Someone forgot to kill the parent process. That's the only sure way to get rid of defunct processes.
1878 posts • joined 19 Dec 2010
Someone forgot to kill the parent process. That's the only sure way to get rid of defunct processes.
There's always a huge difference between a computer program or a real person. Quite frankly I think that if people really have this kind of problems with their social live they're better of relying on friends or family. If that isn't an option then professional help.
Because actually conversing with a real person will actually make them feel comfortable with the process, because it's real. I don't think this compares at all to a computer simulation.
How about global moving? ;-)
Global warming won't work any more I think because that has lost some credibility as of late.
But we definitely need something new so that we can start expensive investigations into it for the greater good of the children. And the best part with this name is that "moving" doesn't even have to involve the plates, you can easily make something up as well.
Rule 1: When you already have something else.
Unfortunately there are too many people who overlook this and manage to get themselves into major problems because of it...
Why not make a real statement and use (for example) PostGreSQL instead?
Each to his own, but it would have left a little more impression with me than simply going for the "best mysql compatible dba out there".
Very reassuring that Java is being used in many banks
And the ones which don't more than often resort to ASP.NET. You're point being?
Begun the search for more money has.
I have a Windows phone (WP 7.5), which I happen to like too, and guess what? It already has such a feature which I can also chose to turn on or off: "Find your phone". It sends my phone identifier to Microsoft, optionally along with some other information I can opt in to send them (search results, spoken text results, etc.).
The next part is my Microsoft account or ID. I can attach my phone to my Microsoft account thus giving me direct remote access to my phone using their Windows phone website.
This access can then be used for all sorts of things. I can browse their app store using my PC and after I decide that I want something I can tell it to send the app to my phone straight away. But I can also tell my phone to ring, lock or even format (erase) itself.
Why would I need the government for that?
I don't think this is for the better good; it's for their own good. Maybe I'm paranoid, could be, but I wouldn't be surprised if the next step would be attaching said kill switch to voice recognition software. You know: you're mentioning "let's bomb the bass tonight" and all of a sudden your connection is gone and 5 minutes later you got police all over you for suspicious activities... "But I was going to a dance party? Acid you know, stuff from the 90's?" "Oh, poison is involved too? Tell it to the judge you damn terrist!".
Well, here in Holland we already had idiocy like that in the past. "Rekening rijden" ("Driving by bill"), every car would need to be fitted with a GPS device (and they even said that's what it had to be) so that it could detect if you were driving on a road for which you had to pay.
The plan never made it, but it seems some politicians went up the ladder a bit.
I think we have every right to be concerned. Because what will be next? Once the politicians finally discover that such devices can also measure speed I wouldn't be surprised one bit if eventually some "political genius" cooks up an idea to have the devices track the speed of a vehicle and when it goes too fast you'll need to pay, no matter what.
Think of all the money they can save by not having to station police men alongside the road?
And when looking at Holland; I don't think those police officers will be placed elsewhere in the force so that they can now perform other, more important, tasks. Of course not; they will have to go because that is really going to help the government save money.
This may sound like far fetched science fiction to you, but once they start adding this big brother crap into the cars I'm quite convinced that it will only be a matter of time. As crazy as it may sound, I've seen politicians do even crazier stuff. Just because they're politicians doesn't make them smart people.
That means not just learning the syntax of Java or C++, but why languages work the way they do
In other words make sure to lay out a good foundation on which you can continue building. A very solid and valuable advice, even though newcomers may think this to be extremely clichéd (and in a way it is). Another thing I'm missing out on (or maybe I overlooked it): A degree isn't necessarily a "get into the market for free" ticket. I've seen many examples where someone with a high end degree simply knew shit about the basics:
"Why would you want to declare a variable?".
"A trick question eh? Well, you don't have to if you're using C# or avoid adding explicit in VB".
"No, I want to know why you'd want to declare one first?".
Stuff like that always reminds me that you might be better off going for a broad approach. The reason I went for this route is because I'm a systems/network engineer (or administrator?) which means that you'll be doing a lot of different things. From helping people out with simple Word problems right down to setting up a firewall design, that's the kind of diversity I really like.
But to me broader is always better.
the different types of BYOD policy choice you can make, the infrastructure you need to build to support your policy, the problems of provisioning and access.
