![Is it April 1st already? Joke](/design_picker/fa16d26efb42e6ba1052f1d387470f643c5aa18d/graphics/icons/comment/joke_48.png)
Yes, it DOES, it DOES, butt... umm, but,
It most ASSuredly tastes BITTERSWEET.
1750 publicly visible posts • joined 11 Aug 2010
Those Macs i saw resuming resume faster than either my Gateway (with 2 GB of RAM) or my HP Pavillion DV7 (with 4 GB of RAM) with either Mandriva or PCLinux OS running with VirtualBox hosting win vista on the GW and win7 on the HP).
It is funny how people will jump on and thumbs-down someone as if their emotions trump my personal experience and observation.
Granted, there are times when my laptops would suspend or hibernate in under 4 seconds and resume in under 10, but I've had plenty of random times where MD/PCLOS woudl refuse to hibernat or suspend or hibernate, but usually when RAM was soaked up by winv and win7 and sometimes even after shutting them down, presumably freeing up a GB or two.
I have not bothered other than once or twice (around Jan 10) hibernating/suspending win7 because i refuse to run it natively other than for a 5 or 10 minutes baseline comparison of other things. So, that is my experience. Thumb it down if you want. Ingraciate yourself if you want, but you won't deny my experience.
permit use of their data?
Fb does NOT own my information, regardless of what it thinks. If it did, then it could stop me from wholesale copying and pasting or synchronizing my posts and URLS and photos at other sites, and it could stop me from selling or sharing my photos with others. I, OTOH, CAN and DO have the right to limit fb's use of my photos and posts to just maintaining the integrity of my profile so my FRIENDS can interact with it. Their downstream use or misuse of my content doesn't entitle fb to monetarily exploit my work other than to allow advertisiers to target me with ads.
Google should know what we are using. They should have physical phones out there just running virtual users. When something amiss happens, they can know EXACTLY what pre-programmed behavious got a rogue app to reveal itself.
We STILL need to have end-to-end monitoring and maybe an "out-of-band" type of pre-visit-setup that tips off Google to when something afould is running.
"Let them eat STATIC!"...
As for HC... they are striving for "A$$HOLE OF THE YEAR AWARD" going down this path. If they are that cash poor, they should open their own library and pay the library 10% of reading fees for finders fees.
The public tax dollars should not be directly funding a shoddy business model of a publisher that probably is not accurately compensating orignal authors or their heirs/estates. Kudos to those that DO compensate, but phooey on those that do NOT.
I sometimes experience that with my HTC EVO 4G. But, it usually is limited to single-step actions depending on what widget my finger or webbed areas touch the screen. However, the EVO 4G (and, as of now, a newer model of HTC phone which might be Android or winp7... i can't recall) has a kickstand. I tend to flip it out and use it as an anchor between my midle and ring figner of my right hand. It offers a more reassuring grip on my phone so i can then use my index and thumb to manipulate the screen with the phone wedged tween my index and middle finger.
I do note however that when i am on the light rail, i see BIG guys (say, 6' tall) using these tiny-assed iPhones. I wonder how unmasculine they might feel wheni whip out my EVO 4G. In bars, friends take my phone from me and press it up to their iPhones and lament that mine is bigger, only to hear me echo "Yeh, mine IS bigger..." Bigger body and bigger glass/display.
Surely by now, Apple has GOT to be in receipt of chafing requests for an upsized but still chic-looking iPhone so bigger men and bigger women who do have bigger pockets or purses can carry it but still type on it. I even ran into a guy last year who said he ditched his iPhone in order to have something slightly easier to handle and to type easier on. This is what Apple gets or going with 95th percentile or whatever ranking they chose. But, if these rumors come to fruition, then Apple will apparently bend to demand. What else with they bend to?
money to other parties. Other than fraud prevention, the only reason for banks to delay wires is to retain some chance to collect on wire transfer fees. Imagine if people needing bridge loans between paydays get in on this. Various phone companies could find themselves wanting a piece of that action. Imagine phone companies getting into payroll transfers, too.
Give them one of those portable gas mixture devices like Mordok, a Benzite.
http://memory-alpha.org/wiki/Benzite
Strap-on that iPad, and if there's any uuber drooling, get the user a case with wings:
http://boingboing.net/2010/03/01/ipad-case-with-wings.html
http://www.geeksugar.com/iMaxi-Maxi-Pad-iPad-Case-From-Etsy-7540110.
