My GMail (and Yahoo! as well) username is (first name)(middle name)(last name), all fairly common [in fact at my current employer there are multiple matches of (first name)(last name), and my father has the same (first name)(last name) as well], and I have not had this problem with either service. Perhaps using initials instead of full names is part of it; or your last-name may have different demographic connotations.
I did, however, recently have that problem with a Comcast account. When the tech visited our home for installation, he created an account (first name)(last name) @comcast.net . I didn't actually give it out anywhere, yet within a few months it was filled with a hundred or so messages for someone in another state. I did try responding to one item that seemed moderately important, and whoever got the response [the help-desk of some organization] didn't seem to grasp that I had no connection with the intended recipient. Since I hadn't advertised it anywhere, it was easy to change the username, to (my first initial)(wife's first initial)(my last initial)(wife's last initial)(string of digits) @comcast.net. While this address appears to have been reused, apparently Comcast no longer allows address reuse; I tried using a previous ID that I had used a long time ago, and it was not available.
Since you ask for advice, I recommend two courses of action:
- 1. As long as you still have access to that address, when you receive anything that is clearly misdirected and potentially of high value, deal with it politely. Don't use a "form response", instead personalize the response to the content of the message. CC the intended recipient on the response, if you are able to divine who it is. Once you've dealt with the matter, delete the whole thread. For newsletters, try following an "unsubscribe" action, if that's not available mark as spam.
- 2. Consider an exit strategy from your current e-mail address, no matter how much is attached to it. See the Google help posting "Change your username". For the new address, try a long nickname or full first name instead of first initial; or maybe add a string of numbers, a city your contacts will recognize, or a title. Give your important contacts plenty of advance notice, post the new address with the reasons you're switching [perhaps with a list of the confusing other identities as well] on your "old" Google+ profile. After a reasonable time (say six months or a year), delete your old account. Make sure you change your address at all the "various sites" you've registered at before doing so, in case you need to use a password reset function.
-take 30 seconds to a minute to load
This load-time is for the first applet in a browsing-session, not each one; and "30 seconds to a minute" is an outer figure, on a reasonably modern system it will be less. I've seen Flash-based games that took a long time to initialize, as well.
- fonts and widgets are not native and look weird
Actually, you can have native widgets, with the old AWT components; it's the (slightly newer, still around for a long time) Swing that looks the same on every platform. Whether it's "ugly" is a matter of opinion.
Now, it's true that some people never need to run applets, those who do don't do so every day, and some applets look like something from 1995 because they really were written in 1995, and still work; but the Java plugin is not totally going away any time soon, and I think it's still a good choice for applications with unusual UI requirements that need to run "in" a browser.
Applets aren't just games, either. From my current needs:
- The GIS browser for the city I live in;
- My employer's expense-submission program;
- The VPN clients (from two different vendors) for systems I access for work
And that doesn't even include JNLP (Java Web Start) programs, which aren't the same "sandbox" but which also depend on Java platform security for their sandbox.
Except that the packet already has at least an 8-byte UDP header, a 20-byte IPv4 (or 40-byte IPv6) header, and a link-layer header of some sort. There's probably some sort of checksum and block padding within those 70 bytes (which may in fact include the UDP or TCP header as well).
Similarly, VNC tunneled over SSH doesn't use 1-byte and 2-byte packets. For a certain block-size for which I did calculations and watched some real-life traffic, actual packet payloads for the different relevant messages are as follows:
- SSH CHANNEL_OPEN "direct_tcp": 92 bytes
- KeyEvent (messagetype=4): 44 bytes
- PointerEvent (messagetype=5): 28 bytes
- ClientCutText: at least 44 bytes
Since there are only about 90 keys on my keyboard, that seems like a lot of wasted space per packet; but remember that just the TCP and IPv4 headers are 40 bytes, so it's only 51.2% of the IP data, and even less of the link-level data.
You will not use Facebook if you are a convicted sex offender.
If someone doesn't like that, they need to sue Facebook; this particular law did not require Facebook to add it.
Strange thing is that both domains are anonymized now, makes it hard to tell who's who in this argument:
- Domain ID:D160468854-LROR
Created On:21-Oct-2010 18:09:32 UTC
Last Updated On:01-Nov-2012 04:14:02 UTC
Sponsoring Registrar:eNom, Inc. (R39-LROR)
Registrant Name:WhoisGuard Protected
Registrant Street1:11400 W. Olympic Blvd. Suite 200
Registrant City:Los Angeles
Registrant Postal Code:90064
- Domain name: CYANOGENMOD.COM
Contact Privacy Inc. Customer 0121602432, firstname.lastname@example.org
96 Mowat Ave
Toronto, ON M6K 3M1
I should say first of all that I'm really proud of Mitt Romney, I identify with him, and I suspect he might make a good president. He was born in the state where I grew up, he's a member of my church, and he has a history of business and state-government success. Even more personally, my parents went to his father's funeral and I used to listen to his niece's talk-radio show as a teenager.