You have that backwards. GFS was replaced by Colossus ca. 2010, and largely functions as blob storage with append-only semantics for modification. BigTable is a KV store, and the row size limits (256MB) make it unsuitable for blob storage. GCS is built on top of Spanner (metadata, small files) and Colossus (bulk data storage).
But that's besides the point. When people say "RDBMS" or "filesystem" they mean the full suite of SQL queries and POSIX semantics-- neither of which you get with KV stores like BigTable or distributed storage like Colossus.
The simplest example of POSIX semantics that are rapidly discarded is the "fast folder move" operation. This is difficult to impossible to achieve when you have keys representing the full path of the file, and is generally easier to implement with hierarchical directory entries. However, many applications are absolutely fine with the semantics of "write entire file, read file, delete file", which enables huge simplifications and optimizations!
Interesting, manfrotto's website has a cookie notice with two buttons: ALLOW ALL and ALLOW SELECTION.
However, there's no selections -- there's only a description of hundreds of cookies they store (e.g. 73 in Marketing section), but there's nothing to select, it's only text.
There seems to be grey deny button at top-right on first view but it disappears if you select the details. You need hide the details first if you want to click it.
Radio spectrum is licensed, and licenses are very expensive.
There are several bands for Amateur radio in US/EU/AU, but it is explicitly forbidden to use any kind of encryption on them. So no one can sell devices that use encryption on those bands.
And I doubt Iran was friendly to amateur radio in the first place. E.g. in USSR it was crazy to think of any non-approved radio.
It's trivially easy to watch the entire radio frequency range at once and triangulate the location of any transmission. If someone more powerful than you wants to stop you, they can.
It's (scarily) available in the commercial sector[1][2] from space if you have the need to purchase their services.
Suffice to say, military and intelligence agencies are probably a few generations ahead of this and you won't find them commenting on strategic capabilities on HN.
Thanks! Technically, what do you think is the biggest obstacle to achieve military grade hopping? Is it just cost, or something you simply cannot buy from open market AND cannot make one if you have the knowledge?
Military frequency hopping / spread spectrum isn’t really about preventing being noticed, it’s more about making it harder to jam. If you don’t have physical safety from the people “more powerful” than you who want to stop you, then they will still locate you easily and stop you using physical force.
Try to comply to an infosec standard. Typically one of many compliance controls are "every change must be reviewed and approved by another person". So no one can push on their own.
I know folks tend to frown on security compliances, but if you honestly implement and maintain most of the controls in there, not just to get a certificate -- it really make a lot of sense and improves security/clarity/risks.
Conversely -- declining countries usually have a lot of deep-pocketed customers, and mind less of whether their crimes go public. They also tend to care less of spending money in wasteful ways, as those money were easily earned.
reply