American fart research.
I'm guessing the reason it's happening now is Trump?
9633 publicly visible posts • joined 5 Oct 2007
The Peking Homunculus. How apt.
When the then UK Gold reran Dr Who series to binge on Saturday morning, the continuity announcer introduced it as; "And now Dr Who. This week's series is The Ta..... hell... nobody ever calls it that... The One With The Giant Rat".
If you hold anything at all with a supplier, third-party or escrow service then if presented with a court order for same that entity will hand it over, whether you want them to or not, as they are legally obliged to do so if they are within jurisdiction.
Yes, this does include anything you put in "the cloud".
Take those tinfoil hats off and put them away now.
Unless you can prove that the person responsible both knew of the vulnerability exploited in their systems beforehand and did nothing about it, then they are by definition not guilty of anything.
You cannot hold someone accountable for the illegal actions of a third party.
Now. If you'd suggested that western intelligence agencies should be given a free hand in tracking down those responsible and ensuring that they never trouble anyone, anywhere ever again, I'd be right with you.
These Grok-generated Category C images are then fed into different AI tools to create the most serious Category A videos.
Sounds to me like there are other AIs that are actually responsible for the bit that really breaks the rules and thus should be the primary targets of any action. Probably out of jurisdiction though, hence the focus on grok.
Had the opposite problem once.
Cabled a place that had a very fussy and self-important manager who had one of those "fishbowl" offices with blinds built into the glazed units.
On completion, he pointed out that there was supposed to be a network port in his office, despite his not having a machine.
"Yes. There it is." says I, pointing at it.
"Don't give me that, it's not connected."
"Yes it is. If you like we can get something to plug in to prove it!".
"Look, I can clearly see that there's no cable running to it. I'm not being taken in by any tricks like that.".
"Ah, right. If you look at your glazed wall units here, you can see a recessed joint between each. This one appears is flush instead, which is where the mini trunking runs down from the ceiling with the cable in it.".
He studied this for a minute: "Yeees, I see now. That's invisible, unless you know what you're looking for. Right then, that's everything.".
With the benefit of hindsight, we should have asked for more money for "invisible" installations.
Hmm, there's a saying about eggs and baskets.
Worth considering that, in the event of a war, your data centres and "cloud" will almost certainly be hors de combat within hours of it all kicking off.
Also, one lesson coming out of Ukraine is that if you're reliant on comms for anything, that thing won't work as jamming is all pervasive on a modern battlefield.
Hmm. I wonder just how much he really paid for that "$500 gift card" from the unnamed, bricks 'n mortar retailer?
Apple might have been more reasonable if he hadn't then tried a second bent code...
Hint: If it looks too good to be true, it probably is and happily receiving stolen goods is unlikely to be looked on kindly by the place they were stolen from.
"...just avoiding collisions by moving a Starlink satellite every 2 minutes. This is bad."
No, this is good. What would be bad would be relying on every satellite from every launch being placed in exactly the right orbit to pass through all the others with no collision risk. Factor in that Starlink satellites are in VLO and will encounter atmospheric drag and you're on a hiding to nothing. Thus active collision avoidance is an absolute necessity and if you have to provide it, you might as well use it to solve the problem in toto rather than dicking about doing two complicated things to address one issue.
I've said it before and I'll say it again.
The correct way to deal with the evangelists is to point out that when something of yours goes titsup, it'll be one function affected and TPTB will be looking for someone to blame. When "the cloud" goes pear-shaped the whole business will be completely stuffed and TPTB will be looking for someone to sack.
The token ring plugs for Type 1 and Type 6 (??) had the unusual feature of being unisex (i.e. there were no "sockets" only "plugs") Even the wallports were just a bit of plastic with a square hole in it, into the back of which you stuck one of those plugs.
They were also screwless, for (alleged) ease of assembly. The only trouble being that with the metal bits, the two halves of the plastic shell, the endplate and the blanking roundels for the holes you weren't using in the plug, you really needed all the fingers of both hands to keep it all in place while your third one squeezed it together...
...give regions true independence.
Surely that's the exact opposite of the correct approach? If this really were cloud computing then a major outage anywhere should have no impact on the users, as other locations just pick up the workloads and continue transparently.
We still seem to be a long way away from getting the originally promised benefits, of which availability and fault-tolerance due to having no single point of failure were front and centre waving the flags.
I was just going to point out that the Ukranians have found the Bradley to be the absolute dog's bollocks on a modern battlefield, despite it being theoretically obsolescent.
It also has an additional trick up its sleeve. The computer guided, 25mm, Bushmaster AP cannon is so accurate and rapid that it can easily hit the same point on another vehicle multiple times in succession. The first couple of hits knock out any reactive armour and then......! It helps here that large vehicles clad in reactive armour and plating (tanks) are to a Bradley as a spavined hippo is to a cheetah. As a result it's proven highly effective at knocking out vehicles that are, in theory, suicidal to attack.
...as Google asked him to provide information that was only accessible if he logged in...
All too common these days. When MFA is involved, trying to get back in when locked out ranges from "shitshow" to "fucking impossible".
My all time favourite example was attempting to use Google's own service to find where I'd mislaid my phone when away from home.
1) Find another computer - check
2) Get the owner to allow me to use it - check
3) Log into Google while thanking Fuck, Shit and all their little pixies that I had stuck with a password than I can actually remember rather than allowing some POS that I now cannot use to generate one.
4) Great. now I just need to enter a 2FA authentication code.... Ah.... Right... That'll be on the phone that I'm trying to find... feeling less smug about the password...
5) 2hr Drive home.
6) Find device using another machine that I own and which is thus already set up and previously thumped in the "don't give me that 2FA shit" button.
7) Find device.
8) 2hr drive back to get it.
This does not seem like a practical way of doing things to me..
Actually, the post office database is highly granular and updated by posties. The snag here is it's aimed at giving you the best access while on foot, which sometimes differs considerably to the closest you can get a van.
My favourite cockup though came from a company who decided to address the problem by moving to What Three Words and capturing the location themselves. It turned out that customers were not in the habit of booking a delivery while standing in the best place to park a van...
If you want to hire cheap, off-the-peg eejits to run your shit, then it must be simple, utterly standard and well-documented.
If, on the other hand, you want to lead the market with bleedin' edge rocket science shit, then you need to pay bleedin' edge rocket scientists whatever the fuck they want to look after it.