Comment Technical details? (Score 1) 454
Does anyone have any technical details on how this was achieved?
Does anyone have any technical details on how this was achieved?
By all means use this to record sensitive information, I'll just make sure I'll be near you when you're doing it to read whatever it is you're writing.
An interesting toy, but I see absolutely no realistic widespread uses of this what so ever.
Tell your boss you can get everything renamed for $100/week
Great, there's always a capitalistic solution to every problem.
"Hello, please help me get away from this bunch of lunatics!"
'Why do you actually need to have something downloaded on your PC? The streaming idea is really the future.'"
I don't have any numbers to back this up, but surely the majority of music is listened to off line at the moment, on mp3 players etc? The whole point of portable devices is that you aren't tethered to your PC to listen.
For this to change, it needs to become much easier and cheaper for portable devices to stream music "on the go".
Orlando
The competition will I'm sure be good for Apple in the long run, and result in more interesting iPhone applications as a result. Cross pollination if you will.
Offline backups would have been enough in this case, offsite is belt and braces.
Em, or stop printing.
Using Light's Handedness To Find Alien Life
Because the heavy handed approach we've taken so far is not working?
Oh wait...
60 at the last count. But understand that these aren't mailboxes, they are addresses that point back to a single main address that I try to keep to my self.
Orlando...
I hope version 1.0 will have a decent, non-beta looking user interface.
I simply don't understand how or why people only ever have 1 email address and give it out unconditionally to anyone who asks for it. How can people live like that?
While I use these same techniques to limit spam to my email addresses, you and I are in the minority of people who have the resources, time and savvy to do this.
Without a wide-spread educational campaign I don't think it's fair to expect the average user to have the time or resources to do this, let alone even have the idea. The average user will prefer to rely on their provider supplied spam filter than mess about with 130 addresses.
Orlando..
Interesting. We avoid Sun largely because the after sales support is so bad, at least in our part of the world.
By the time we get someone from Sun to start working on an issue, the equivalent problem with an HP, Dell or IBM box has already been fixed. For me this wins the deal every time.
So, if you're not doing it for real, you are practicing
Or to put it another way, why on earth would anyone even expect me to talk to them if they're not prepared to reveal who they are?
It is not necessarily WHO you are but WHERE you are calling from that is the issue here. If I was a battered wife hiding in a refuge, but still wanted to talk to my abusive husband, I would want to know that I can call him but that he can't trace the call back to where I am calling from.
A mobile phone would solve the geographical part of this problem, but would leave the caller open to unwanted return calls. Hiding the number completely leaves the power in the hands of the caller.
If God had not given us sticky tape, it would have been necessary to invent it.