Takes care of neck strain, of bad posture, excessive dripping, and locked-back eyeballs...
Does one HAVE to use windows? At times, I have a sneaking suspicion that the battery life we read is coupled with ms & the battery makers optimizing the design to windows and to the detriment of Linux.
OTOH, wayyyy back in mid or late 2003, I ran into a guy in Mountain View coffee shop who claimed he got 6 hours out of his (then IBM) Thinkpad (IIRC, it was around 12" or 13" diagonal screen, so....). Compared to my 2001 Sony Vaio with an AMD CPU, if felt a mix of lucky and cheated to get (initially) only 1 hour out of my battery. Even today, with my 2007 Gateway 17" of display and my year 2009 HP Pavillion DV 7, 1h 50 minutes was about max. Eventually, in under a year, each machine saw only 5 minutes of battery life. And that is with the then current ACPI/etc power management tools available.
I feel that batteries are the New Toner. But, at $75 to $150 a battery and any store-offered $300 full protection programs, $450 is close enough to just buy a new laptop in 2 years. Wasteful if only for the battery, but at least RAM, CPU speed, and other things improve.
Hackneyed approach: hack-kneed
But, if one loses ONE leg, there is no hope of running at 60 mph, let alone 30 mph. Maybe 6/2.5, or 30/2.2. Then again, it might result in one burned out shoe, or a person being a real pogo stick. Dodging bullets might be more intuitive, but landing in the wrong spot would make things ENDtuitive...
that they moved the link or diluted its effect.
One day, we'll find out that a whole department of a social networking site is filled with or infiltrated by domestic government operatives who plant surreptitious tracking. Hell, they may even be so bold as to openly infiltrate and dare any discoverers to say word one about it. After all, the CIA or FBI infiltrated an AT&T office in San Francisco, but it was outted around 2007 or 2008. It was quite messy. In the end, AT&T vacated that building and it seems to have acquired a toxic stigma. Seems to have been vacant for years.
Who, besides marketing and cold-sales teams would benefit the MOST from having unfettered, invisile access to our accounts? You guessed it. Ever wonder what is up when your "friend" could is 1 or 2 higher than the actual images?
Is very apropos. I used to harp and rail about how evil msoft was/is/was, but now apple is trying to be rotten to the CORE...
But, what i think this is really about is apple may be running out of steam in cranking out fondlephones and wants to bolster the uuber chic design lab with money squeezed out of every isomething. Imagine if automobile manufacturers decided they wanted/needed more than just the dealership's payup and any warranty kickbacks...imagine if Honda or GM or Toyota schemed (separately or in collusion) to REQUIRE dealerships to go away, and for consumers to permanently tie their vehicle purchase, gas, and carpooling/car-sharing expenses directly to the dealer.
If ifondledevices reach a saturation point, then the revenue stream will dwindle. So, apple are squeezing money out of a fondleturnip.
De-gassing... toss it in a microwave and the data will go from magnetic or optical to pure smoke and sparks of light . If you're brave, toss it in a container of mercury or something liquid that will build up a LOT of heat, but not explode too easily. Melt down the memory chip and fuse it. It might take the Tal Shiar, or better yet, the Xindi, to undo that bit of damage...
OTOH, someone might make a business model of operating an ISO-19485 (year) temporally-rated slurry-maker incinipit for sensitive data destruction...
"Apple do NOT have a monopoly, and probably never will. The iTunes store only works on Apple's devices. If you want to use the Android Store, you buy an Android-based device. If you want to use Microsoft's equivalent, you buy a Windows Phone 7 device. And so on.
Apple don't give a shit about the low-end, low-margin, low-profit markets. And, if they know what's good for their long-term survival, they never will, either. It's just not in their interests to enter a race to the bottom. Better to have the top 4-5% of a market and cream off 50% of the profits."
Now, that was the first real, genuine, laugh of my day. Seriously.
"Apple don't give a shit about the low-end, low-margin, low-profit markets. And, if they know what's good for their long-term survival, they never will, either. It's just not in their interests to enter a race to the bottom. "
Hehehehe... Even though I don't like what apple is doing to developers/sellers with the 30% thing, i like your description.
