was RickRussellTX @ reddit

  • 0 Posts
  • 32 Comments
Joined 2 years ago
cake
Cake day: June 21st, 2023

help-circle


  • So, I lived through that time, and I supported computers professionally during that time. I started working at a university help desk in 1989.

    It’s easy to go back and look at Apple products and white-box PCs of the era (or quasi-legit clones like Compaq, HP, Gateway, etc) and say, “oh, on specs, the Apples were MASSIVELY overpriced – you can get a much better deal with the PC”.

    The problem was that PCs were nowhere near on par, functionally, with Macintosh.

    • Networking. We were running building-wide Appletalk networks – with TCP/IP gateways – over existing phone wires YEARS before anybody figured out how to get coax or 10base-T installed. We were playing NETWORK GAMES (Bolo, anyone) on Mac in the late 80s.

    • And when they did… what do you do with networking in DOS? Unless you ran a completely canned network OS (remember Banyan, Novell, etc. ad infinitum?) and canned apps specifically designed to work with it, you were SOL. Windows 3.0 and 3.1 were a joke compared to System 7.

    I configured PCs and Macs for the freshman class in 1995. For the Mac? You plug the ethernet port in and the OS does the rest. For the PC… find a DOS-compatible packet driver that works with your network card, get it running, then run Trumpet Winsock in Windows 3.1, then… then… it was a goddamned nightmare. We had to have special clinics just to get people’s PCs up and running with a web browser, and even then, there were about 10% of machines we just had to say “nope”. Can’t find a working driver, can’t get anything working right. Your IRQs are busted? Who fuckin’ knows. I ran the “Ethernet Clinic” until the late 90s, when Windows 98 finally properly integrated the TCP/IP layer in the OS.

    • Useful software on the Mac had a pretty consistent look & feel. On the PC? Even in Windows 3.1, it was all over the map. You might have a Windows native program, you might have a DOS program that launches in a console window, you might have a completely different graphical interface embedded in the software (Delphi apps, anyone?). Games were using DOS into the mid 90s because getting anything working right in Windows 3.1 was a total fuckin crap shoot.

    Windows 95 started to fix things, finally. And Windows XP would finally bring an OS with stability comparable to Mac (arguably WIndows 2000 as well, but it was never really offered on non-corporate PCs).

    The short version is: that $3000 Mac could do a lot more than that $1800 PC, even if the specs said that the CPU was faster on the PC.






  • The differences between victim survey statistics and crime reporting statistics are not easy to explain. In the US, trends in victim reporting tend to lead law enforcement statistics by a year or two, which makes one wonder whether law enforcement is padding the numbers – either to make themselves look good (when crime is increasing according to victim reports and it would reflect badly on them if LE statistics followed suit), or to make themselves look necessary (when victim-reported crime is going down and LE statistics might make LE look redundant).







  • Unfortunately it has weird issues with my bog standard Intel HP Omen laptop and a 2060 GPU.

    Basically any kind of sleep mode kills the GPU. I have go into Display settings and force a re-detect to wake it. Kind of a pain when you use the laptop connected to an external monitor with the lid closed.





  • As MC Frontalot opines:

    Future people do not give a damn about your shopping, your Visa number SSL’d to Cherry-Popping Hot Grampa Action websites that you visit, nor password-protected partitions, no matter how illicit.

    And this, it would seem, is your saving grace: the amazing haste of people to forget your name, your face, your litanous list of indefensible indiscretions.

    They’ll glance you over, I guess, and then for a bare moment you’ll persist to exist; almost seems like you’re there, don’t it? But you’re not. You’re here. Your name will fade as Front’s will.


  • That’s a fair question, but I think the answer is obvious. Until the invention of photography, literally the only formal records we had of past events were the things people bothered to write down, paint, or sculpt. And of those, we only have the arts and written records that actually survived. So to find out information about the distant past, we have little choice but to extrapolate from artifacts, dig up old buildings, etc. The artifacts and records that we do find have outsized influence on our understanding of the past, compared to all the information and details that have been lost, which can literally never be recovered.

    From the 21st century onward, that relationship is inverted. Any hypothetically useful unit of information about the past will be recorded hundreds or thousands of times, and the useless units of information will outnumber the useful units by many orders of magnitude. Sure, if someone proves to be exceptionally notable, there may be some value in decrypting their past Amazon purchases or cracking the encrypted SSD they left behind. But that’s going to be the exceedingly rare exception, rather than the rule, especially when the world’s data stores are crammed with news articles, photos, videos, interviews, blog posts, reddit posts, journals, and non-encrypted records that appear to tell a complete story of the lives of notable people, and for that matter the day-to-day lives of regular folk.

    And that SSD may be every bit as exciting as the Hunter Biden laptop hard disk… that is, barely exciting at all, and full of such routine and irrelevant information as to be an almost pointless exercise in data forensics.


  • In the final analysis, nobody cares what Harold Q. Dumpington bought from Amazon in the week of June 4, 2017. That information is technically still stored in Amazon’s databases, but (1) Amazon already has access to it, so encryption is a sort of non-issue, and (2) nobody cares.

    The reality is: socially engineering a password or setting up a “man in the middle” attack in a coffee shop WiFi is a hell of a lot easier than attacking encrypted data, but even those attacks are relatively rare, and usually executed against corporations with money. As tempting as it would be for some hacker to get into Jennifer Lawrence’s e-mail or Chris Pratt’s Amazon purchase history, it seems that it’s really not worth the effort to anybody, except in some edge cases.

    Putting aside the whole question of what people might want to feed into an AI, why would anybody want that data AT ALL?

    MC Frontalot has a song about this, Secrets from the Future.