The World's Best Living Programmers
The DaVinci Coder ...
Unisys Phasing Out Decades-Old Mainframe Processor For x86
A lot of the 1960's big iron had 9 bit bytes - eg the venerable DEC-10. They need 36 bits to represent the range of data they wanted (typically floating point). Those 36 bits could only be divided according to 36 = 2x2x3x3 (ie chunks of 1, 2, 3, 4, 6, 9, 12, 18). Some used 6 bits to represent a character in a very limited character set, some used 9 bits to a character (not all bit values necessarily corresponded to a printable character). The big change to 8 bit bytes came from the IBM 360 when it choose 32 bits (32 = 2x2x2x2x2) and it's easy division into 1,2,4,8,16 chunks. The 9 bit byte was the standard and the 8 bit byte was the incompatible new kid on the block. Which is why the ITU says the unambiguous 'octet' instead of the ambiguous 'byte'.
Is It Really GPS If It Doesn't Use Satellites?
Didn't Ben Rich mention this in his "Skunk Works" book?
Book Review: Designing With the Mind In Mind
Alan Cooper (the father of Visual Basic) had an excellent book called 'About Face'.
He made that exact point about GUI controls having affordance.
Experts Say Hitching a Ride In an Airliner's Wheel Well Is Not a Good Idea
Likewise, I find Fahrenheit confusing every time I visit the US. 15-30C is comfortable (I live near a desert), 45C is try not to move weather (2 weeks in January) and 5C is wear a jacket weather. I can remember 100F only because I know it is body temperature (approx 37/38C). When visiting the US I usually make a little lookup table on a scrap of paper to convert between C and F.
Remote ATM Attack Uses SMS To Dispense Cash
ATM's make heavy use of encryption.
Sensitive data (eg customer PIN) is encrypted so that you can not decode it.
Unencrypted data is not sensitive (eg the dollar amount of the transaction).
Each packet sent to the bank host is digitally signed.
Each packet received from the host is also checked for its digital signature.
The digital signatures have the time as part of the generation algorithm, so replay attacks don't work.
If you monitored traffic on that cable then you would get a log of who took out money, the account number, the amount, the time and possibly how much was left in their account.
You would get similar information by ransacking the receipt bin.
If you tried to inject or replay packets in either direction then they would be rejected.
I used to design EFTPOS credit card terminals.
We designed them with the understanding that malicious people would be listening to everything on the cable and they would be trying to inject malicious data at every opportunity.
Note that the cable might be ethernet, phone (ie modem), X.25, serial or a handful of less common types but the above applies to all of them.
The worst you could really do is to cut that cable and deny the service to the customers.
Why Nissan Is Talking To Tesla Model S Owners
He said the Model S was in cat A (better, more expensive).
It's the **Leaf** that he said was in Cat D (worse, more expensive).
US Carriers Said To Have Rejected Kill Switch Technology Last Year
Only a problem in countries where the government censors and restricts the public. We're talking about the US, so ..... oh, nevermind.
New 360-Degree Video Capture Method Unveiled
No blind spots - until a glitch disables your goggles... :)
Will Electric Cars and Solar Power Make Gasoline and Utilities Obsolete?
Home solar works better with a utility using hydro.
The utility allows the water in the high dam to fall down into the low dam, generating electricity using turbines.
Ideally your solar could be used to pump some of that water from the low dam back to the high dam.
At night time, the water can flow down again.
The two dams become a huge battery.
I believe many utilities already do this in reverse.
Average day time power is provided by gas/oil/coal/etc to cover slightly less than peak.
At night time, when user demand is lower, the excess power is used to pump the water up to the high dam.
Back in daytime again, the peak demand is provided by allowing the water to go down again through turbines.
Thus the gas/oil/coal/etc generators can be smaller as the production of electricity is spread across the entire 24 hours instead of at peak time.
Office Space: TV Documentary Looks At the Dreadful Open Office
Wow, an 8 metre by 8 metre cube? Can I send you my resume?
Code Is Not Literature
Are you advocating a return to COBOL ?
Google Launches Android Automotive Consortium
2014 will be the year of Linux on the dashboard...
Australian Team Working On Engines Without Piston Rings
Wankel apex seals are the equivalent of piston rings - ie a chunk of metal/ceramic that fills the gap between the piston/rotor and the chamber wall.
Tesla Model S Battery Drain Issue Fixed
Surely the clock wouldn't flash anything at all if it was off...
Moore's Law Blowout Sale Is Ending, Says Broadcom CTO
As a non-American, that one doesn't bother me much :)
Richard Branson 'Determined To Start a Population On Mars'
er, I thought you brought the can opener...
xkcd's 13-Gigapixel Webcomic
Maybe the whales are a reference to "Star Trek IV: The Voyage Home".
Warp Drive Might Be Less Impossible Than Previously Thought
So many Star Trek comments and nobody picked up "the warp drive could be powered by a mass about the size of a spacecraft like the Voyager 1 probe".
V'ger was Voyager 6 but even so...
Chip and Pin "Weakness" Exposed By Cambridge Researchers
A personal PIN number is what you enter into an automatic ATM machine or an electronic EFT terminal.
stepho-wrs hasn't submitted any stories.
stepho-wrs has no journal entries.