While Coding, How Often Do You Refer To Language Docs?
since it clearly states - "While coding, ...."
if you don't code, you don't answer...
But he isn't a coder so he wasn't able to properly exit the While loop...
Windows 7 Igniting Touchscreen PC Market
I believe HP was one of the companies affected the most, and I notice they're not listed in these new manufacturers.
From the summary:
, NextWindow, which already supplies HP's market-leading TouchSmart line, and Dell's Studio One
They're not listed as a new one because they've been selling touch screen computers, successfully, for awhile now. The TouchSmart line was introduced in 2007.
I Appreciate The Ergonomics Of My ___ The Most
You might want to try something like this or this. Car seats turned into office chairs.
The first one even keeps the power adjustments, though that one looks more like a proof of concept than something you would actually want to use.
Comcast the Latest ISP To Try DNS Hijacking
You're free to do that with Comcast as well. Here's a list of all their DNS servers by location. It lists primary and secondary DNS servers for the hijacking and non-hijacking servers.
Ads Retroactively Added To Wipeout HD, Soon Others
Providing free patches, partially funded by advertising revenue to you is not.
It's not free, nor was the original game. Wipeout HD is $19.99 and the expansion is $9.99. So these people are paying $30 for this nice new "feature".
Quote from http://blog.us.playstation.com/2009/07/17/wipeout-fury-developer-diary-new-game-modes/
Before I talk about what I've been up to on the WipEout HD Fury expansion pack, I would just like to let you know that the pack will be available from PlayStation Store on Thursday, July 23rd for $9.99.
RadioShack To Rebrand As "The Shack"?
Just imagine if you could walk into a Radio Shack and have a selection of stuff like what you can get from Digikey and Newegg combined. That would totally kick ass.
Just add a Hackerspace in the back and it would be perfect.
P.S. To any prospective business out there, I, and I'm sure the Anonymous Cowardon above, would be perfectly fine with you stealing this idea and implementing it. It's encouraged.
Google CEO Schmidt Leaves Apple Board
It's been interesting watching Apple and Google get more negative comments on Slashdot over the last few months (or the last couple of years in Apple's case).
I think the criticism of Apple is partly because of their inherent need to have control, which clashes with a community of geeks who love to hack at things, find non-obvious/non-intended uses for them, and just generally gain more knowledge. That then boils over when, like you said, some Apple fans are so quick to jump on any criticism at all (see: Reality Distortion Field).
Google, on the other hand, has a lot to do with privacy and their enormous databases. I also think that after seeing what happens when one company becomes too big/has too much control (Microsoft), the slashdot crowd is being a lot more vigilant to possible abuses. It seems too many people are quick to implicitly trust and not question anything for no other reason than "It's from Google", which can easily lead to bad things when left unchecked, as it did with Microsoft.
Google CEO Schmidt Leaves Apple Board
Google Search Appliance is a single purpose server to provide in-house search services. It's basically a search program that happens to come with a server, not a server to be used for anything.
Xserve is a general purpose server. Google only competes with Apple here if your only intention for the Xserve was to implement a custom search engine on it. Even if that were the case, the main selling point for Google in that instance wouldn't be the hardware, but in the performance of their search method compared to your own. As far as I know, Apple doesn't sell their own search algorithm so it still wouldn't be competing with Apple.
Scammer Plants a Fake ATM At Defcon 17
It's also something Frank Abagnale did, as noted in his book The Art of the Steal . Link goes to an excerpt from the book, start at the last paragraph on page 118.
Scammer Plants a Fake ATM At Defcon 17
Have customers just select a password for each account. Retailers would verify the password the same way they verify CSC numbers now,
Visa and Mastercard have already implemented this option. The only problem is the store has to be capable of handling it, and not all of them are, unfortunately.
The account number is simply placed on the card, and authentication comes from physical ownership of the card. (PINs don't count because they are unfortunately verified based on machine-readable information on the card itself.)
This is wrong. PINs haven't been stored on the card for a long time (I'm not even certain they ever were for all cards). You can easily check this yourself with a relatively cheap reader, or you can build one yourself.
Microsoft Drops Windows 7 E Editions
Not only that but they can make web tools Live/Bing/Hotmail work best with their browser - influencing users of those tools to almost be forced to to use IE.
They've already been bitten by that one. They blocked all browsers except IE from accessing MSN.com. After two days of people making noise about it they let everyone view MSN again.
Did they learn? No. Less than two years later they served a stylesheet to Opera (and only to Opera, other browsers received a working stylesheet and IE had its own) that deliberately broke the display of the page. They served Opera the IE stylesheet, which displayed fine, after some more complaints.
I don't think they'd dare try again with how closely the EU is monitoring them now.
