I started in mainframe days when SO MANY PROGRAMMERS I KNEW TYPED IN ALL CAPS BECAUSE THAT WAS THE ONLY THING THE COMPILER UNDERSTOOD.
And then those people tried to use email, and thought that it was perfectly fine to write all non-programming correspondence that way. Including my brother-in-law... and you can't tell your BiL he's an idiot. Not if you want your sister to keep talking to you.
What’s curious—the least popular keys are Capslock and Right Mouse Button. Somewhere around 0.1% of all keypresses together. It’s time to make some changes to keyboards.
I've been whining about this for years. Why is it that the least-used key on my keyboard not just in a prominent position, but also bigger than most other keys? I can I invest in a real alternate keyboard with a different layout (my husband's a big fan of the Kinesis keyboards, initially to cope with carpal tunnel). But surely it's time to re-visit the standard key layout?
When it comes to training employees on data privacy, 82% of the largest organizations do tell the people who work for them the right way to handle personally identifiable data and other sensitive information. Similarly, 71% of the businesses with 1,000-5,000 employees offer such training.
However, even though smaller companies are equally concerned about the subject, that concern does not trickle down to the employees quite so effectively. Half of the midsize businesses offer no such training; just 39% of organizations with under 100 employees regularly train employees on data privacy.
Presumably, your employer cares about data security and privacy, too (if for no other reason than to keep its name out of the news). But what is it really doing to ensure that protection?
"With these approaches," NCR says,"it is possible to revolutionize the checkout process for retailers and consumers. To summarize, the process can be as simple as placing items in a cart, picking up an electronic or paper receipt, and leaving the store."
Here's how it works: "The system employs dozens of low-cost cameras to watch the customer, the customer's shopping cart or basket, and the view of visible items as the customer moves through a store.When a customer enters a store, a first camera takes his or her image that is then linked with the empty shopping cart he or she's selected, NCR says. The shopper then links a mobile phone or other payment mechanism with that image."
Think they can pull it off?
Whom computers would destroy, they must first drive mad.