I loved the Captain Crunch bit. For me it was clear the Stephenson really understands that geek mentality. I think he a a great author and while the endings sometimes do fall a bit short, it is always a great ride to get there.
- Make sure the everyone understands and agrees with the big picture.
- Make sure the people are invested in the end result. (this with the point above says that outsourcing is not the best solution)
- Be consistent, thorough and write high quality software. Coding guidelines and a clear process that everyone understands and follows will help with this.
- Understand that the idea is more important than the implementation, but a poor implementation can ruin a great idea.
I recently upgraded my FIOS service and they used Netflix streaming as one of the reasons that I should do it. After going from 25/5 to 50/25 I still get downgraded quality when watching flix.
The climate is changing, the evidence is overwhelming and we should be doing our best to do something about it. And guess what, if it turns out to be wrong, there is no downside to not polluting.
Sure, he hands her the remote and she shuts up
Another great feature is that you can share books by email. My Mom is a constant reader and I will hunt down books for her. I use Calibre to reformat them to
That works, but I agree that violating DNC should carry very heavy pernalties
I would consider death to be the minimum penalty.
Yes If Canada didn't have the U.S. to protect us, Greenland would have invaded a long time ago.
No, food. Human is a delicacy in some regions of the galaxy.
Why on earth would people want to jam their fingers into their screens? If it is to have some gesture based control, a much better solution is a decent trackpad, which in effect works as a proxy for the screen but in a more ergonomic location.
On Flitetest they talk about attempting this in the US, Ohio i think, and said that it was not that difficult to get FAA approval.
It seems to me that the content of an IP packet should be protected under wiretapping laws. What gives the ISPs the right to monitor my traffic. If they do have this right, do they also have the right to break or somehow spoof encrypted traffic as well?