English being a de facto international language, as has been thoroughly pointed out, might be something to start with. Simplified Technical English, http://en.wikipedia.org/wiki/S..., is used by various government agencies to remove some of the ambiguity of English. While it and similar efforts may or may not be sufficient as an everyday language, it is an idea to consider.
I have been with GoDaddy for over 10 years now. I have quite a few domains registered with them and a CentOS 6 Linux VM, which I ssh into and do pretty much whatever I want. I haven't had any problems with them at all. Not to say that problems don't exist, just that it is possible to have a good experience with GoDaddy--I have also only called their support a couple times in the last 10 years, so that might be part of the reason for the lack of bad experiences.
I also agree about having hosting services with a separate provider for all of the reasons given here. Yea, I am breaking that rule, but the VM hosting was an afterthought and just something to play with.
I haven't gone through them myself, but does anyone know how Khan's videos are on Physics and Astronomy?
The IRS told Congress Friday it cannot locate many of Lois Lerner's emails prior to 2011 because her computer crashed during the summer of that year.
Wow! I didn't know the IRS had personal email servers on every individuals personal computer, where all copies of a persons email sent and retrieved is kept and deleted from everywhere else.
The rest of us just use shared central email servers where multiple copies of everyone's email is kept, backed up daily. Boy, are we out of touch with reality!
"Since the opposing side is so badly misinformed, those of us who want the internet to remain open to innovation and freedom of expression have to help educate them before the debate can really be held."
HA! That will never happen.
reported: "the breach affects more than 22,000 people"
reality: More that 60,000 people are potentially victims, the University has no idea how many are affected, the 20k figure is just their current guesstimate.
reported: "Individuals [affected] have been notified or are in the process of being notified"
reality: Again, the University doesn't know whose data was stolen, they only know the year and employee type. They have no way of actually contacting the vast majority of affected individuals in a timely manner (think every TA, RA, and work-study student at all four state campuses in 2004).
reported: "hackers had a chance to lift the names and Social Security numbers"
reality: The University has no idea what data was stolen. The hacked application wasn't even supposed to show or utilize SS data, but the hackers manipulated the queries to pull additional information. Every piece of information available to the University on those individuals was exposed, the SS data is simply the part they know was stolen.
Now all of this leads me up to my two-part Ask Slashdot:
(1) Is there any actual mechanism to protect your credit? So far as I can tell the methods suggested in the links are pointless nonsense. Any half-bright criminal will know to either use the information immediately, or wait a year or so until the free 90-day 'fraud alert flag' expires. After that a person has to pay an extortion fee to the credit agencies to keep the flag active.
(2) People often go on and on about how it's an individual's responsibility to protect their personal information, but how on earth can you protect yourself from the whims of a halfwit admin years down the road? IATS has a long history of raging incompetence, this certainly won't be the last time they compromise my information.
According to the article: "Once the cells have been without oxygen for more than five minutes, they die when their oxygen supply is resumed. The cellular surveillance mechanism cannot tell the difference between a cancer cell and a cell being reperfused with oxygen. Something throws the switch that makes the cell die."