Re: Add more technology - solved
It's like saying that the toilet cleaners need to store their bleach in the CEO's safe. (Make up your own analogy.) It's cheaper than making a special storage cupboard for them, in the short term anyway.
6112 posts • joined 10 Jun 2009
... people were arguing about whether other not stars would even have planets. Now they take pictures of planets around other stars and argue about the exact mechanics and timescales of their formation. That's progress.
Next up: The existence of intelligent life outside our solar system?
... I only got a virus once (as detected by whatever anti-virus I had). That was when I did something stupid - I downloaded a printer driver from a website, devoted to drivers, that anyone could upload to - yes, very stupid.
Do so many people really click on the links (obfuscated or otherwise) they see in spam/phising emails?
@Gene Cash - If you knew my IPv4 address, a quick DNS lookup would tell you my ISP and, if you were familiar with the four letter abbreviations, the name of the town I live in/near. If you contacted my ISP with the required formal authorisation then they would tell you my address, my phone number and my credit card number. So, how is IPv6 any 'worse' that that?
"Meanwhile, Microsoft gets access to the estimated 200 million Dropbox users and the chance to flog them some Office 365 subscriptions at the same time."
Does this mean I'll be getting Microsoft adverts masquerading as files in my Dropbox? The Dropbox application already tries to run as root, now and then, on my Linux box. I keep telling it 'NOOOO' and it comes back and behaves itself until the next time.
If I knew your gmail address, could I send you an e-mail saying that your flight has been cancelled thus resulting in you missing an important meeting etc.? (Think of comparable scenarios for your own amusement.)
As a Google calendar user, all I wanted was a simple multi-calendar application where I controlled the entries. It does that well. I don't like the idea of anything automatically adding entries to 'my' calendars. (Yes, I know that as a Google user, I am the product and am at their mercy.)
To make anonymous posts, using a 'real name'. They could do that if the FB account was initially set up via Tor and then only ever accessed via Tor. The article talks about accessing an account but I'm wondering if you can set up an account via Tor. I suppose you, or a trusted friend anywhere in the world, could initially set it up from a public library computer or similar computers.
This is not a device you carry around with you, it stays at home or at work. I'd have thought that offloading completed projects onto external storage (networked or locally attached, and duplicated) would be what people did. Can anyone who does serious work in this area give us an idea of how much storage they need and of what form/location?
You forgot to mention thorough testing before release, especially of the boring or 'not exciting' aspects. Sometimes it seems to be a case of, "Oh yeah, we know about that but it's easy enough to work around it and it's not important."
@Sir Runcible Spoon
There are many uses of 'the', 'a', 'my', etc. that give fine distinction of meaning. Some are logical (or lexical) and others are simply traditional forms of words. You could compare and contrast "... going to visit the parents" and "... going to visit my parents"; "I'll take the kids to the park", "I'll take my kids to the park", and so on. I'd suggest that it's not an implication of possession but an implication of function/description of people in your life with a suggestion of permanence and familiarity. I also think you're over thinking it. :)
" India has proposed the entire system is changed so IP addresses are more traceable, ..."
This would match well with the rollout of IPv6. Governments/ITU could have fine control of the mapping between IPv6 address and the user/group/location. When the IoT is upon us, 'they' will know how many slices of toast you've made and when.
"... is that by linking the retailer directly to the bank, the seller also avoids paying credit card transaction fees."
Isn't that just like a bank debit card? Except that you, the customer, are in charge of the payment with a bank debit card - so what is this about linking the retailer directly to your bank? I'll carry on paying with cash wherever I can.
" ... applications such as integrating a reservation system with a user's calendar ..."
"Capabilities covered in the APIs include access to mail, contacts, and calendar. "
How 'safe' will/can this be?
"The idea is to make the Office 365 more dev-friendly, ..."
Can the developers be trusted and do they need to be trusted?
"Developers are also advised to “Always clearly explain to the user what data you will collect and why” and to “Honor user requests to delete their data”.
It's also forbidden to “ … use Google Fit APIs for non-fitness purposes, such as storing medical or biometric data, selling data, or using data for advertising.” "
Is this really _our_ Google or is it a Google that's broken through from an alternative universe??
Jonesborough Market in Northern Ireland:
"Infamous within the UK and Ireland, this market sits in an isolated area on the border of Northern Ireland and Ireland and is monitored by illegal traders deploying counter-surveillance measures,"
This was written by the same man who writes the voice-overs for cheap action film trailers.
Is the OCD a side effect of time travelling or is it one of the reasons that you started doing it? Please send me an email (email@example.com) because I'm really interested in this for medical reasons. I've heard that paranoia is another side effect, so don't worry if you experience that.
I'm also wondering how much you know about this:
"The humble SIM has enabled mobile operators to assert control over important areas which were not initially in their kingdom, such as security, Wi-Fi access (via EAP-SIM authentication) "
The three Android phones that I've owned have all happily connected to Wi-Fi with no SIM card in the phone; in which case they become small Android tablets. How is it different if I have a SIM in the phone? Have I misunderstood something there or is this only about the iPhone?
"... for a technology which enables SIM cards to switch identity automatically ..."
Is this actually a 'technology' or is it just a set of protocols and behaviours that anybody 'skilled in the art' could have thought up and something we could have had years ago if the telcos had been willing to work and cooperate with each other?
Biting the hand that feeds IT © 1998–2019