I live in the desert and the only phones I found that can work here, not overheat and shut down, is Apple. So that is what I use.
1032 posts • joined 31 Jul 2007
In Canada, the standard way to handle an issue with Telus or Shaw, is to call the help desk and immediately swear blue murder at the poor sod who answers the phone. The call then gets promoted to a supervisor right away - then apologise to the Sup for swearing at the poor first line numpty and they are always super polite and get the problem fixed immediately.
We had a vendor who assured us that the SW of a rather important government system did not have an expiry date lock. However, one fine day, it all stopped working. With the new copy, we got another assurance that there is no expiry date lock. Having learned a lesson, we used a GPS constellation simulator to crank the clock forward until the system locked again. We took a screen shot and sent it to the vendor...
In my experience, the kind of problems that can actually be coded in a functional language are so simple, that you don't need a functional language to code it.
I have never seen a useful project done with a functional language. Every place I know that tried a functional language, eventually gave up, fired all the culprits who propounded the damn thing and started over in C.
Ayup, and not to left MS off the hook: A Java or .Net program cannot fix a bug in the JIT compiler or a bug in the garbage collector. Those bugs will never be fixed and will not show in these kind of bug fix studies.
There are good mathematicians in France. Whether they boast about it or not, is quite immaterial. Most cryptologists prefer to keep quiet because they don't like questions and don't want to accidentally get on the wrong side of an official secrets act. However, the security of a system lies with the keys. You should be able to give your crypto systems to your enemies and still be sure that they won't be able to read your messages. This is why the algorithms of most crypto systems and their test vectors are published for review by anyone.
The problem is that a passport copy is a complete ID theft kit - it even includes your signature.
I had to change my bank card once due to a Dubai hotel. Since then, I give hotels a mix of data: Canadian Amex card and UAE ID for example. This mix doesn't enable an easy identity theft and fraud since the information doesn't match exactly.
Biting the hand that feeds IT © 1998–2019