|
Volunteers at the National Museum of Computing and operators who used EDSAC almost 70 years ago have come together to replicate it for future generations to learn from. Continue the arguments about "first general purpose computer" here
|
|
|
|
|
It just installed Win10 automatically.
|
|
|
|
|
WinAero, today, reports: "a sensational report is doing the rounds of the internet." : [^]Quote: Microsoft stuck a deal with FireEye Inc. that will allow them to share the telemetry data from Windows 10 with this third-party cybersecurity company.
As part of the deal, FireEye's software "iSIGHT Intelligence tools" will be integrated into Windows Defender. This will open the doors for FireEye to see telemetry from every device running Windows 10.
This is the first time when telemetry information is being shared with a third party. Earlier, there were no statements about such deals between Microsoft and other companies.
However, the situation has changed. Now the vast amount of telemetry data that Microsoft has can be accessed via a subscription billing model. This option will be available for security teams like anti-virus software developers. It sounds like if you pay enough, then you can get in.
«There is a spectrum, from "clearly desirable behaviour," to "possibly dodgy behavior that still makes some sense," to "clearly undesirable behavior." We try to make the latter into warnings or, better, errors. But stuff that is in the middle category you don’t want to restrict unless there is a clear way to work around it.» Eric Lippert, May 14, 2008
|
|
|
|
|
In other news, Leslie Nielsen is dead[^].
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
You may have been told definitively that space is silent, maybe by your teacher or through the marketing of the movie Alien – "In space no one can hear you scream". The common explanation for this is that space is a vacuum and so there's no medium for sound to travel through. "Vibrations reach on up to become light, and then through gamma, out of sight"
|
|
|
|
|
Empty spaces? What are we living for?
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
Kent Sharkey wrote: Vibrations reach on up to become light, and then through gamma, out of sight
Up vote for the The Moody Blues[^] reference!
"Fairy tales do not tell children the dragons exist. Children already know that dragons exist. Fairy tales tell children the dragons can be killed."
- G.K. Chesterton
|
|
|
|
|
Plans to keep a record of UK citizens' online activities face a challenge from tech firms seeking to offer ways to hide people's browser histories. My browser history would bore politicians
|
|
|
|
|
Until you are a whistle blower that they need to discredit. Then it will interest them very much. Doesn't pass the "Richard Nixon" test of legislation.
|
|
|
|
|
|
Keep a track of their log! Mutual assured embarrassment/boredom.
|
|
|
|
|
Funnnily enough, the MPs voted in an exception to the surveillance laws. Can you guess who? Yup, it's the MPs themselves.
This space for rent
|
|
|
|
|
That gives the best reason yet for becoming an MP - you can surf for porn without being found out!
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
I think the browser log law is a great idea:
- The storage requirements would increase by leaps and bounds
- Storage companies would sell massive amounts of storage in order to satisfy the demand
- It will no longer be economically viable to produce anything but storage devices
- As the demand goes up, the quality will go down
- Eventually, all of the crappy storage will crash, bringing down civilization with it
- The few remaining savages will swear to record nothing, and will kill anyone who can read or write
- The real End of History arrives
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
It can be a software application, a podcast, a blog—anything that is not a part of your day job and is out there for the world to see and use. Since you will be spending your evenings and weekends working on this, it helps if it’s related to a topic that you are passionate about. Where else are you going to get ideas for CP articles?
|
|
|
|
|
|
Telemetry data recorded by Windows 10 is, in a nutshell, just technical information about the device the OS is on, and how Windows and any installed software is performing, but it can occasionally include personal information. In related news: I am so surprised.
|
|
|
|
|
|
In this article, Daniel Westheide explains why some people share code via libraries, why it can be problematic, and how you can mitigate those problems. "What's mine is mine, and what's yours is mine too."
|
|
|
|
|
Kent wrote what's yours is mine Are you sure you want my buggy code ?
|
|
|
|
|
While he makes some interesting points, they are a bit too abstract for me. I think, in summary, one could simply say "libraries should be created by people who know what they are doing."
I was surprised he didn't mention the whole NPM (et al) dependency nightmare.
Personally, I think he fumbled big right at the kickoff:
There are two main goals I have seen for sharing code via libraries: sharing domain logic and sharing abstractions in the infrastructure layer
- Libraries should never be created for domain logic -- by definition, the domain logic is for solving the problem of a particular domain.
- Sharing abstractions in the infrastructure layer sounds like its sharing the domain scaffolding. Again, a bad idea for reason #1.
Marc
|
|
|
|
|
I think (for infrastructure) he means tools rather than libraries - but even at that there is an argument for separating the [business] domains form the [technology] implementation such that libraries/tools are interchangeable.
It is certainly what I have been aiming for, but it is very hard to do...
|
|
|
|
|
They think it's time to close security loopholes in connected home devices. Does it include, "Stop trying to shove every appliance directly onto the internet"?
|
|
|
|
|
Researchers claim your phone really does say a lot about who you are as person, and if you're an iPhone owner what it says is not flattering. Everyone knows that people that use {insert your product here} are completely trustworthy, and good looking
|
|
|
|
|
The Enhanced Mitigation Experience Toolkit (EMET) is a tool that helps prevent vulnerabilities in software from being successfully exploited. Not at all connected to them trying to cancel EMET
|
|
|
|