Re: "he had to leave some years ago, but we remember him well."
Remembering someone well doesn't mean your memories of them are good, or vice versa.
1972 publicly visible posts • joined 16 Jul 2011
The whole point of a comment system is to air one's views both good and bad.
Okay, here's my view. The whole "I'm sick and tired of reading this rubbish" complaint indicates a fundamental lack of understanding of how to use the internet.
See, unlike, say, radio or television, the internet is consumer-driven, meaning that you choose what to read and what not to read. So if you're reading something you're sick and tired of, that means you made a bad choice. To then go and complain about having read something you're sick and tired of means that not only did you make a bad choice, but you want to blame others for your own bad choices.
And no, "but I wanted to give them feedback so they can improve what they choose to write" is not a valid excuse. The server logs tell them which articles get read and which ones don't, and good analytics can even tell approximately how long people spend reading the articles.
If this was a genetically modified food rollout,
Okay, completely different industry, but let's see where this goes...
they wouldn't be able to do a recall,
Yes they would. See, for example, http://en.wikipedia.org/wiki/Starlink_corn_recall and http://www.organicconsumers.org/gefood/canolarecall.cfm
and it would self replicate.
Seasonally, at a pace which would allow for relatively easy control.
All of this ignores the fact that GMO are much more regulated that software and tech. services. See http://en.wikipedia.org/wiki/Regulation_of_the_release_of_genetically_modified_organisms for starters.
So Poverty, hunger, sanitation, war seems like a good place to start, we can leave sexual harrasmant of people in countries where these problems have been solved until somalia enters the first world then, I guess?
Where are these countries where poverty, hunger, sanitation, and war have been solved?
I probably wouldn't believe this if it came from McAfee, Symantec, Microsoft, or many others.
From F-Secure, I'll at least accept it as plausible. Of the AV companies I've dealt with, they've been the least slimy. Note how they didn't mince words or try to complicate this very simple issue.
And it's not what they're protesting "for", it's what they're protesting against
If you don't have a for, against is rather pointless. Tear down what you will: if you don't have something ready to replace it, someone else will, and you'll like the replacement even less.
Wrong question.
There is plenty of evidence that people accept advertising as a means to reduce the cost of content.
But this debate isn't about advertising. It's about tracking. It's a measure of how far we've sunk that the two completely different concepts are inseparable in the minds of some.
For centuries, advertising has worked fine with little to no tracking. Even television's Neilsen ratings only gave advertisers information on the effectiveness of the content and the general audience, not the identity of indiviudual viewers. Then some online advertisers got the bright idea of following users from site to site, monitoring what they did, and serving "targeted" advertising. Now, because they've been doing it, they don't want to stop.
I'm fine with advertising. But even online advertising does not need to do this level of tracking to be successful.
In fact, many of the calls I received back when I was in support were due entirely to the user's simply not knowing how to use the computer.
Come to think of it, that actually might make a somewhat original episode -- spend almost the whole show trying to fight a computer, only to find out that the computer's fine; the user just clicked on the wrong shortcut...
Any mission to Mars in this day and age stands on a lot of shoulders:
http://mars.nasa.gov/programmissions/missions/log/
The list also serves to illustrate another important point. While developing the mission in that timeframe with that budget is an achievement in itself, it may be best to hold our applause. We as a species have a very inconsistent success rate with Mars missions: many spectacular failures, some successes, and a few missions that exceeded expectations.
Here's hoping India's Mangalyaan finds its way into one of the last two groups.
Okay, I will say more.
In order to be useful, a statement about identity must narrow down the list of possible individuals that may make the statement truthfully, usually significantly.
Let's take one of the examples from the paper: "I am eligible to vote." Let's say this is In the UK.
The UK's total population is approximately 63 million people (as of 2012). But only about 50 million are eligible (and roughly 46 million registered.) So simply by making that statement truthfully, you would be eliminating approximately 1/5 of potential identities.
While you can hide behind a mask and make true statements about your identity, any such statements will decrease your level of anonymity.
Note that this is identity, which the paper authors repeatedly conflate with authority. For example, if you could anonymously register a domain with the example system they describe, and then issue a statement that you are authorized to maintain said domain, that would not decrease your anonymity because the statement is not linked to an identity.
Had the authors had the sense to understand the difference between identity and authority, they would not likely have made the absurd proposition that statements about identity could be made "in a fully anonymous fashion."
Is that enough for you?
One presumes your journalistic/ethics training manual was bought at a fire sale at the demise of the late unlamented News of the World...
El Reg was publishing inaccurate and inflammatory headlines long before the demise of the News of the World.
Perhaps you thought you were on one of the many boring tech news sites out there?
@obnoxiousGit and Steve Knox.
Way to miss the point, guys, so let me spell it out for you again...
"Is that giving you what *YOU* are looking for or what *THEY* decide is best for you to see?"
In your original post, the "that" in the above sentence refers the absurd hypothetical you posited.
No, that's not giving me what I'm looking for, but it's also not what Google is currently doing.
Let's borrow from your playbook for a second:
So imagine this: Graham Marsden has built a giant robot pterodactyl specifically for the purpose of tearing the heads off little children.
Is that giving you what *YOU* are looking for or what *HE* has decided is best for you?
Now do you see the logical fallacy in your argument, or do you just want to go back to your baby-eating robot pterodactyl?
So imagine this: Google does a lucrative deal with Fox News so that every time you search for a news story, Fox's version of events and their opinions are prioritised above all others. Would you still be happy then?
ZOMG THAT HYPOTHETICAL IS HORRIBLESZ.
Now how about you tell us what's actually bad for consumers about the current situation and quit pissing on slopes to make them slippery.
Well, HTC, Motorola, and Blackberry aren't on the list. I'd guess they did about as well as Nokia (Note that the article didn't say Nokia was #6; only that it wasn't in the top 5.). Giving each of them 3% would leave about 29% remaining
Then there's ZTE and the other low-end but still technically smartphone manufacturers. I'd guess there's at least 15 of them, so they're probably clustered around 1-2%. One or two may even have beat Nokia...!
Bad analogy. The only reason most desktops are as huge as they are is because of slavish attention to backwards compatibility. Plus, you can built very compact desktops from off-the-shelf parts (mostly borrowed from laptops, in fact) nowadays.
This will depend on making the modules small and standardizing on size and shape, though...
How hard would it be to keep the keys strongly encrypted[1] and just claim you forgot the password[2]?
[1] Assumes the encryption method used is strong.
[2] Assumes the password is strong.
The FBI, the NSA, and the CIA do cooperate, and between them have quite a bit of experience cracking encryption and passwords.
PHP.net is secure. There's nothing malicious on the site. Some user content apparently contains links to sites which allegedly contain links to malware.
Websites should be able to link to pretty much anything, and they could, if the browser followed the standards and prompted the user for anything out of the ordinary.
It's much easier to NOT write code to automatically download everything than it is to monitor and moderate a website which is designed for user collaboration and is accessed by people around the world.
4 page(s) resulted in malicious software being downloaded and installed without user consent.
Shurely that's as much or more the fault of the browser downloading and installing files without user consent than of the site hosting links to links to links to such content...?
The Intel NUC thingy has 2 passive cooled options, an i3 and a Celeron 847.
So the options for passively cooled Intel kit are slow and slower. I think you just proved LDS's point.
nobody has come up with a trendy descriptor like "phablet" for one yet?
Nobody has come up with a trendy descriptor like "phablet" period. The latter is the antithesis of the former.
How about we make it impossible to sue for infringement against technology that's been around longer than your company?
This started as a kneejerk reaction, but I think it could work. It wouldn't prevent the sale of patents between legitimate organizations, but it would significantly limit the use of shell companies...
"Others would have you spend a small fortune every year just to get their apps," Cue said. "But we want to do something bold, something that changes the rules of the game – and you know what's coming. We're taking all of these productivity apps and making them available for free with the purchase of Mac and iOS [devices]."
We won't charge you a small fortune for our apps, just a large one for the hardware to run them.
If you read the whitepaper, his major beef is that "the problem with standards is that they are not standard." He then follows this with no real examples.
This is the same exact BS that Microsoft put forth to explain their butchering of HTML and CSS in IE4-6. Even when it was proved logically, semantically, and grammatically that their implementation was non-compliant with the specifications as written, they maintained that it was "open to interpretation".
The fact is that we have plenty of good standards. We have a few that are okay but have some potential for misinterpretation due to how they are written. But the vast majority of issues with standards is how they are read by the people responsible for implementing them. That's not something you fix by changing standards (or by changing the standard). That's something you fix by changing the people.
Yeah, wouldn't it be great if we had a list of verifiable and open standards for the internet.
When you're building a new network, the last thing you want to do is accidentally overload it.
Plus, it's been repeatedly shown that if you start strict and loosen policies up, customers are happier than if you start permissive and tighten the rules later, even if both courses of action result in the same final set of rules.
Awaiting downvotes from those who believe this is an emotional issue.
...nah, I'm not even going to bother with the tired comparisons.
This kind of story is more than old. It's a depressing reminder that people simply refuse to accept basic concepts.
The internet is a public network. It's multihomed, multipath, and multitenant. You cannot presume that anything you transmit into it is not public knowledge.
Yet everyday there's someone new trying to convince you that they have the magic secret to making this most public of systems completely private. And people always buy it.
In the meantime, users should ensure there's a strong WiFi password on their kit, and should disable remote administrative access.
should read:
At any rate, users should ensure there's a strong WiFi password on their kit, and should disable remote administrative access for all of their WiFi routers, regardless of manufacturer.
While existence of a known security hole does provide urgency, there's no excuse for lax security. The likelihood is that those devices without a publicly known security hole have holes which are either unknown or already know to malicious entities.