Just don't try native compilation!
Seriously though, I believe Ubuntu currently natively compiles all of their packages for ARM
Hah, yes, that is an accurate assumption.
Obviously straight from the hors^W MS marketing department mouth.
Probably not.
Have you never heard the argument that if Microsoft were to successfully prevent piracy of Windows, it would result in a massive worldwide adoption of Linux?
This reminds me of the time that I was shooting a BB gun in a empty coul-de-sac.
A lady about a block away called the police saying that I had a shotgun and that there were shots fired (wtf? Has she ever heard a shotgun before?). The police were not particularly friendly to me either, when four cops in two cars appeared out of nowhere with their weapons drawn.
So, it's not surprising to me in the least bit that this could have happened.
There's zero functionality derived from transparency for UI elements.
Transparency is occasionally useful when you have limited screen space. It rarely makes sense for things like menus, but every so often it's nice to have a transparent shell (for example) so that I can follow a guide from another document that is sitting behind it, instead of resizing everything or alt-tabbing between windows.
Saying that there is "zero functionality" is overboard.
When a machine accesses the site for the first time, you're required to answer extra questions (mother's maiden name type of thing); after answering these questions correctly, you can specify if you want to skip this process the next time that you try to login. After all of this, you can enter your password.
If there were a MITM, you would see these questions which you should not need to answer from your computer any more. Granted, most people would just assume that something had expired, and it was time to answer the questions again; but, I suppose if you were security-minded, you might suspect something was up.
AES-128 is in fact stonger.
Well, in some scenarios it is. The attack is a related key attack (sort of like what can be used against WEP). However, it's still quite strong. From the page:
Q.: Is this attack practical?
A.: No. Even after improvements we are still over 2^100 encryptions, which is beyond the computational power of the human kind. Moreover this attack works in a related key attack model which assumes a more powerful attacker than the single key model.
There are lots of elements used in the "Music Engine." One of those crucial elements is radio play. Another is wide-spread marketing. And still another is hiring girls to scream during performances.
I'm sorry, but unless you want to be the next Hoobastank or some such nonsense, those things are completely unnecessary.
Note you'll never see a scamming CEO or embezzling CFO in jail with murderers, rapists, and kidnappers. They have a separate prison for them.
That's not what I read...
You didn't think the tiered-pricing scam was actually going to save you money, did you? No company ever does stuff like this unless they think they can squeeze more money out of their customers.
Actually, just like your typical "sales", it can both save you money *and* make them more money. By lowering prices, they attract more sales and can end up with higher total revenue. Now, arguing whether or not they have actually lowered prices is a different story...
A list is only as strong as its weakest link. -- Don Knuth