Infrastructure we need to build, or the infrastructure they want us to build? Considering where it's coming from I wouldn't be surprised if we get a story about how "analysis" (done by Freeform Dynamics obviously) has showed how "certain hardware components" which "surprisingly" happened to build by HP are just what the doctor ordered.
Depending on the kind of environment we're talking about I don't think there has to be much impact. Most Enterprise based wireless routers normally support multiple SSID's for example, and a whole lot of extra's to tune them (think about speed limitations, shielding of certain networks, hiding networks, etc.).
If systems administration is any good then I think they can apply basic risk assessment to such an environment to prevent disaster from happening. Most likely within their current environment as well.
Maybe I'm just being cynical here, but the real problem at hand would be convincing the upper brass. They're most likely prefer paying attention from "case studies by the experts". This will go double if said environment is merely following the hype-want-to-be.
be aware we've just moved offices
Just moved offices without a nice and cosy office warming party with all the commentards?
I think this is just an elaborate plot to hide the obvious truth from us ;)
Perhaps to make sure he'd keep his mouth shut. Oops! :)
"Law abiding citizens have nothing to fear (and everything to gain) from such a system"
Unless someone changes said law to include something totally outrageous (it wouldn't be the first time, esp. if you look at this from a world-wide scale) and then uses this system to enforce said law.
Now you're suddenly in trouble.
"Fragmentation amongst Linux distributions will be the killer blow", a critical comment which actually holds some truth because setting up software on Debian can be a completely different ballgame from doing the same on SuSE. But Linux is still going strong, ever so popular. Maybe other people can see clear signs as to why the fragmentation is extremely bad, I sure don't.
What about open source software as a whole? The fact alone that you can simply cast the magical "fork" work (and issue a quick cp command when no one is looking) was also reason for complaints. Software projects would fragment, this causing damage to the entire species.
I think that the OpenOffice project (deliberately mentioned) showed us otherwise. I think it's fair to say that the forking and fragmenting of LibreOffice may very well have saved the entire project.
If this really about a fair warning to all potential developers? Or a deliberate (and very transparent) scheme to put your own environment better into the picture?
A bit lame, don't you think?
The hackers gained control of the Big Red fan site and posted the information there.
And that's probably also what got them into trouble. In fact, I wouldn't be surprised if this move also disrupted the option to take further legal actions against the rapists. Although it may sound quite sickening and inappropriate in this case, the law normally still abides by "innocent until proven guilty".
Because although they may have found evidence I'm afraid that a lawyer will easily swipe it all under the carpet by merely insinuating that this group managed to gain "illegal access" to the computers thus "there's no telling if they actually got the material from there, or simply placed it there themselves". That's the kind of trouble you'll get yourself into.
And then a lawyer will most likely simply explain the website defacement as an act of aggression against the club and you have probably raised quite some doubt when dealing with a trial by jury (or so I think).
Its one thing to obtain evidence, using said evidence yourself will almost every time cause more collateral damage than you can anticipate. Its usually best to leak this and to make sure both the public as well as the justice system gets hold of it.
And the worst part of it all is that the rapists are most likely going to get away with it.
Well, I am a metal fan (sort off; I still like listening to some of the old stuff, but occasionally) and I think you're overlooking something. Usually it's not an ongoing 300bpm tempo but a lot of "beat bursts" (to give this a name).
In my opinion a very nice example of this would be "South of Heaven" by Slayer. The song as a whole sits at a very slow tempo (probably also the reason why many people kind of liked it, including non-metal or non-Slayer fans), but if you listen closely you'll hear several bursts which easily count up to 10 beats or so. Added up to the overall percussion (which maybe slow but still extensive) and I think you can easily reach these amounts.
Even though you're not listening to something "techno like" where there is a constant beat present.
And now all of a sudden I feel like digging up some of my old Slayer CD's :-)
The jolly roger, because metal fans like skulls :-)
It's been going on for ages, so why get angry about it?
No, otherwise I would have used other wording. It's been going on for ages, so why get angry about it now? Only because it hit global media this time?
Of course it's been going on for ages; however there is a big difference between being pretty sure something is happening but unable to prove it to those who might change their behaviour because of it, and actually having that proof.
As if you needed to look so hard. Just look at how the US treats the privacy of anyone who wants to visit their country. At one time they even made a demand to the EU that they wanted global access to the bank accounts of every EU citizen, or at the very least anyone who wanted a visa to travel there.
Of course there came trouble when other countries started to demand the same from the US, then it became a matter of privacy intrusion.
Which raises another question: why is it perfectly ok to tramp on the privacy of everyone else in the world yet it becomes a national scandal when the same thing happens to US citizens? Merely because the government is now violating US law or because things have changed because it's now happening to them as well?
That is something which somewhat bothers me with all this. It has been going on for ages and no one really seemed to care, and now all of a sudden it becomes an outrage?
I think the author is overreacting. Understandable, because I suppose that I would too if you suddenly get the feeling that you only now discovered to been living a lie somewhat. For someone living outside the US like me it's easy to comment, I realize this all too well. And if you've been raised to be critical about your environment and not to blindly trust things it becomes easy to raise questions.
But even so; I can't help feel that your outrage is only based on what has made it to the global media. But the fact is that this has been an ongoing issue for a long time now, even way before the 9/11 attacks.
When a couple of friends and me were playing with the then rather new FreeS/WAN some of our US peers (who ran a home server) actually got some questions from some law enforcement agency because they had been showing "suspicious behaviour". This was around 1990!
The US is filled with paranoia in my opinion. And although I admire and respect the fact that you eventually opened your eyes and are now ready to make a statement, I also think it's wise not to overreact. Taking all your hosting away from US companies will only hurt those companies at first, even though they may also feel quite strongly about all this.
It's a start, sure, but if you really want to make a change I'd say also try to take this to the politicians. Because that may have longer lasting effects then simply opening your wallet and spending a little more on hosting.
Those haven't ever been secure.
Apart from the issue of different available locks (as mentioned by others) there is another aspect to consider. Making a mold from a car lock will be a lot more suspicious than simply trying to pick up electronic signals using a "blackbox".
Or: "Uhm, I lost my keys and the assurance doesn't cover it, so I'm trying to make a duplicate key?"
vs.: "Yeah, coverage is a biatch these days; I can hardly get any signal here, that's why I'm standing so close to your car sir.".
To see an actor who has done Dr. Who in the past to return once again, for example I personally thought David Tennant played a very good Doctor.
How many companies who are into this stuff due to the hype and not because it simply works for them have thought about the involved risk management. Because when looking at mobile devices such as cellphones I suddenly can't help wonder: "What would happen if the employee quits"?
The reason doesn't really matter here. But if such a co-worker has been bringing and using his own mobile phone then you'd better hope that you either hired a trustworthy / respectable person and / or that you made sure to include a section in the contract what the person can and cannot do with the information he acquired during his job, especially with information which is now stored on his / her phone.
Because what if this person decides to start a company of is at another employer and now decides to use the information on his own hardware to help out his new environment?
I think you're entering a huge grey area here. Because although one could argue that the person is now (ab?)using and profiting from information which isn't specifically theirs, one could also argue that the company involved was also profiting from the person when he or she was using his own equipment for company business, effectively saving the company money.
By the time the searches are rolling in it's too late.
I was thinking exactly the same thing. But then again, unless you're George Lucas of course, then you simply continue to
mess up "improve" your movies before each new DVD release.
...as if Microsoft is becoming desperate.
My theory would be that they have invested quite a lot in the whole structure and are hoping to get some of that money back. I think this strategy isn't all that bad. After all: it's often better to make a small amount of profit on a lot of devices ("sales"), than it is to make more profit on something which sells less frequent.
Even so, I can't help wonder if the damage hasn't already been done. Let's face it; even if Windows 8 is quite usable on a tablet or a touch environment, the brand name has already been (heavily) tainted. And Microsoft has also already given in and admitted that it wasn't going as well as they proclaimed.
Then looking at the current rough financial climate: say a computer illiterate wants a tablet. What to get?
A (relative) cheap environment of which Microsoft themselves have already said that it had failed (do you really think those guys would remember that Microsoft was only talking about the desktop? I don't.), OR a slightly more (or less!) expensive device (Samsung?) running on Android which has already been chosen as one of the most popular environments?
You can only spend your money once, especially during these times, so you want to make it count..
Well, don't forget that according to Microsoft those same "user input channels" convinced them that the start menu had to go. Of course the results that followed made many wonder to which audience Microsoft had actually been listening, but even so that was their original story.
Is if this Halo version is eventually going to be a patience and spider solitaire replacement...
When Microsoft was pulling away Messenger. A, in my opinion, real innovating service (to some extend of course) in that it could be easily used on both desktop and telephone and was actually a very widely used service. Both for VOIP (like) services as well regular instant messages.
Yet all that had to go in favour of Skype where it seems that the only way to make "full" use of it is if you get yourself a premium subscription or buy into lots of Skype credits. Of course I did the total opposite; the moment Messenger stopped working I removed it and Skype and that was the end of it.
Now I'm looking for a feasible, non-intrusive, replacement. The webclient (Outlook.com) is somewhat usable, but not just quite a good setup.
A headache thinking about the nearly endless switching capabilities.
First of all you hit a nerve with me by mentioning SunOS. Where you actually meant Solaris because that was the all-in-one operating enviroment, SunOS didn't include the X environment per definition. In fact; SunOS sort of got replaced by Solaris, up to version 4 it was actually based on BSD.
"Look at screenshots of long-dead early GUIs from the 1980s, such as SunOS or Smalltalk, and they don't even have features like menu bars or buttons on window title-bars at all"
Apart from the statement above Solaris *had* menu bars, if CDE was used. There were at least two graphical environments to chose from, by default OpenWindows, but as a counterpart we had CDE, which didn't provide one but several menu bars in the tray panel, one which inspired Xfce later on.
Don't cut Solaris short like this, please...
Needless to say but this undermines your statements. A statement which is flawed too:
"RISC OS already had its Icon Bar, but that doesn't have an app launcher or a way to switch windows."
And how exactly could Windows 95 switch Windows? Or are you now confusing windows with virtual desktops here, because Risc OS had plenty of options to use several windows side by side, in a way comparable to GEM.
Oh that's right; GEM... Even usable on CP/M and somewhat comparable to a mixture of Windows 3.1 and OpenWindows, which you claim wasn't prior to Windows 95.
Then how come that looking back at GEM reminds me heavily of a Windows hybrid?
I do agree with you on one thing though; it really seems as if the main desktop managers copied Windows. But there were plenty of environments which didn't, Xfce for example (before it became "cool" to use it, you know what I'm referring to).
This is all an elaborated scheme to get you guys drugged up so that you will easily give in to Windows 8. Sales go up, upper brass gets pleased and this dope gets his job back ;)
Promise them golden mountains.
That is what's happening here. Roaming charges have been a topic of debate for years now. But here and now things have suddenly changed so dramatically that a change is required?
Surely this has nothing to do with the fact that the opinion on one Europe has hit rock bottom recently?
It's the way you deal with it. And that isn't determined by your own (sexual) fantasies and or habbits but simply by the person(age) you really are. I guess this is way too cliched for these kinds of studies, in my opinion because there's little money to be made by stating the obvious, but it's simply the way it is.
Just because a woman is into bondage doesn't automatically make her a sex-crazed femme fatal nor does it mean that the only way you can get along with her is to tie her up.
The only thing to keep in mind is that you also can't rule these things out. Sometimes you /are/ dealing with a (sexual) disoriented person. But its not his or her hobbies which define that.
In my opinion researches like these are no better than the well known "violence on TV is bad because it corrupts children", while totally overlooking the small yet important factor that the real issue is the way those children deal with it. And that's something normally taught by the parents.
As said, IMO this isn't different.
Of course; in the end this whole research is flawed by design. Because let's go over something obvious once again: most people are not very comfortable talking about their sexual desires or fantasies. Doesn't that fact alone indicate that if you start a research into this matter you'll automatically get answers which only reflect a small portion of the people involved?
When you install Windows 7 on a PC you'll have, well, Windows 7 obviously. In all it's glory.
When you install it on a laptop on the other hand you too have Windows 7, yet with some extra functionality which is specific for laptop usage. Things like presentation mode, those aren't available on the PC (but can be activated by hacking the registry).
