You do realize that retail games dont count, right? So all the people with several AAA titles bought in their local store (or just somewhere else on the internet) lose their ability to for example participate in mod discussions (workshop). In some parts of the world steam prices for new games (without big sales) are extremely high compared to those in stores.
I would say some people may get annoyed due to following limitations:
>Submit content on the Steam Workshop
>Post in an item's Steam Workshop Discussions
Retail games dont give you full account, so if you buy some steam only game with a mod community (eg Civilization 5) you potentially lose quite a bit
The hardware is quite likely the problem. There are only few consumer grade gigabit routers that can handle anywhere near the max speed between internet and local network. Its slowly getting better as now most get to 600-700Mb/s (or more), but just few years ago barely anything got above 500.
My only real problems with it are that it pops up an advertising page every time you run it.
You can disable it in advanced settings ("Hide Featured Today..."). The other problem is annoying me too.
In settings, advanced tab you will find section named Origin Experience Reporting when you can uncheck "Share hardware specification" and "Share system interaction data" to get rid of most of this (or at least the part that is objectionable to most people).
from wiki (http://en.wikipedia.org/wiki/ID-based_encryption)
Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the Private Key Generator (PKG), generates the corresponding private keys. To operate, the PKG first publishes a master public key, and retains the corresponding master private key (referred to as master key). Given the master public key, any party can compute a public key corresponding to the identity ID by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ID contacts the PKG, which uses the master private key to generate the private key for identity ID.
How exactly does the attacker know the passwords expiration date?
How exactly WOULDN'T they? If the attacker is doing offline brute forcing of passwords, that means they've obtained at least a partial copy of the database for the site (since they have to have the hashes and salts), at which point it's probable that they would have also obtained the expiration dates linked to each password.
Expiration dates != expiration time of current password. If you assume some maximum password expiration time (lets say 3 months) then as long as user is registered for at lest that amount of time the password expiration date doesnt provide any useful information about it. Unless of course hacker gets multiple database snapshots from widely different days, but then the system is probably doomed anyway.
I think its quite good decision in short run, since it will kill all those weird connectors with no merit to them aside from being unique and driving charger sales for manufacturer. On the other hand in the long run its bad, since it actually hampers ("why bother if we have to put usb anyway") or even completely blocks some possible innovation (eg wirelessly charged waterproof phone with no external connections at all).
IMO the best course would be to keep this legislation for a several years (5-10) to get everyone to standardize and then repeal it. Given its EU though, I expect we are stuck with those connectors long after it will become completely obsolete...
Citing technical problems Mt. Gox said in a blog post that it needed to "temporarily pause on all withdrawal requests to obtain a clear technical view of the currency processes."
phone companies generally know this. Im not quite sure about this weird rating one - it doesnt seem to be connected with actual phone service providers.
Unlikely, since you cant get phone numbers for free. In regards to availability phone numbers are closer to IP addresses then emails (limited amount, regulation etc).
Also those numbers would quickly become 1000 ranked because of huge activity.
while phone number is unique at any given moment, it doesnt necessarily mean it stays with same person. Most providers sell the used numbers some time after they got inactive.
Good luck to the new buyer of 1000 ranked number
only if by discarded you mean droping the mail with standard mailer deamon reply "couldnt be delivered". Otherwise I prefer my spam filter to actually work, thank you.
How can a truly civilized race possibly take us as anything other than animals when we still dont worship the Great Kztplrhw and dont kill all heretics using most brutal tortures imaginable?
Thats what you meant, right?
about 2 and 3: get some normal programming language instead of provided blocks. When I played with it in college we were using some C API with it, so we pretty much had a normal language available. Obviously there were still API limitations on our hardware interfaces, but for normal calculations, delays etc we could do pretty much whatever we wanted (it was simple unix programing with some hardware api).
as for 1: yeah, number of in and out slots was always a bit of a problem. Still you can do quite a lot within those limits.