Start talking to the person having a conversation as if they are talking to you. Fun times.
Further to that, with such a small user base it can be assumed that those users are zealots and would love their windows phones even if they were a piece of shit.
It is only when people who don't really give a shit about the companies behind the phones start getting windows phones that user satisfaction of the windows phone could be better determined.
Plus their sample set for the windows phone was only 20 people (ie everyone who uses windows 8 phones
Further to my previous rant. A good name for them would be SCObuntu.
It is as though they are trying to destroy the linux community.
- Lets give them a desktop experience they will hate
- Lets make it worse
- Lets threaten legal action against anyone who takes the shit we take from others and pass it off as not ours
- Lets try to screw people out of money with stuff we didn't create
The motorist chooses to speed, they are the ones taking the gamble. Perhaps the judge should blast those that are breaking the law.
I think the problem arose due to the fact that if someone links a piece of proprietary code (A) to a GPL'd piece of code (B), piece of code (A) will fall under the GPL (excluding run time linking through process communication mechanisms). It was this issue that resulted in the LGPL (library or lesser gpl) which allowed dynamic linking of (A) to (B) and not have (A) become open source.
If VLC is licensed under the GPL, then any code that Apple attach (ie, the DRM module) would result in the Apple code becoming GPL'd. This was also the essence of Mircosoft's comments on the GPL being viral.
to help the cause:
Solving problems (programming) can help improve problem solving skills.
I had been using Linux since the mid 90s and last year I dropped it as my preferred home system when I performed an upgrade and suddenly my DVB-T card stopped working properly - apparently going from 2.x kernel to 3.x resulted in my hardware being unsupported. My thought: Fuck this.
It was also around that time I had looked into hackintoshes and switch to Snow Leopard on my Dell. I've since moved to a mac book pro and enjoy the freedom that a consistent platform has provided - the fact that I can take a kernel extension written for 10.6 and have it work in 10.7 shows that it is possible to release versions without breaking compatibility - it is just that the Linux devs don't care about compatibility but always the latest and greatest.
Fake is never a reason to stop the invasion. Those who claim fake are with the "terists"
Problem with that is that the leech probably has the ability to spoof the mac. All he would have to do is capture some packets to map out all the mac addresses that have access and use any one of them that isn't currently connected.
IMO the best thing to do is contact your local police and explain the situation. Also let them know that you are prepared to work with them to catch the leech. If they agree you could set up a trap and allow the leech access then capture everything he does. Cops get evidence of what he is doing, he gets busted and you get your wifi back.
You could also print out a flyer and do a letter drop to your neighbours. They might not be aware that someone is connecting to their wifi - they might not even be aware that they have wifi.
"Your mother was a hamster, and your father smelt of elderberrys!" -- Monty Python and the Holy Grail