It makes me wonder why Microsoft didn't extend on this? Microsoft obviously wants one solution to rule all markets. I don't think it's smart, but alas.
And Metro as a stand alone environment isn't all that bad IMO, I use it on my phone and actually like it there. But it becomes totally different on a desktop (without touch hardware), it's also a reason why I dislike Windows 8 with a passion.
They had an architecture which could provide functionality based on hardware; it really boggles me that they didn't use this for touch based equipment. You know: you work with the classic keyboard / mouse and you get a start menu. You work with a touch screen and you get the Metro start screen.
And for the die hards who have A but also want B: you can hack the registry and tune the stuff yourself.
Microsoft should really learn to give the users what they want (and optionally give them even more) instead of trying to continue to dictate the market what's best for them. Because more and more does it become apparent that if they keep this up then people may actually stop buying into Microsoft desktops alltogether.
This is what I'm missing out on here a bit. Sure; eventually those phones will stop working but it's not due to the water perse; but simply because water isn't an isolator. So al sorts of weird and unwanted connections will be made, eventually resulting in a direct connection on the battery, and that's kinda bad.
But the thing is; this doesn't have to be the end of the phone. Take it apart,dry up the individual components and then let the whole thing dry up for a day or two. Chances are high that it will simply continue working.
And this is the problem, no one knows what SHAME is anymore, or they don't care!
You mean like those politicians who will easily organize a going away party for 100 people, estimated costs are approximately E75.000,-, even when the country they claim to be serving is in a very rough financial climate, to such an extend that taxes had to be raised and government spendings (where it matters of course) had to be cut.
Because that is the other side of the medal; people need to pay taxes but also see that taxpayer money wasted and thrown away as if it was nothing.
This isn't saying I don't agree with you perse, but it works both ways.
Well, it should be kept under wraps a bit but it's going to be a huge feature in the upcoming version of SQL server. Then it will fully support several stages of fuzzy logic. All in a wild attempt to bring a more natural and reliable feel to the SQL server.
The beauty is that it will far exceed the previous comments of "it will work, or not...", with the new fuzzy logic module enabled you can be sure that it might work, or not. But there isn't a 50-50 percent chance of things failing or succeeding; the chances go MUCH deeper.
Although the module is best used on the Enterprise management level because these people know what they're talking about when it comes to chance calculations, it's also perfectly usable for home servers. Now you can finally have the best excuse as to why your website isn't working all the time: "Because the evil Microsoft enforced fuzzy logic on my SQL server!".
No one will believe you, but you have to agree that it sounds cool!
What you're experiencing here is merely the first stage of the plan.
"> What does the concept of victory mean?
Same as it's always meant - to be able to impose your will on others."
Careful there; you make an awful lot of assumptions here. Because 'victory' could just as well mean successfully defending yourself against an oppressor.
Each to his own, but I'd rather not ignore the webmaster of the Doctor Who website when he's sharing new information about the cybermen ;-) I also don't think he's clueless.
"I can understand, sort of, why some dumbass hackers would get off just defacing something but why didn't the SEA do something that furthers their ends?"
Who says they didn't?
It's the same reason why you should wipe your system clean after a break-in: you can never be 100% sure what the intruder(s) did or didn't do.
For all we know this could just as easily have been a diversion of some sort.
"To make it better, CIOs and IT admins need to rethink the way that they approach protecting their networks from hackers and other miscreants."
I think companies should hire better qualified personal and if they actually have those on the payroll also start listening to them.
The main problem in many big companies ("Enterprises") are the sometimes endless layers of managers. In certain cases the management layer has actually grown into an entity of its own. With that I'm referring to Enterprise environments who would hire managers solely based on management skills even though the person in question either completely lacks any in-depth understanding of his department or simply doesn't have enough understanding to fully understand what his team is telling him.
Such a person will more than often make decisions which make him look good. Or put differently: decisions which are most likely not to cause any members of the layer above him to become displeased (or worse) with him (put differently: his department). Even though, especially when talking ICT, sometimes such decisions have to be taken.
"We need to upgrade the firewall today, there have been some flaws found in the operating system so we need to upgrade the kernel. It will require a reboot, so the website(s) will be down for a short moment".
