I dunno, I always get a big belly laugh whenever I log into something and see that horrible 1980s B&W X11 desktop, complete with ugly 'X' cursor.
Don't forget the stipple pattern background!
I dunno, I always get a big belly laugh whenever I log into something and see that horrible 1980s B&W X11 desktop, complete with ugly 'X' cursor.
Don't forget the stipple pattern background!
An effective slide show should not:
Be primary source of information
Exceed 7 words on 4 lines
Contain unrelated graphs and images
Discourage discussion of the slides contents
This is my example of an effective powerpoint slide. This slide while only containing 22 words should probably take a few minutes to talk about. A powerpoint of maybe 10 slides for me often ends up being about an hour long. I build in a degree of Q/A and questions directed to the audience to keep them engaged and interested in the content. A presentation should be a discussion and not a group reading exercise. Clearly these scientists are great at science, but terrible at sharing it if they can't use a slide show effectively.
Two other points
- The rate of slides shown should be approximately one per minute or slower. A presentation going for 10 minutes must max out at 10 slides. (Yes, 7 words on 4 lines on a slide to last one minute is challenging, but doable).
- Generally, use only for short presentations.
The real problem with powerpoint and slide-heavy presentations is it turns into a glorified low-motion TV. People end up tuning out and become really passive and the information starts to fly over their heads because they're really like watching a live taping of a TV show and become a part of the studio audience blindly following orders.
It's great if that's your point - you just want to present something to a passive audience (e.g., keynote speeches to show off new products, etc) where interaction is minimal, beyond "oooh"s and "ahhh"s.
But when a transferral of knowledge is required, interaction is a necessity, and passive TV watching does not lead to effective learning. There were many studies done to show the retention of information is only around 10% or so with slides. Interaction is required to fix the knowledge in the mind.
I was recently the Fiduciary, or executor, or an estate where an iPad was involved. I sent a letter, as the Fiduciary, along with my appointment papers, requesting the password, in order that a proper value of the iPod could be determined, which included the data on the iPad. Apple refused. I immediately made an appointment with the Judge of the Probate, and explained the situation. She immediately sent a letter to Apple, demanding that they supply or clear the password, or be charged with contempt of court. They sent the password. Thankfully, this is not a large area, population-wise, that this could be handled quickly. I can only imagine how difficult it could be in a large city.
And guess what? Apple is demanding that in this case!. You went to the Probate Court, the judge sent a letter to Apple (presumably confirming that the deceased owned that specific iPad and all that and to release details on the account).
And Apple complied.
In this case, the family is complaining they have to go to court to get a court order to get Apple to unlock it. No surprise, you ran into the same problem, which is why you went to the Court to see the judge.
In other words, Apple is following the same procedure with this family as what you did - the Court issued an order demanding release of the account information. Apple complied. This family didn't, and Apple requested that they get the Court to do so.
And yes, Apple is absolved or all liability should it turn out said iPad was stolen - it meant someone lied to the Court under oath and committed perjury, which generally is far worse than the few hundred bucks you get for the iPad.
If they charge to add Firefox, will they give a refund for leaving off Windows?
Yes they will. However, because the cost of the Windows license is less than the amount of sponsorship your computer gets from all the preloaded software (i.e., crapware), the price of your PC rises.
Did she bequeath the iPad or the apps/data on the iPad and the iTunes account to go with it? I'm pretty sure that even if the device is locked, that you can still do a factory reset on it and then have access to the iPad. Granted you would lose all the apps and data on the device, but you would still have the device to use as you wish.
If she bequeathed the iTunes account, then the account email and password should have been in the will or related documents, if not, then it's reasonable to assume she just left the hardware which you can reset and then have full use of.
No, it was just the iPad.
The problem is that since iOS7, Apple implemented a kill switch called "Activation Lock" in an attempt to slow down the theft of the devices - with it, the owner can remotely wipe the device, and more importantly, that device cannot be used by anyone else, thus ensuring that any stolen iPads, iPhones, etc. are rendered worthless.
What likely happened is just that - the iPad got locked and is right now, effectively worthless.
Of course, Apple has to be careful too - they can't really offer a way to unlock those devices because it's really a backdoor to Activation Lock and a way for criminals to well, steal your device and then cry to Apple to unlock it saying it belonged to their parents so they could resell it as more than just scrap.
It's really one of those catch-22 situations - Apple can't contact the original owner to verify if that iPad really belongs to them and they're not just some criminal looking to change their $0 iPad into a $400 iPad on the stolen goods market. And they can't just take those documents because well, the family could come back again next week with another stolen iPad and do the same thing.
