configuration would allow them to avoid them. Of course, with a geographically distributed load (as I am sure Yahoo! has) extended uptime during power outages is less relevant so you probably could do without them.

Even if generators were still used, surely there is a worthwhile saving anyway?

I mean, removing generators from the equation, you have AC > DC > AC > DC - with the UPS converting and incoming AC to DC for the batteries then outputting AC which gets fed into the PSUs which then converts back to DC.

With a directly-attached battery solution, you just have AC > DC - the line power goes into the power supply, is converted to DC which feeds the batteries which in turn feed the servers. (Or in parallel - whatever.)

Over the scope of an entire, Yahoo!-sized data centre, that's likely to be a significant saving.

NSA admits slurping thousands of domestic emails with no terror connection

dan1980

While any given revelation about the NSA's programmes is worrying enough on its own, it's the combination that shows the real problem.

This is the chain that has been revealed to have happened:

1. NSA captures data involving non-USA people in an attempt to find terrorists (apparently)

2. In the process, NSA captures data from USA people demonstrably not involved in terrorist activities.

3. NSA finds evidence of some a drug-related activity.

4. NSA alerts the DEA

5. DEA uses that evidence to target and arrest someone

6. DEA fabricates claims and evidence to hide NSA involvement

To summarise, an American citizen has been arrested under false pretences (random stops, etc...) based on information that was illegally collected, then rather than being disposed of, was searched (manually or automatically) for activities outside the remit of the collection programme and then passed onto another, unconnected agency who then lied about the whole affair.

Or, to summarise the summary, evidence gathered in violation of the fourth amendment has been used as the basis of an arrest.

According to the released reports, that process has happened numerous times. And that's just what we know about one such 'information sharing programme'. What other illegally obtained data is shared and with whom?

This is the big issue.

I think a lot of 'normal' people accept that surveillance of some kind is warranted, even if the concept is unpleasant. (I get it, not everyone does – no need to go crazy.)

From that, most people would agree that from time-to-time it is almost inevitable that even the most well-meaning programmes will capture some data pertaining to ordinary citizens, simply as a by-product of a more targeted collection.

Accepting that, there is an expectation that such data should be disposed of immediately and purged entirely from the system.

Unfortunately, but perhaps predictably, at every step the NSA and the American Federal Government has greatly overreached the boundaries that might be deemed reasonable by the proverbial man on the tram/omnibus.

In other words, I think people are prepared to allow the Government limited scope to break the rules in order for things to function efficiently, so long as such problems are searched out rigorously, identified quickly and remedied completely. It appears that none of these things have happened but instead quite the opposite, with such ‘breeches’ occurring regularly and exploited routinely.

Legal bible Groklaw pulls plug in wake of Lavabit shutdown, NSA firestorm

dan1980
Megaphone

Re: I' not buying the Groklaw arguments - see the evidence..

@AC 14:58

Okay, great - e-mail for the groklaw.net domain is hosted with Google (at least at the time you looked at those records).

That's a fact, based on the DNS information you have presented. But, to get from:

"E-mail for 'groklaw.net' is hosted with Google"

to:

"Pamela Jones is dishonest and full of shit"

requires two very large assumptions: that Pamela Jones and the Groklaw team used the easily identifiable (you found the details) 'groklaw.net' domain for all confidential e-mail - and that they did so without the use of any security in their e-mail client(s). As opposed to, say, just using the main e-mail for day-to-day stuff and preliminary communications and then using one or more other e-mail addresses (which she doesn't publicly advertise) with one or more secure providers for the important, sensitive communications. For really sensitive e-mails she might even have setup specific, disposable addresses.

Now, not knowing Pamela or the full details of the Groklaw operation, I can't say that this is the way they did things but the point is that you can't say that it isn't.

Essentially, there are three facts:

1. Pamela Jones has cited e-mail privacy/security concerns as the reason for closing down Groklaw.

2. E-mail for the (publically advertised) groklaw.net domain is currently hosted with Google.

3. Google has said that there should be no expectation of privacy with their services.

From those facts, there are several possible conclusions one might draw:

>> That Ms Jones and the Groklaw team are honest about their focus on privacy but not technically savvy enough to understand the problem presented by hosting e-mail with Google.

>> That Ms Jones and the Groklaw team are technically savvy enough to understand the problem but are dishonest when it comes to their professed concern for privacy.

>>That Ms Jones and the Groklaw team are honest about their concern for privacy and technically savvy enough to not only understand the problem with conducting confidential communications via Google e-mail but also actually do something about it and use a secure e-mail client and/or use other, more secure e-mail accounts that aren't publically advertised.

Given the fantastic, publically-minded service that the Groklaw team has provided, I am inclined to give them the benefit of the doubt in regards to their integrity and honesty.

Regarding their technical ability, remember also, that Groklaw is not just Ms Jones working off her laptop at home, it is a collection of people with various backgrounds including journalism, law and IT. Also, unless you missed it, the site deals with IT, specifically Linux and other open source endeavours. Given the focus of the site and the spread of people working on it, I find it vanishingly unlikely that they didn't employ a whole range of technical protections to keep e-mail as secure as reasonably possible.

