Comment 30 seconds per song? (Score 1) 57
.
What they did was cool, but they tremendously overstate the ramifications of their efforts.
How US pop music evolved, indeed.
.
What they did was cool, but they tremendously overstate the ramifications of their efforts.
How US pop music evolved, indeed.
.
Microsoft really hasn't thought this through.
I have the friggin' key (three of 'em), all valid, all legal. Yet Microsoft spit in my face. Again.
Is Microsoft admitting that the key system for unlocking Windows is so insecure that they won't just provide open downloads of the ISO?
Once again, Microsoft's DRM is punishing the innocent customer.
...Software project estimates are too often wrong, and the more time we throw at making them, the more we steal from the real work of building software...
...developers' back-of-the-envelope estimates...
From the above two quotes, it looks as if the author does not even know if too much or too little time is spent on estimates.
.
No wonder his managers are frustrating with the time estimates provided. The guy has not a clue.
...So most likely, any nursing robot would refuse to serve booze to any patient...
The title of this thread speaks about an alcoholic.
.
An alcoholic is not, by definition, a patient. So a nursing robot could refuse to serve alcohol to any patient, but that still does not answer the question posed by this thread's title.
...insecure HTTPS traffic interception
Comodo is a vendor that I [currently] rely upon for my PC firewall and my SSL certificates.
.
So, on one hand, I'm looking to Comodo to help me secure my computers and usage of my computers.
And on the other hand, Comodo is looking to install HTTPS traffic interceptors on my computers that increase the security vulnerability of my computers?
What frigging kind of security company is Comodo? Is Comodo a security company at all?
.
Maybe a more cost-efficient approach to spending the Foundation's money would be to determine how and why the bugs get into the code in the first place, and reduce their occurrence as early in the development cycle as possible.
The earlier in the development cycle a bug is eliminated, the cheaper it is to eliminate the bug.
... TC could be perfect, but if HD firmware is able to read and share passwords then clearly much more work has to be done
I disagree. Taking your point to its logical conclusion, the TC auditors should audit every computer on Earth, and all the software running on those computers.
.
That is very clearly beyond the scope of auditing TC.
I do think the TC auditors should publish a caution of some sort about ~the computer that runs TC~ but beyond that, it would be out of scope.
...our laptops are for consumers to buy crap online, and not for any kind of serious work....
Considering that Lenovo has a consumer line of laptops and a business line of laptops (the ThinkPad brand), there may be a shred of truth in what you say.
...When asked whether his company vets the software they pre-install on their machines, he said, "Yes, we do. Obviously in this case we didn't do enough. The intent of loading this tool was to help enhance our users’ shopping experience. The feedback from users was that it wasn’t useful...
It is a rare occasion when a C-level exec admits that his company has not got a clue about what its customers want.
.
Since the marketing team are usually the ones responsible for knowing customer needs, will we be seeing a change in Lenovo's executive suite soon, say a new chief marketing officer?
.
A month or so ago, I had some issues with Microsoft's Bing bot not following the directions contained in my robots.txt file. When I sent an email in to the BingBot support address, the first reply I got back was that Microsoft considered my robots.txt instructions an "ideal" not something that has to be followed.
I pushed back and finally got someone who understand the purpose of robots.txt. That person told me to put a work-around into place, probably because Microsoft had no intention of fixing their bot to follow the robots.txt rules.
What was interesting about the whole series of email conversations was that the first "person" who answered my email did not seem to be a person at all. It just felt as if I was getting a reply from a email-bot.
The email-bot had some things right in its attempt to seem human --- (*) it first tried to push my support request aside, (*) when I didn't comply with that, it effectively told me to pound sand, (*) when I objected to that, it allowed me to bump up my request to a higher tier of support.
.
Computer media are usually pretty dull, so there's nothing like a supposed battle to up the interest.
...my question: what are your most useful (and safe) browser extensions?...
The ones that have a level of quality that is on par with the browser. I've found too many extensions that are so buggy that they are useless.
And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones