Hacker News new | past | comments | ask | show | jobs | submit | galvan's comments login


Yes, TPE in Taiwan has the same setup. At Taipei Main Station in the city center, there are airline checkin kiosks and bag drops. You take the train to the airport, and your bags are ingested into the baggage system for you.

https://www.tymetro.com.tw/tymetro-new/en/_pages/checkin/ind...


  Location: SF Bay Area
  Remote: Preferred
  Willing to relocate: Within the west coast
  Technologies: Kotlin, Java, Python, Scala, Bash, SQL, AWS, Kubernetes
  Résumé/CV: https://linkedin.com/in/wubrandon also via email request
  Email: bwu at-symbol berkeley dot edu
Senior engineer with 7 years of experience looking for a backend or generalist role. I have experience architecting and bringing to production scalable services integrated in microservice architectures. Interested in product and integrations work. Motivated learner and always open to picking up new tech.


Random digression, but if you're having problems with GPS reception on your S3, try tightening all the screws on the back of the device with an eyeglasses screwdriver or similar. The GPS antenna(e) are in the screwed-on backplate and connected via sprung contacts to the mainboard, so if the screws aren't tight, it won't make a solid connection. You can also try removing the backplate and (gently) prying up the spring contacts at the bottom of the motherboard, and then cleaning both them and the contacts on the backplate with isopropyl alcohol. I bought my S3 used and couldn't get a single GPS fix, but after tightening the (noticeably loose) screws, it now happens in a few seconds.


I don't think the OC was referring to multitouch, but rather how resistive touchscreens can measure different levels of pressure applied to them. For example, I have a Nokia N900 with a resistive touchscreen that I can draw with, pressing harder for a thick stroke and lightly for a thin one.


Exactly; however, if we're on it - it's a myth that multitouch is not possible on resistive screens. There exist resistive screens that support up to 10 touch points, and two-point gestures (swipe, pinch) without exact coordinates are very easy to get on most resistive screens.


They are already (in certain states) via the point system.[0] Getting a point tells your insurance company, and your premiums skyrocket. Insurance companies also pull your driving record periodically, and if you've had a ticket, the same thing happens.

[0]: http://en.wikipedia.org/wiki/Point_system_%28driving%29#Nort...


What if you manually go to the GApps URL? (https://mail.google.com/a/your.school.mail.domain.here) I assume that's what your school's website is probably linking to, but it's worth a shot.


Actually, yes! *For enterprise-grade APs generally deployed at university campuses...[0] Moreover, such APs usually have methods to prevent communication between peers on the same wireless network.

[0] http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mo...


Ah, iodine. I've used it in airports, hotels, cafes - it's great. The only drawback is that it's slower than dialup and latency is off the charts. But when you're stuck on a cruise ship and internet access is $8 a minute, being able to ssh somewhere and browse the web and check your mail very slowly through links is worth it.


I usually just spoof mac addresses of people who already paid in most of those cases, the caveat usually being somebody had to pay.


I hope you're not still talking cruise ships here! Those folks are often paying high prices by the minute or by the megabyte for access: you'd be pretty literally stealing from your neighbors in that situation. (The moral issue for pay-by-the-day systems is one step further removed, but I think it's still real.)


802.1x covers access control to networks. MAC addresses are not for access control.

Not that a court would agree with my logic, of course.


Yeah, you might have a tough time explaining to the judge that Media Access Control addresses are not for access control.


In this context "access control" doesn't mean what you think it does. It refers to multiplexing the communications of multiple devices over a single shared communications medium, as in "controlling" (arbitrating) shared access to the radio spectrum. It has no relationship to network authorization or authentication and provides no security whatsoever.

http://en.wikipedia.org/wiki/Channel_access_method

Calling it "access control" has always been confusing which is why people started calling it Machine Address Code or Ethernet Hardware Address instead.


Regardless, the judge is going to look at intent and knowledge. You knew this was a paid service, and your intent was to not pay. You understood this was a way to avoid payment, and you understood that someone else had paid for access.


None of which has anything to do with "media access control" which still has nothing to do with authorization or authentication.


> In this context "access control" doesn't mean what you think it does.

Good luck explaining that to the judge.


Doesn't really matter - it might (!) be legal, but it is immoral (if they really are paying by MB).


I was staying at a Hilton (Omaha, NE) last night and their captive portal scared me off by putting the MAC address, IP address, and user agent in the query string, plus network stuff like the VLAN id and the MAC address of some piece of network gear that's servicing you. It seemed like they had a pretty complex system to deter abuse.

Of course, I just tethered my phone and got way better service than their crappy $10/day wifi.


If those people have a download limit that's rather unscrupulous.


Google Voice? Sure it'd require two phone plans, but I guess it's either that or swapping SIM cards around.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: