|
Very few naughty people try to crack passwords; they just steal or download lists.
Password cracking almost only ever happens when it's personal -- e.g. when a "loved one", professional rival, or "security" service wants to read your e-mail.
If you want to give password crackers a really hard time, don't use eight-character passwords.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Researchers have developed a technique for measuring speed and distance in indoor environments, which could be used to improve navigation technologies for robots, drones -- or pedestrians trying to find their way around an airport. Walk silent, walk deep
|
|
|
|
|
Kent Sharkey wrote: or pedestrians trying to find their way around an airport Because appropriate signage is Hard!
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: or pedestrians trying to find their way around an airport Because appropriate signage is Hard! tell that to munich airport
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Nevermind that the S in SONAR is for Sound
Using WiFi to see through walls - ExtremeTechExtreme Tech circa 2012 British engineers from University College London have developed a passive radar system that can see through walls using the WiFi signals generated by wireless routers and access points.
WI-FI INDOOR RADAR - QUALCOMM Incorporated
Patent Info: A system and method for object detection in a wireless network. A wireless communications device receives a first set of wireless signals on a first frequency band, and generates a first interference profile for the wireless network based on signal interference in the first set of wireless signals. The wireless communications device further receives a second set of wireless signals on a second frequency band, and generates a second interference profile for the wireless network based on signal interference in the second set of wireless signals. The wireless communications device then detects the presence of an object in the wireless network based at least in part on the first interference profile and the second interference profile.
Director of Transmogrification Services
Shinobi of Query Language
Master of Yoda Conditional
|
|
|
|
|
As enterprises feel pressure to deploy applications faster and more frequently, demand for strong application developer talent is reaching new heights. Oooo, does this mean I get my own bouncy-house?
|
|
|
|
|
I think it would be more effective to make the guys realise what a nice place they have already, compared to people in other lines of work.
Move their desks into a cowshed or a sewer for a week, then take a survey.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
As proven by some recent extreme, controversial incidents, such as the Facebook and Cambridge Analytica scandal, social media can be a real goldmine for user information. By reading their words?
|
|
|
|
|
Bloody sciencex!
I wanted to read that, but I'm not going to encourage sites that break GDPR laws.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
The study finds that the DevOps movement is gaining traction and delivering positive outcomes. Citius, Altius, Fortius, DevOpsus
"Elite organizations". :ugh:
|
|
|
|
|
IttyProToddy said: DevOps is an approach that entered the modern enterprise lexicon in recent years, but for Nicole Forsgren most managers, it's more than just an empty buzzword. That's the only fact about DevOps that really matters.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
The problem being that DevOps is whatever a company says it is. I've read it defined as anything from developers actually running operations to developers working with operations, which pretty much describes all companies.
I think the former is a disaster in waiting, but do think there is value in having someone separate from IT who maintains the actual operations, be it the server farm, build servers and so forth. This simplifies things for IT and developers.
|
|
|
|
|
And sadly, I think the "official" definition is the former. I'm sure it's great for the bottom line, but as you say, disaster in waiting.
TTFN - Kent
|
|
|
|
|
The search for good cybersecurity talent is a struggle facing companies across the industry — a problem that is only likely to get worse over the next few years. Where?
|
|
|
|
|
It takes a coupe of weeks for the average dev to get up to speed enough to work productively on cyber security, so I don't see what all the fuss and panic is about.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
At Open Source Technology Summit (OSTS) 2019, Josh Triplett, a Principal Engineer at Intel gave an insight into what Intel is contributing to bring the most loved language, Rust to full parity with C. And Python is the new Pascal, VB is the new MUMPS, and Perl is still Perl
|
|
|
|
|
Heh, MUMPS. I've actually got a cert for that around here somewhere.
|
|
|
|
|
You were certified as insane for being willing to use MUMPS? /trollface
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Luckily, the training was online, from home, with General Hospital playing on the other screen. I figured GH was appropriate, considering the main use of the language.
|
|
|
|
|
Security researchers warn that the WS-Discovery protocol is currently being abused for massive DDoS attacks. When the first you hear of a protocol is when the hackers are using it
Hurrah for SOAP. People still find a use for it.
|
|
|
|
|
The company has announced assembly of the first qubit material component of its 12CQ room-temperature qubit processor, touting nanometre precision. Unfortunately, it only works if you install it upside-down
|
|
|
|
|
Cupertino was developing a peer-to-peer walking talkie feature for the iPhone that would allow users to text each other without having a cellular connection. That's a 10-21
Whatever happened to push to talk? It seemed all the rage back in the day.
|
|
|
|
|
The real reason they cancelled it is that too many fanbois complained that it would make them look cheap, and building a system into it to charge three times the price of text messages would have been too much work.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Kent, Kent, Kent. If you're going to try and sound like a southern Ohioan (like yours truly here), you need up your game with the proper vocabulary and syntax:
"If it ain't busted like it's supposed ta be, why with it?"
Software Zen: delete this;
|
|
|
|
|
Gary Wheeler wrote: "If it ain't busted like it's supposed ta be, why [mastadon] with it?" Boyd? That you, Boyd? Whut you-all doin' heah?
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|