Comment High what generation now?? (Score 1) 48
I'm hoping the good professor was simply misquoted, shouldn't that read "high waste-heat generation"?
And could they perhaps check that SRC isn't called SCR when quoting him?
I'm hoping the good professor was simply misquoted, shouldn't that read "high waste-heat generation"?
And could they perhaps check that SRC isn't called SCR when quoting him?
You have to look past the numbers, it isn't a matter of being "dead", it's a matter of weighing the cost of supporting IE6 specific code against an increasingly small number of users.
Even though your stats indicate Opera and Safari are in the same percentile for your site, they'll render standards compliant content without HTML/CSS/JS specifically written for either one.
If any of my sites had less than 10% of IE6 traffic, I'd stop supporting it officially for them. In reality, most of our B2B sites have > 50% of users on IE6 -- we'll be stuck with it for some time. Hopefully Google's impetus to kill support for IE6 can help sway corporate decisions more than Microsoft's own declaration of obsolescence.
The funny thing about that Onion piece, is the a couple years later Gillette really went and made a five-blade razor.
Score one for the onion!
7lbs 3oz, born 12:36pm EST Monday September 25th.
He is the most amazing thing I have ever seen.
Don't sweat the petty stuff, and don't pet the sweaty stuff.
'nuff said.
The wife is preggers! Gonna have a little mini-llamalicious running around the house pretty soon.
This is our first one, and I'm pretty damned excited!
That's all, just wanted to share
I submitted this a while ago for ask slashdot, so I figured I'd post it here, in case anyone who reads my journal might be an electronics geek/guru:
As I understand it, encryption works through software using a given algorithm to convert a given (readable) set of data to an unreadable form. The person encrypting has a key they could use to decrypt the data into a readable form.
Could software be written with the following functionality? I specify the jpeg I want to encrypt (say a picture of me in leather with a rose between my teeth which I use as my profile on a sadomasochism site), specify the encryption algoritm to use, specify the key, and lastly specify a decoy jpeg (say a pic of a rose).
The software then provides me with an encryped file which can be decoded to the original using the key I specified, and it also provides a key which, if used, will convert the encrypted file to the decoy jpeg.
Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (2) Thank you for your generous donation, Mr. Wirth.