This, to me, looks like Apple's attempt to corner the market. Line up the largest and most promising content providers first, and then charge a horrendously high premium so as to *ock bl*ck the other news-media pad devices. At 30%, these publishers most likely will be unable to afford to spend resources developing content appearance for other devices (formatting, labor, time, security, subscriptions...)
Alternatively, the publishers might higher subscription rates on other to attempt to make up for Apple's long-part-milling-machine effect on them...
They think they are cute and Johnny-on-the-Spot. I would NEVER want some search engine only showing my past. In real life, things change. Why would anyone stupidly want to create a web search engine that won't show differences?
Hey, Google programmers: here's a tip: Split the page VIEW to show "Your common reminder/refresher-like searches" and "Possibly relevant searches" with connector lines of varying thicknesses, sort of like a mindmap."
Damn, I am crazy about Linux, Open Source, and many apps but I'm not going to kiss the feet of Torvalds, Stallman, and the rest of the developers and advocates.
Stop deifying a MAN. He is an SPF: Single Point of Failure. Apple will survive HOWever/WHENever his demise arrives. Get a life.
But, what I'd like to know is the ratio of internal laughing to supernova seething that happened to iPhone fans when the HTC EVO vs iPhone vid went viral. And, for Best Buy to fire the creator of that cartoon... just heinous. I hope he is making money off of clicks more than he did from bb.
In the SF Bay area... And I still don't see any SSL Option...
Curious, since the fb HQ is less than 35 miles from me... Maybe they see my use of Firefox? Nope. Same issue in Iexplorer... Android Phone/Internet Browser? No options present.... Android Phone/Dolphin Browser HD? Nope. Not present.
into the "enhanced security" annoyance box and it didn't care. If I knew how to write SQL injection or something that should get filtered or neutered or rejected, I would. I on one occasion inserted some 150 characters random, letters, numbers and symbols, and it took that happily.
Sigh.
All any miscreant has to do is go through a victims friends list, print the list of friends, and then keep them on hand for the subsequent match-up. FB needs some better tool. Having us re-insert our e-mail address and phone number seems bizarre, since if the stream is intercepted, a hacker/cracker/other can see that, too.
Even if a phone display can read thumb prints, that'll get hacked/cracked, too.
I'm waiting for the day when I read that due to an increase in home burglaries due to insidious "checking in", personal health, home-owner's, and vehicle insurance premiums will go up 15% to stave off jubiliation drinking, burlaries of opportunity, and car thefts...
Really, people. POST AFTER THE FACT, not in real time. Often, the home that has a rape victim in it is a victim known to the assailant. Home burglaries tend to be carried out by people who know what they are after and after they've cased or surveilled the target home.
What about Lotus SmartSuite?
I wish that IBM would have not taken the lazy way out on Word Pro and Lotus Approach. Kexi is set to grow, but it is in KOffice. Open Office? Meh... Approach could probably STILL win awards for ease of use and flexibility if IBM gave a frack about it. But, it appears IBM didn't want Approach used in concert with 1-2-3 and Word Pro or else some cannibalization might occur.
I - AM - STILL - INCENSED that IBM can't figure out the relevant valid shareholders of the earlier Lotus intellectual property. I'm still fuming that they didn't save time and money from 2004 onwards when they had a chance to offer the IBM-owned portions of S/S to Open Source devs. A decompiled, Non-IBM-IP-free version of SS could have been resurrected in months, if not weeks, and it could have eclipsed even Open Office, if IBM wanted it to.
WYSIWYG in Lotus Approach rules. It's too bad true development on most of Smart Suite died around 1997 or so.
Some of the perturbing would have to be in the font shapes themselves, and even this would assume that the recipient won't convert it to wingdings after OCR scanning it. If the font conversion process is good, it'll make sure that OCR scanning doesn't follow any tricky embedded font substitution commands that might be possible.
Steganography could be employed, but if the recipient does the equivalent of scraping off toast burns to get at the appealing and non-odorous parts, then reconstructing the doc would be childsplay. Then, the person converting it would need to thoroughly mutate and destroy the source disk to rid the evidence. Any and all machines used might have to be destroyed, too, just in case manufacturers comply with national governments that order certain "tricks" be installed in the CPUs. I'm only guessing, but some of those tricks might involve master command phrases that trigger or kick in when decode attempts are made against national security documents. Ever wonder where some of that computer overhead comes from. Might be tiny, but something might still be going on.... Obviously, such machines should never have external communications capability, and probably would be operated in a non-leaky room.