And no, Activation Lock is practically impossible to defeat - if you reset it, it'll ask for the Apple ID credentials before you can proceed. If you get an unlocked one and try to restore it (with Find my iThing on), iTunes refuses to do it until you turn it off (which requires the password). If you force DFU and reload, it won't work until you re=login again, etc.
It's one of those things - what can Apple do? Remember the goal is to make the illegally acquired resale value zero because a user buying it can't do anything with it. And any way for Apple to help this family can be exploited (hell, do you KNOW that the iPad they got bequeathed wasn't stolen?). Apple requiring a court order basically means the courts will have to ascertain the identity of everyone and be enough of a pain that even a thief probably won't go through that effort. Certainly not one who wants to be identified should the iThing really be stolen.
They may have a chain of evidence though - the store receipt where the iPad was purchased on a credit card, a credit card bill with the charge on it and the billing name and address which can be compared against their Apple ID account, a death certificate with the same name and address on it, a will with the same name and address, and the iPad, whose serial number will match that on the receipt. Woe be to those who bought it at a store who doesn't record serial numbers, though!
How screwed up would the project be had he not been such an "asshole" as you describe?
The truth hurts. Just because people can't handle it and get butthurt doesn't make the person an asshole for pointing out the truth.
I'd also like to know how you feel about other CEO's out there that have proven far more of an asshole than Theo could do in 20 lifetimes. He's a nice guy by comparison. Trust me.
It takes a very special person to be able to be an asshole and not alienate people. Steve Jobs is a famous example, but there's also Linux Torvalds, and Theo.
The asshole-ish nature of those people generally turns people off. However, they also have the rare ability to motivate people to doing the right thing. Jobs is an asshole, but he also managed to bring out people to do better work - he didn't accept crap if he knew it could be done better. Likewise, Linus and others are the same - they aren't afraid to call it crap.
The problem is, a lot of people don't realize that and try to emulate them by being assholes and making life miserable for everyone without any redeeming qualities. It's those qualities that allowed them to be assholes and still get stuff done, not the other way around.
The question is not how many freemium games there are, it's whether their existence is impacting the market for purchased games. In ages past shareware and freeware had the lions share of the PC gaming market (at least among every gamer I knew in middle and high school, and most of my older friends as well), for the simple reason that nobody had $30 to throw away on a game that *might* be good. Consoles were the only place that purchased games dominated, for the simple reason that there were no free games available - but everyone I knew who had a console also had a huge library of free PC games.
Well, on consoles, It started with DLC, which was innocent enough - you played through the content, they provided expansions as DLC rather than brand new games, etc.
Then some craftier ones noted that they could offer DLC on the get-go, so-called Day One DLC where you can purchase upgrades and such right at the start.
It took Android (credit belongs to Android, really) to take freemium to the next level by offering the games for free and having users buy more smurfberries or play credits or whatever, which now extends into the console world with purchased addons and all that.
And now you have Microsoft and Sony in the last gen catching up by being able to offer free games that weren't a marketing gimmick.
Nowadays, it looks like it's used to buy your way into the game - don't want to grind? $1 will get you a bunch of upgrades and gold and whatever.
Thankfully, some people get it - Titanfall, coming out next week will have no day one DLC or paid upgrades, the only DLC planned is maps.
So at least one company gets it - you don't spend $60 only to be bombarded for $20 season passes for addons the moment the game is released.
And it's such a bad problem the EU is considering motions towards telling when free really means free (with paid addons). Because a lot of mobile games are now making it such that you get a demo, pay for level 1, pay for level 2, etc.
I see stuff online that says normally an SSID is broadcast every 10mS or 100mS (10mS seems low to me). 10 packets per second isn't really a lot, although maybe once every 1 second would be less stupid. I mean when you open a directory in a file browser, it can populate with files for 2-3 seconds if it's large--your photos directory maybe. Why do we need advertisement 10 times per second?
Aside from that, idle access points--even at 100mS between SSID advertisements--don't seem like they'd degrade network too much. In-use access points will, but then we're back to not letting other people use Wifi because you want to use WIfi.
Here's something people don't realize about WiFi - besides the network backbone the access point connects to, WiFi devices on the same frequency communicate with each other too.
If you and your neighbour use the same WiFI channel or close to it, the two APs are actually handshaking between themselves at the management frame level (Layer 2), even though they're not actually on the same network, same SSID, or whatever. They're coordinating between themselves on usage.