"Ok, but we have a big project coming up this week. Can you guarantee that the website won't be down for more than 5 minutes? No? Then I think we should postpone the upgrade to next week, then it's a much better time. Especially because we won't get as much visitors to the website as we will have this week".
And what do you know; the admin who suggested the upgrade simply couldn't explain well enough that we were talking about a zero-day exploit which could allow 3rd parties to gain access to the server. The manager didn't understand enough from his department to inform about the risks involved, so that he could weigh the risk of a longer downtime to the risk of not upgrading the OS then and there.
The result? Well; you'll be the judge of that. Depending on the flaw and the increase in traffic they could obviously also attract people who might try to exploit said flaw. Or not...
Even so; in my opinion it's issues like these which are the real culprit. The reason I'm pointing to enterprise (-like) environments should be obvious: in many cases when we're talking about break ins and such these are usually involved.
Heck; this could even go as far as an enterprise(-like) environment which provides (hosting) services for smaller companies. In my case there are some very strict rules to follow, which was one of the reason's I started hosting with my current provider: if they detect that you run your own DNS server and it can do recursive lookups for everyone they preserve the right to block said server. If they detect that you run your own MTA and it provides an open proxy then the same rules apply.
How many hosting companies (once again: talking about Enterprise (-like) environments) will simply let it go because they don't consider it their problem ("the customer is responsible for his own server")? Even though enforcing such rules could prevent a lot of Internet "casualties"...
I'm a bit surprised to learn that they haven't improved hardly anything when it comes to the migration or conversion process.
Because although I'm currently very happy with my Outlook 2010 environment I still shudder at the actual process of converting my Thunderbird environment to Outlook 2010, that wasn't easy at all.
And now it seems the same applies to 365, which I honestly consider to be a failure. Especially if you take into consideration that popular software such as Thunderbird is open source, therefore people and companies can easily check the way it stores it's e-mail. Better yet: even if you don't want to, the format used is (to my understanding) very similar to the mbox format, with the exception that they're also using an index or database.
But no... As you said; Outlook 2010 can handle IMAP, but you can't simply tell it to import your Thunderbird settings or point it to an mbox format mailbox and tell it to convert this to it's native PST format.
And yes; I know that there are a dozen software packages out there which can do this for you, that's really not the point here. In my opinion Microsoft should have implemented some sort of solution themselves as well. At the very least to make it easier (and thus more appealing!) to convert! At least they should have created some kind of PowerShell script.
Either way; as said I still remember my conversion. 5 different e-mail accounts; 1 business, 2 Hotmail accounts (business & private), one private blog account and the account provided by my Internet Provider (which I use the least). I ended up exporting all the e-mail from ThunderBird to mbox, uploaded that to my mailserver and with a nice Perl script (mboxtomaildir) I could implement the whole thing and make it accessible using Dovecot.
Then I setup an account to point Outlook to this temporary mail account and within Outlook moved all my e-mail messages from this place to the official account I setup.
So picture my surprise to read that basically Microsoft hasn't changed a thing with their latest 365 environment. This is really not the way to motivate people to start using Outlook. In fact; the process alone has often made me advice ThunderBird to some of my customers. Simply because moving to an Outlook environment would at least take one hour for the conversion itself (probably a little less, but I normally charge by the hour).
Whenever I need publically recognized certificates I always turn to GoDaddy. Partly because of the price, but also because they really seem trustworthy to me; I came to that conclusion ever since GoDaddy started a global (company-wide) certificate revoke and re-issuing for all certificates which were made using Debian's OpenSSL; all because of the Debian OpenSSL disaster several years back.
That move had to cost them money, I'm very sure of that, but even so they still did it. And there are many certificate selling companies out there which didn't bother at all...
But the thing is: GoDaddy has been requiring 2048bit keys to be used for several years now. SO I can't help thinking that Google seems to be a little late to this 2048bit key party.
It's reasons like this why I'm always turning off WiFi the very moment I need to do something more serious with my phone like checking bank records or writing an important (not private perse) e-mail. I have a dataplan, so I can use the Net basically unlimited with my phone subscription, but depending on the kind of WiFi connection it's usually a little faster.
