Doesnt surprise me, Seagate is marching to its own drum. My experience defiantly mirrors others' higher than average failure rate as well.
My latest 'fun' experience with them, also, came in the form of an Ironwolf drive which is 'detected' on usb-to-sata interface when plugged in, around %15 of the time. While it starts up consistently on a plain SATA interface. This makes it unusable for what I need. Again, no other drive or MFG ever fails on this usbSata, just the new ironwolf, which it appears is actually for the chineese market, but was sold on newegg, but this is not necessarily seagate's fault, nevertheless.
Hey Flock, show me all toyota tacomas with a Raiders sticker who have passed any check point, in the last 35 minutes.... I dont even care about the license plate.
I have rarely had the words pulled out of my mouth.
The percentage of devs in my career that are from the same academic background, show similar interests, and approach the field in the same way, is probably less than %10, sadly.
Both are true, and both should be allowed to exist as they serve different purposes.
Sound engineers don't use lossy formats such as MP3 when making edits in preproduction work, as its intended for end users and would degrade quality cumulatively. In the same way someone working on software shouldn't be required to use an end-user consumption system when they are at work.
It would be unfortunate to see the nuance missed just because a system isn't 'new', it doesn't mean the system needs to be scrapped.
> In the same way someone working on software shouldn't be required to use an end-user consumption system when they are at work.
I'm worried that many software developers (including me, a lot of the time) will only enable security after exhausting all other options. So long as there's a big button labeled "Developer Mode" or "Run as Admin" which turns off all the best security features, I bet lots of software will require that to be enabled in order to work.
Apple has quite impressive frameworks for application sandboxing. Do any apps use them? Do those DAWs that sound engineers use run VST plugins in a sandbox? Or do they just dyld + call? I bet most of the time its the latter. And look at this Notepad++ attack. The attack would have been stopped dead if the update process validated digital signatures. But no, it was too hard so instead they got their users' computers hacked.
I'm a pragmatist. I want a useful, secure computing environment. Show me how to do that without annoying developers and I'm all in. But I worry that the only way a proper capability model would be used would be by going all in.
I could have sworn, back in my day, on WinNT4 we successfully chained a red and white pair from Autodesk. One for AutoCad, and either Mechanical Desktop or 3ds Max.
I had a very similar story related to this as well.
For the longest time I always assumed RF remotes were the ancient ones, as growing up, we had an old large Magnavox console tv, with just such a remote.
As time progressed we went to IR, which was, as I'll explain below, a welcome relief!
The tv was positioned in a basement room, just under my bedroom. Every few months I would be rustled from my sleep, at 4AM, to come downstairs to the tv turned on, blaring full volume and on channel 99 (static). This continued for a while until I realized that my father, who is HAM operator, and an early riser, would somehow be injecting into the remote sensor on certain frequencies occasionally. Needless to say it was thusly unplugged afterwards!
RF chokes on the cables are sometimes necessary. The clip-on ones work well, and are cheap. Part of being a Ham is mitigating EMI your broadcasting may cause.
As a side note, intentionally jamming or interfering with other peoples signals can carry up to a $1m fine and several years in prison. =3
yeah, when i used to live in New England, and had more time to be interested in transit, i always was peaked in how comcast would route.
No matter how far south i seemed to get, i'd always need to travel to Boston's peering point first to make it to NYC, even in New Haven. If you then simply switch isps, even at same address, verizon would send you south immediately.
so theres funky overlap wherein on one isp you appear closer to city A, and on isp 2 closer to city B, but its same physical address.
Continental classification I'd think would be good as they appear to be coalesced endpoints, separated by vast oceans.
My latest 'fun' experience with them, also, came in the form of an Ironwolf drive which is 'detected' on usb-to-sata interface when plugged in, around %15 of the time. While it starts up consistently on a plain SATA interface. This makes it unusable for what I need. Again, no other drive or MFG ever fails on this usbSata, just the new ironwolf, which it appears is actually for the chineese market, but was sold on newegg, but this is not necessarily seagate's fault, nevertheless.
reply