And beacons are more than a "WiFi here!" broadcast, they're also used to help mobile stations save power by keeping the radio off longer. Inside the beacon is a bitmap that's indexed by association ID and tells if the AP has buffered packets for it. So a mobile station can on association tell an AP that it wants to check for traffic every 5 beacon times. The AP can either agree, refuse (perhaps there's no more packet memory) or negotiate a different interval. Then the mobile station goes to sleep if there's no traffic, and wakes up the receiver every 5 beacon periods to catch a beacon frame. If there's no traffic for it, it goes back to sleep for another 5 beacon times. If there is traffic, then it wakes up the transmitter and retrieves the packets from the AP buffers.
All that is contingent on the AP having enough buffer to store the packets (it knows it has to store it for at most 5 beacon periods - after that, it's free to drop them)
The other side effect is well, attempts to modernize the lowlevel management protocol have to take legacy devices into account. Even worse, all it needs is a legacy device on the same frequency. It doesn't matter that you have no 802.11b devices on your network, just having one on another network, same frequency will automatically disable any optimizations (because if they can't be decoded by the 802.11b station, there's a chance of a collision or interference).
Also what's to stop people setting up honeypot networks named "xfinitywifi", letting you right in regardless of login credentials and packet-sniffing everything you do?
Why bother going that far?
Just have them provide credentials and always forward to a "invalid password" page. They'll probably try 2-3 times or so and you'll have captured the login information.
Which you can then turn around and connect to your neighbour's AP and get internet for free.
Bonus points for using a higher-powered access point and buying a real SSL certificate.
2: Buy a device that can allow one to click some "accept" buttons and allow themselves to shoot themselves in the foot. Yes, malware can be an issue with this since full control of the device can be obtained by the user.
We had this same war in the early 1990s when TV set top boxes were poised to bring us an Internet analog, but open computers won out. Do we want to lose this victory and go back to only allowing corporate board members having the ability to dictate what we can and cannot do with -our- devices... the ones that we paid for?
I prefer option #2, and some type of speed bump, so the user can leave the walled garden, but they are alerted to the fact so they know damn well know they cannot just walk into Mordor. Right now, the Nexus line does a good job of this, because one has to do several deliberate actions to get root or developer access... something that can't just be done by accident.
Except you're ignoring the Dancing Pigs (or rabbits, or porn, or whatever) problem.
Because #2 is easily accomplished by jailbreaking on iOS as well, and even back when it was an involved procedure of over 100 steps, you could easily get Joe Average to do it if you could motivate them. (Pirated apps, "sexy cheerleaders see pic!" apps, etc). In fact, the first iOS worm came about because a ton of people were jailbreaking and part of the process involved installing OpenSSH. And they were leaving the password at default.
These people jailbreaking weren't motivated by "openness" to get them to jailbreak, they wanted to do something - perhaps some cool app or something, so they blindly followed all the steps, including downloading and installing an SSH client on Windows, so they could have the cool app.
It turns out that Android permission lists, steps to allow non-market binaries, etc., are no match. I mean, you can trust Amazon.com to not screw you over, or Humble Bundle. I mean, there's nothing wrong with leaving that unchecked, after all, Amazon and Humble Bundle need it, so it's safe, right?
And there you go - roadblocks are levelled. Joe User, in an attempt to get Amazon's free app of the day, or spending $5 on an Android game bundle, will now disable the very protection that keeps him safe. All his friends need to do is show him some cool app and send it to him and he'll blindly install it. (I'm actually surprised this hasn't really happened yet - remember all those Windows worms that inspected your contact list and sent themselves to everyone on them? It only takes a little brainpower to see how malware could easily do the same over SMS or something).
Essentially all of the Android malware comes from non-Google app stores, or sideloaded APKs. And with respect to the malware that does manage to make it into the Play Store, F-Secure says "the Play Store is most likely to promptly remove nefarious applications, so malware encountered there tends to have a short shelf life.â
Except well, for some markets, like say, China, the only app stores available are third party ones with questionable trust values.
And that checkbox is useless because there are perfectly valid reasons why you want to install apps not from Google Play - Amazon App Store, and Humble Bundle, for instance. Legit app stores, but by using them you have to disable one of the most powerful protections Android has.
Of course, the real reason Android is exploited more is easy - it's so damn easy to install well, pirated apps. Why spend $5 on some high end game when you can download it from free from AppCake and other sites? And given how many people grab trojaned installers and keygens on Windows, people assume that cracked and pirated apps are "clean" and blindly install them.