Of course according to my surroundings I'm simply being a little paranoid.
But the thing is: If your phone (or other mobile device) is using a (public) WiFi connection then how sure can you be that no one is eves dropping or doing worse? Yet most people I know don't even care to keep this into consideration.
"TIFKAM appears to have been designed by Microsoft in order to follow Microsoft's strategic plans, it seems very difficult to believe that many actual objectively thinking users were consulted during it's developement."
Oh, but it isn't, Microsoft actually consults its users all the time. If there's one thing Microsoft does "right" (sort off) it's providing a platform for their users to share their opinions on the matter. And for their entire range of products too; from Windows (through their Windows blog) right down to their development products, for example through the Visual Studio UserVoice site.
What does seem unbelievable though is that Microsoft actually pays any attention to all the feedback they've been getting.
There are some exceptions, but even those show how stubborn Microsoft actually is. For example; while a regular suggestion for Visual Studio 2012 ("VS2012") gets approximately a few hundred votes (500 - 600) the suggestion to bring back colours to the interface quickly grossed in a few thousand during the first week. Yet only after approx. eight thousand votes did someone at Microsoft suddenly wake up and considered to write a theme editor module for VS2012 which allowed users to change the colour scheme as they deemed fit. They also added a few more themes apart from the default 2 (which were called "dark" and "light"). At this moment the suggestion in question has gotten thirteen thousand votes and the number still rises.
Microsoft is consulting their users all right, the only problem is that they're totally ignoring what is being said.
I'm probably one of the few here but I didn't quite enjoy the Spiderman movies, at all. And it's for the same reason why I didn't like many comics which were based on famous (animated) movies back in the days when I was a kid: the storyline often diverts from the main environment that it becomes "different". Sometimes these changes are subtle, sometimes they're huge.
I think that back in the days they should have considered making animation movies out of all this while making sure you keep true to the story.
Quite frankly the only Spiderman series I did heavily enough (enough to buy the DVD sets for all 5 seasons) was the Animated series (link to Wikipedia). It also introduced some diversions to the main storyline, but none of them would intrude or plain out collide with the spidey character as we knew it.
For this same reason I also favour the X-Men animated series (link to Wikipedia) over the movies, even though I like the X-Men movies, a lot better than the Spidey movies too. I have 1 & 2 on DVD but didn't care at all for the last one. Once again because it heavily diverted from the "main" plot and started to make it look ridiculous in my opinion (Xavier defeated by the Phoenix? Yeah right...).
Simply because you couldn't come up with this brilliant business strategy which will put the .gif format right back on the map:
It's simply how the Suite - as a whole - works together. That is the key point of Office, which is of course also combined with certain software components which manage to stand out to some extend (meaning: even critics of said software will agree that it's pretty usable nonetheless).
But for me (small business use with sometimes big demands) the key points to Office are Visual Basic for Applications ("VBA") which allows to me to program or script specific changes or additions to the environment, the Office API which provides access within VBA to several of the specific Office functions (exporting an opened Word to PDF format and then creating a new e-mail message in Outlook with the previously mentioned PDF file attached? No problem) and finally the Windows assemblies: also known as COM; the Component Object Model.
(very) Easily put: COM makes sure that software programs can register themselves with the operating system (Windows) while providing (if applicable) an API (programming interface) to allow external programs to access their functionality. This is the reason why you could easily access the Apple Quicktime player right from within Word (if both are installed of course). And this model goes extremely deep. From natively installed faxing services to Java webstart right down to VLC (video / media player) and / or Zune.
That model alone allows for some extreme functionality of its own; want to access the Windows clipboard from within a VBA program? No problem... Most importantly to note: all of this is possible out of the box, so without the need for an external programming environment such as Visual Studio.
I think it's this speciality which makes Office so extremely appealing to so many people. It's not merely your average Word processor or Excel spreadsheet; it can also provide a complete development platform of its own where the basic Office-based functionality is obviously provided out of the box.
Personally I think it's this reason (apart from the obvious issue of the original company being Sun) why suites such as OpenOffice and later LibreOffice provide very deep ties into Java, also allowing people to utilize it to write extensions for the entire Suite. It's also a model which surpasses the "simple" macro editor and instead opts for a full blown programming environment. The major issue here though is the interoperability. I haven't tried the latest LibreOffice so my knowledge on this matter is dated, but last I checked on OpenOffice I noticed that the people behind these projects are also making some rapid improvements on these parts, it's most certainly a development to keep an eye out for.
Still, personally I think the free Office suites have some way to go before they can match the interoperability provided by Microsoft Office. But as said: they are coming very close already.
Side note: And when the free suites break this barrier then I think Microsoft will start to get serious problems, because then people are directly eating away at one of their main pillars. And they can do it all for free...
Is that any possible negative effects will only manifest itself after many years of usage, by which its usually a bit too late. There is a reason why its usually healthier to follow a varied pattern for your food...
It would be nice to start with Bring Your Own Device before using the abbreviation, especially since this movement has several off springs like bringing your own phone, pc, laptop, etc. Not everyone keeps up, that's why we have you afterall...
Although I made quite a bit of fun about in the comment section of one of the earlier articles I do see the potential here, but in my opinion the thing shouldn't be focussed on bringing your own gear but to allow your personal broader and wider access to your data. That's the main key point, one which could have been made anyway. However, I'm a little sceptical about the massive touting people are doing because let's face it: giving access is one thing, using said access is something completely different. That takes someone who feels committed and involved with his job.
But yes, it can work. This reminds of a sysadmin job back in the 90'ish. It was an enterprise-like company, but not as big that we could afford 24hr monitoring of our services. We did have something as a hotline; one person who would "take watch" for the evening to make sure that if their were problems he could get into his car, go to the office and step in when required. Due to safety concerns there were no outside connections permitted, none what so ever. At once time the upper brass became a little more lenient and allowed a Unix machine to be accessible from the outside with limited connections to the internal network.
And so I designed a scheme to relay 3389/tcp data internally, and went through all the official channels to get permission for implementation, even more tiresome than developing the model itself. The result was that certain people, amongst myself, would now get strictly controlled access to the internal Windows server network from their home location (this was only allowed if you had a static IP address; both for easier administration as well as a form of signal to the upper brass that you were deeper involved with this technology).
The result should be obvious; many people, including myself, would easily logon during the evening in their own time to check if everything was still ok. This even prevented a disaster one day because one of my colleagues did the same, spotted something weird, immediately called the manager and prevented a major disaster due to a bug in one of the monitoring scripts. This guy was working from home, in his own time, because he felt that was important.
This BYOD thing is basically no different, apart from one thing... I fear that its main motivation isn't so much to involve more people into the way the company works, but to try and apply a cost reduction on hardware and making it more appealing for the crowd to use their own stuff. I can see how this will have a psychological effect too: "Ha, at least those asses from ICT will no longer be able to tell me how to use my computer!". Of course without an extra pay check for all the hours you put into getting the whole thing to work.
And there's the small issue, one which I made fun off in my previous post about this subject, that there's usually a good reason why ICT restricts several things on the network.
I think a lot of companies are going to find out that BYOD sounds awesome in theory, and that the first signs will also be very positive due to a large number of employers embracing the idea. But I think it will mostly be fuelled by the wrong motivations (cost reduction, less limitations) and that can come to haunt you....
First I'm missing a link to the research summary (link to Forrester.com summary). And when reading through that article I can't help wonder if the research isn't a bit flawed here and there.
Not saying that the end results aren't true, but lets face it: a lot of researches also predicted the end of the PC as we knew it, and that has actually yet to happen because although tablets are becoming more popular, they're usually an extension of what people already have. It's extending on the "PC experience", not replacing it perse.
And of course they also make sure to add catchy results, such as stating that a majority of end-users would prefer Windows 8 over Windows 7, all according to their own research data of course.
Yet the thing is; there's one very important factor we need to keep in mind here, this company is selling access to their survey data (link to forrester.com dataservice page). As such it has a commercial interest in making their researches as appealing or provoking as possible.
And let's face it; didn't a majority of the so called experts also predict huge successes for Windows 8? When looking at the Forrester blog some people associated with this company sure seemed to think so, what to think about Windows 8: Think you can skip it? Think again! (link to Forrester blog post dated March 8, 2012).
Seems people have little problems with skipping it though...