Even without the IT focus, many in the team are journalists. Now, not all journalists are technical wizards, but I get the distinct impression that any journalist dealing with sensitive information and confidential sources has the resources to call on to mitigate at least some of the risks of modern communication.

FURTHER, as it is a TEAM, and not just PJ, you are assuming that ALL the people working at Groklaw used the groklaw.net e-mail domain and not their own, privately setup ones.

I suppose you think that Glenn Greenwald exclusively uses (something like) ggreenwald@theguardian.co.uk for all his communications with Edward Snowden.

And, even if the journalists themselves didn't do this, the people they are communicating with are often IT insiders who have their own share of technical nous and would likely insist on secure communications.

Even assuming the ridiculously unlikely proposition that everyone involved in Groklaw exclusively used @groklaw.net for all communications, PJ specifically mentioned in her post the following:

"If it's encrypted, they keep it for five years, presumably in the hopes of tech advancing to be able to decrypt it against your will and without your knowledge."

That you have decided to choose the explanation that assumes the worst about the conduct and motives of Pamela and her team says far more about you than it does about her.

Sorry for the TL;DR but when I tell someone they have been a nasty, narrow-minded git, I don't tend to do it lightly.

dan1980

Re: Intimidation

The American people do not 'insist of separation of church and state'. A great, great many insist that America was founded explicitly as a Christian nation and go to great pains to try to rewrite history to support that view

12 simple rules: How Ted Codd transformed the humble database

dan1980

Re: That is "NoRelational", not NoSQL.

Well put.

The current love for NoSQL is due to the 'big data' idea, and ties into a previous Reg article about SANs apparently being not long for the world.

The thing that many comments there ignored was that a big Hadoop cluster tied up with a NoSQL database all running on distributed DAS is just one component of a full solution. That giant data-crunching platform requires data to be fed to it from somewhere and that somewhere may well be an application (or 20) running on . . . RDBMS - be it a web platform or an ERP like SAP.

In addition, to be any use, the output of those wonderful, distributed compute clusters must be somehow presented to the world and that presentation platform will, again, likely have some form of RDMBS running behind it.

Not to mention that those systems will require backup solutions which, again, may involve an RDBMS.

If NoSQL is 'taking over' from RDBMS then that really only represents the type of workloads that are currently being employed. Just remember that these 'big data' workloads are only possible due to the massive amounts of information being collected, processed and organised by other applications - applications which are quite likely to be relying on an RDBMS.

Don't let the SAN go down on me: Is the storage array on its way OUT?

dan1980

Re: The trouble with SANs.

@AC 14:56

Did I miss something or just not read between the lines? Where did the poster (fenton) say they had tiered storage or a 'storage support team'?

Of course they MAY, but those are things that are only feasible for large, high-end deployments so it's not necessarily as simple as that. Or maybe it is.

Microsoft cuts number of countries that will have Xbox One by Christmas

dan1980

Re: Xbox Two

With the disclaimer that I don't own a PS3 and wouldn't have used the OtherOS feature if I did own one, I think their scrapping of it was a good idea. Over all.

Why?

Because they have made their platform infinitely more secure than Microsoft's offering and, in doing so, virtually eliminated piracy from the console. No need to make any drastic, unpopular moves to always-online DRM and mandatory game installs, just make the console more resilient to pirated games.

That Sony have effectively stopped piracy on the PS3 shows us that MS's claims of activation to stop piracy are bunk. There is no need to resort to such measures and there is proof through Sony's success.

British spooks seize tech from Snowden journo's boyfriend at airport

dan1980

Re: "The chances are, however, that terrorism legislation was used simply because..."

. . . which is exactly the problem that every civil liberties group has with every such legislation across all affected countries.

Each time, the Government of the day makes reassurances about 'safeguards' and 'reviews' and 'independent commissioners' and implies that anyone worried about the law being used indiscriminately is misinformed or paranoid.

Each time, a predictable bunch of people will repeat the fallacy that "if you've got nothing to hide, you've got nothing to fear" and completely miss the point.

And, each time the laws will be misused and all the warnings of the civil liberties groups proven to be accurate.

And yet, nothing changes.

You can vote out the mob that put the legislation in but the laws are never repealed due to law enforcement saying that (despite them not having it a few years ago) it would be a major setback and cripple their operations.

dan1980
Megaphone

Re: He was lucky :-(

"I think his point might have had something to with the idea that silence = compliance."

And it would be a fair point if outrage = well, anything really. But it doesn't.

Look to the US, where, from opposition, Obama criticised the use of 'national security' as an excuse for essentially throwing entire cases out of court and promised that his government would be far more selective, only blocking certain, classified and sensitive information but never blocking the entire case. And, in Government, what has he done? Use the exact methods he was criticising (and promising not to use) in exactly the same way and for exactly the same purpose. In fact it seems likely now that the use of that provision has exceeded even the worst indiscretions and heavy-handedness of the Bush administration.

So go ahead, vote-in the other, barely distinguishable crew of smug gladhands if that makes you feel better.