Sure you can pirate apps on iOS, but you need to jailbreak or find someone to do enterprise signing for you. Though with Apple buying TestFlight (one of the largest ways to "beta" test or test-sign apps) I guess Apple might crack down on users who use it just to sign cracked apps. Either way, it's a step up in difficulty. Though, for some peculiar reason or other, no one has tried to trojan a cracked app for iOS. There are iOS worms that exploit the fact that people blindly install OpenSSH and don't change the pasword, but cracked apps on iOS oddly haven't been trojaned. There's certainly no reason why they can't, but given how long iOS piracy has been around, it seems unusual.
By stealing so much from these exchanges that they end up closing... they are just destabilizing the currency and cause the price of bitcoins to plummet. Any hacker doing this for profit is likely quite retarded.
Why? I mean, so what if it plummets? The guys who got this exchange ran off with over half a million dollars. Without being traced to their real identities.
Even if it plunges to half its value, it's still over a quarter million dollars. Not bad for what's involved, really. There's very few other crimes you can do that'll gather that much return with very little risk - most physical attacks run real risks of getting caught. Once the BTC is in their wallets, they're home free - they just need to cover their tracks (maybe).
Hell, robbing a bank generally only nets you a few thousand dollars and an extreme risk of getting caught.
Stealing credit card numbers works, but it's a LOT of work selling them and the potential of getting caught is high.
Stealing BTC, even if it depresses the price, is far quicker, less risky and there are many ways to launder the BTC.
Ok, I don't understand how bitcoin works, but ultimately they're just encryped hash files on a disk, right? So unless the other person spends them before you do and you have a backup, how can they be stolen?
Thing is, "spending" in bitcoin basically equates to "transfer X BTC from wallet Y to wallet Z". Which can be done by anyone at any time as long as they have access to the key to the wallet.
So all the crooks do is transfer the balance from the wallet to their own and wait for it to appear on the blockchain to confirm it. Most likely, you won't notice in time and it's locked in. Once it's in the blockchain, it's too late.
When I recruit people, having a Facebook profile at all is typically a negative thing. Not enough to disqualify them for a position, but they better make up for it in some other way. If the person has no social media accounts traceable to them, then it's a huge plus.
And yet, having a FB profile is generally required if you're security conscious, because you cannot control what your friends do otherwise. Don't want to be tagged? Well, unless you have a profile, you can't block it! Etc. etc. etc.
So yes, I have a FB profile. I hardly ever log into it (maybe once every couple of months when FB updates their security settings). I don't post anything on it and all I have is minimal. Hell, you can find out more about me from my LinkedIn than my FB. (I also have only 7 friends, and about 10 on the "please add me" list that I haven't decided what I wanted to do with).
I'm not really sure what the iPhone introduced that was new? Maybe virtual game distribution (software-only, no cartridges) and online sales (App Store)?
PalmOS devices had software apps long before the iPhone. The only thing that the iPhone has going for it is that it was kissed by Steve Jobs.
Well, the iPhone was the first usable smartphone for the masses. It didn't have an App Store other than web apps (remember those?). You went to a web site, then you simply tapped an icon to add it to your homescreen which was really a glorified bookmark.
Now, what it REALLY had was a kickass HTML engine - mobile phones in those days had crap for web browsers - the "best" was Opera Mobile, a $30 app if they had it for your phone (and by best, I mean, actually does a half-decent job of rendering it like on a computer). Everything else was like WAP or rendered like Mosaic in today's world. But the iPhone featured Webkit, which was the same as the desktop renderer, giving you a desktop-like browsing experience with support for modern standards.
That was the iPhone's claim to fame - it was a phone, an iPod, and an Internet communicator. (The latter referring to the web browser).
Of course, the App Store came a year later. And it was popular because it was ultra-convenient. You could browse and get apps on the go. PalmOS, Windows Mobile, Symbian, etc., they all required you to go to a computer, browse some third party website, then purchase the app which you downloaded to your hard drive (heaven forbid if the website refused multiple downloads). You then ran the installer app to mark it for installation and then forced a sync with your drive where the app was installed. Repeat for every update, too.
Apple simply made it so the user could do it all without involving a PC and on the road - just browse the app store, tap Purchase, and it's downloaded and installed automagically. And re-downloads are allowed always, and updates were semi-automatic.
Later Palms added the ability to have an "app store" that was merely a bookmark to built in web browser. Depending on the store, you could download the raw PDB file and have it install. Maybe.
The difference between a career and a job is about 20 hours a week.