Microsoft Drops Windows 7 E Editions
They may not run on the native OS, but it seems that you could get quite a number of packages to run on the system using the NetBSD VAX port.
Censorship Struggle Underway In Iceland
It was 500 billion in Icelandic currency (krona), not 500 billion euro or USD.
According to xe.com:
500,000,000,000.00 ISK = 3,904,722,881.3900 USD
However, the wikileaks summary says "45 million to 1250 million euros". I haven't read the post that the GP links, except to check the currency type, to find out where it gets the 500 billion number.
Ridley Scott Directing Alien Prequel
And what exactly crewed the original ship?
Space Jockeys. A film about them would be awesome.
HTML 5 should support ...
Because that leads to exactly what we have now...using Flash for video. And a private company isn't going to cater to every niche platform/architecture.
Also, it's still left to the browser to implement. What specifying a format in the HTML5 standard does is allow the browsers to actually implement the feature since it gives them something concrete to reliably settle on. With HTML5 in all the major browsers, webmasters will then know they have another option that is widely available. This allows them to switch their video over to Theora|H264 and using the VIDEO tag, without worrying about isolating any users and knowing a wider array of devices will be supported.
As it stands now, for most web video you have to hope Adobe cares about your particular OS/Platform enough to cater to it (or that your platform will even let you use it, a la iPhone) . With an alternative standard implemented then all you have to worry about is if your browser, of which there are many to choose from, supports HTML5. There is no worrying about a private third party plugin that also comes with a fair amount of security holes.
For those interested: http://www.cl.cam.ac.uk/~rja14/book.html
And a link straight to the book: http://www.cl.cam.ac.uk/~rja14/musicfiles/manuscripts/SEv1.pdf
Quote from the author:
My goal in making the first edition freely available five years after publication was twofold. First, I wanted to reach the widest possible audience, especially among poor students. Second, I am a pragmatic libertarian on free culture and free software issues; I think that many publishers (especially of music and software) are too defensive of copyright. (My colleague David MacKay found that putting his book on coding theory online actually helped its sales. Book publishers are getting the message faster than the music or software folks.) I expect to put the whole second edition online too in a few years.
I have a hard copy of this, and while I've only read a select few chapters I have to say I enjoy the book. Definitely recommended to anyone who has a interest in any kind of security, be it information security or anything all the way upto securing a nuclear missile.
Yahoo's "Chicken Coop" Data Center Design
...people can be logged into iGoogle, and still block adsense and all the other crap they disapprove of.
Sure, AdSense on other sites might be blocked but anything you do on their servers while logged in is easily logged on their end.
On Realism and Virtual Murder
The source is cited but apparently you couldn't be bothered so here you go:
And here's an article that talks about it: http://www.historynet.com/men-against-fire-how-many-soldiers-actually-fired-their-weapons-at-the-enemy-during-the-vietnam-war.htm/print/
In a squad of 10 men, on average fewer than three ever fired their weapons in combat. Day in, day out - it did not matter how long they had been soldiers, how many months of combat they had seen, or even that the enemy was about to overrun their position. This was what the highly regarded Brigadier General Samuel Lyman Atwood Marshall, better known as S.L.A. Marshall, or 'Slam,' concluded in a series of military journal articles and in his book, Men Against Fire, about Americaâ(TM)s World War II soldiers. Marshall had been assigned as a military analyst for the U.S. Army in both the Pacific and Europe. The American, he concluded, comes 'from a civilization in which aggression, connected with the taking of life, is prohibited and unacceptable... The fear of aggression has been expressed to him so strongly and absorbed by him so deeply and pervadingly - practically with his mother's milk - that it is part of the normal man's emotional make-up. This is his great handicap when he enters combat. It stays his trigger finger even though he is hardly conscious that it is a restraint upon him.'
In Canada, No Expectation of Privacy On the Net
For things in plain view. As in things they can see through your windows. For instance, if they see a pound of weed on your passenger seat then it's fair game.
They can't search the inside of your car or make you open the trunk. That is, unless they suspect you of a crime and are going to arrest you or if you let them (which you don't have to). But in that case they won't ask and they'll just search the car while you're handcuffed in the back of the cruiser.
I realize that means nothing when you're dealing with a cop on a power trip that's willing to lie on a final report. It is good to know though when dealing with most cops, especially the one's who can get very demanding and try to intimidate you.
Ad Networks the Laggards In Jackson Traffic Spike
I think my post may make it look like I'm running a *nix variant, but I'm running Windows. My firewall is set to allow any local network connections out of convenience. I hadn't even thought about blocking port 80 before and if I were just starting to use the hosts file to block ad servers that would be the best way. As of now though, I've come to like the logging part (and my firewall wouldn't make as detailed logs) and will be keeping this setup until I grow bored of the logs.
unfasten has no journal entries.