The noise indicators are nice, I would have preferred a small control to stop playing, stop recording.
Slashdot videos: Now with more Slashdot!
My server is a very nice case mod with transparent panels and blue glowing lights that sits on a shelf next to my flat screen TV. It's so cool. It screams steal me! On top of it I leave several DVDs of porn each in their own DVD jewel box wrapper with all the porn photos on them.
Of course, there are three other IP cameras pointed at this wonderfully blue glowing empty box too, each camera with motion detection and set to email pictures to my gmail account and ftp video to an external host.
I got the email too, and it used the unique email address I gave to the NY Times, so either they were breached or some company they gave my data to was breached.
Joe Katz on twitter says the same thing:
"Joe Katz @joekatz 1h
@NYTPRGUY thing is, I got a "subscription cancelled" message sent to an email alias that only @NYTimes has for me. Was your list hacked?"
So remember folks when you outsource your IT and marketing and provide them your customer data, you are opening your customers up to their low security practices.
I've been on many projects that opted for Centos over Red Hat, and some in which the CIOs demanded Red Hat over Centos. All on various perceptions of what free means and what paid for means. Sort of a Rorschach test.
If you feel strongly about this, you might ask the CIO if you folks will be open sourcing the software you write, and if not, why not.
Have you ever tried to use butterflies?
Well, not successfully. I travel back in time looking for the right butterfly, but I am colorblind, and I think I've been squashing moths.
You use an LCD Screen! Poofta!
I develop HTML5 based robotic heart surgery machines running on top of jQuery beneath AJAX served by node.js off of an Amazon mounted Rackspace Cloud written in Clojure, and I've had it with LCD Screens, CRTs, and so-called editors.
On even days I punch my code into an ASR-33, and on odd days, I just toggle the code directly into the main memory. And on transcendental days, I use very fine magnets and rearrange the domains on the hard drive.
So don't you get all hoity toity to me about your ability to code with only one screen! You're a bloody wanker is what you are!
It is currently in use at "select blogs" at the New York Times (and many other sites), and the Times says: "Apture allows readers to dig deeper into a subject without ever leaving the page. In a blog post like this, when you see a hyperlink with a small icon next to it, click on that link. You’ll instantly see related videos, maps, documents, photos, New York Times topic pages and other content, all while staying on the same page." In introducing Apture, The Times fails to mention how each and everyone one of your selections is then sent to www.apture.com, or how to just say no and opt out. You can see it at Dot Earth. Just make a selection, or doubleclick a word, and watch the roundtrip in the status bar.
There are two issues: One is breaking the browser which I think is ugly and disrespectful but I think the New York Times has the power and right to do that. Two is sending each of my selections off to a third company, which I think is an invasion of privacy that should require disclosure and opt-out. Adblock, NoScript, and Ghostery should kill Apture's scripts dead for slashdotters using Firefox, but what about Chrome/Safari/IE users and the rest of the world?"
I like this idea. If you visit a site using tynt, then you have a browser extension that crapfloods tynt with random quotes, probably taken from the site's privacy page.
I always attribute what I copy and paste. Frequently I copy more than one section out of an article separating each section within the quote with ellipses. What tynt does is add the URL to each and every copy/paste meaning I need to go back and find their little turds and delete them. Annoying. I'll do it myself thanks, and I do.
Adding that attribution doesn't mean the user will keep it there. So the site owner does little to nothing to help ensure his URL is attributed correctly by forcing tynt on us. But the site owner does annoy the good guys by doing that.
Worse, there are some reports that it sends not just what you copy, but everything you select..
And Tynt provides no opt outs. Not cookie based, not IP based, but stop it you creeps angry phone call based.
It ain't a pure useful service, and it ain't a pure privacy invasion. But I sure wish they'd go away and have had the decency to never start up in the first place. I block it on Firefox with Ghostery."
Link to Original Source
overlooked and lurking behind this gadget envy is an important regulatory decision -- one expected in weeks on whether to authorize an iPhone jailbreak.
Apple said sanctioning an iPhone operating system hack would gut its business model. That plan has given way to more than 2 billion app downloads, in addition to an expected and much-rumored iPhone-like tablet.
"This would severely limit our ability to continue what we are doing as well as innovate for the future," Greg Joswiak, an Apple marketing czar, recently told regulators considering the jailbreaking proposal before the U.S. Copyright Office.
At stake for Apple is the very closed business model the Cupertino, California-based electronics concern has enjoyed since 2007, when the iPhone debuted.
The proposal, brought by the Electronic Frontier Foundation, would pave the way for third-party apps on the iPhone -- hence turning the iPhone into a blank slate to run whatever its owner wishes. That would be a huge financial blow, as Apple earns 30 percent for every App sold from its proprietary iTunes store, Joswiak said.
The proposed hack is part of the exemption process under the Digital Millennium Copyright Act of 1998. Every three years, the Librarian of Congress and the U.S. Copyright Office entertain proposals for exemptions to copyright law.
Is there something I don't understand? I don't think unlocking a US cellphone has any additional value than an unlocked US cellphone. The phone's most value is on its original network and it's almost worthless on any other network.
All GSM is not equal. Unlock a T-Mobile cellphone and move it to AT&T and you get a degraded EDGE speed. And I assume that's true in reverse. An unlocked AT&T cellphone presumably has poor speed on T-Mobiles network.
All CDMA is not equal. A Verizon phone cannot necessarily be switched to Sprint -- my experience is that Sprint has to support that phone explicitly in its own network, including a possible new firmware load. And presumably vice versa.
And of course a GSM phone cannot be activated on a CDMA network or vice-versa.
So even if you can unlock your phone, there doesn't seem to be ANY interoperability with respect to carriers. Your unlocked phone has the most value on the network it came from, and almost no value on any other network.
So what's the point of unlocking it?
Please feel free to correct me and point out all the things I don't understand about cellphones. Cause I don't get it, and I assume it's due to my ignorance.
From Penn's Center for Bioethics:
Today, the term "mandate" is imprecise when applied to immunization. The last time the U.S. required vaccination without exception--a true mandate--was during World War I.1 Today, processes in place in the vast majority of states provide parents with significant latitude regarding whether to vaccinate their children.
Mandatory vaccination programs should be reserved for the most severe of disease outbreaks, and only after the designated State or Federal official has declared a state of emergency.