Simon Willison’s Weblog

Subscribe

Quotations

Filters: Sorted by date

If the big four music companies would license Apple their music without the requirement that it be protected with a DRM, we would switch to selling only DRM-free music on our iTunes store.

Steve Jobs

# 7th February 2007, 2:26 am / steve-jobs, drm, apple

There's an unfortunate side-effect to altogether eliminating the sub-domain name from your site URLs [...] Every cookie you may want to set for that site will automatically "bleed" down to all sub-domain-based websites you might want to add later.

Már Örlygsson

# 6th February 2007, 12:01 am / urls, cookies

As ICD head analyst Walter Dickweed put it: "Releasing a new kernel on Superbowl Sunday means that the important 'pasty white nerd' constituency finally has something to do while the rest of the country sits comatose in front of their 65" plasma screens".

Linus Torvalds

# 4th February 2007, 10:33 pm / linux, funny, linus-torvalds, superbowl

If you found a hole in software that millions of people use, and is very high profile, you can sell that to the highest bidder for perhaps one or two million dollars.

Jacques Erasmus

# 4th February 2007, 7:06 pm / bbcnews, hacking, security, blackmarket, exploits

Nowadays, security guys break the Mac every single day. Every single day, they come out with a total exploit, your machine can be taken over totally. I dare anybody to do that once a month on the Windows machine.

Bill Gates

# 2nd February 2007, 6:01 pm / bill-gates, windows, macos

At some point in the past rolling out an application to 300,000 people was the pinnacle of engineering excellence. Today it means you passed your second round of funding and can move out of your parents garage.

Joe Gregorio

# 1st February 2007, 11 am / scaling, joe-gregorio

Flickr users are marked as such in the Yahoo user database. What this means is that the account is permanently protected from deletion, even if you cancel your SBC-Yahoo DSL and even if you never check your Yahoo Mail (if you elect to have one). Both free and pro accounts are protected. And your Yahoo signon name will not be displayed anywhere on Flickr -- your existing Flickr username will stay the same.

crawl on MeFi

# 31st January 2007, 10:27 pm / flickr, yahoo, metafilter

Two hosts are considered equivalent if both host names can be resolved into the same IP addresses [...] Note: The defined behavior for equals is known to be inconsistent with virtual hosting in HTTP.

java.net.URL documentation

# 31st January 2007, 9:13 pm / funny, horrifying, java

It's still a privacy concern. If, for example, I work at and post from Microsoft all day and my identicon is that of the MS Proxy Server then I would be able to identify other mefi users who are my co-workers because our identicons would match.

vacapinta

# 29th January 2007, 4:12 am / identicons, privacy

Web Services based on SOAP and WSDL are "Web" in name only. In fact, they are a hostile overlay of the Web based on traditional enterprise middleware architectural styles that has fallen far short of expectations over the past decade.

Nick Gall, VP Gartner

# 27th January 2007, 1:55 pm / gartner, web-services, soap, wsdl

We're the largest domain registrar in the world, and my view is, for $8.95 its not okay for somebody to come and use our services to harm other people.

GoDaddy spokesperson

# 26th January 2007, 10:20 am / godaddy, dns

The basic concept here is given the ongoing dramatic drop in the price of bandwidth and hardware, they cost very little. I looked at the bandwidth bill for Wikipedia, for instance, and it is actually substantially lower in the last year than the year before, despite traffic growing by a factor of 4.

Jimmy Wales

# 25th January 2007, 2:02 am / jimmywales, bandwidth, mooreslaw, wikipedia

Which is the real explanation of where the name XMLHTTP comes from- the thing is mostly about HTTP and doesn't have any specific tie to XML other than that was the easiest excuse for shipping it so I needed to cram XML into the name (plus- XML was the hot technology at the time and it seemed like some good marketing for the component).

Alex Hopmann

# 24th January 2007, 8:48 pm / ajax, xmlhttprequest, marketing, xml

We have a unique opportunity with phishing and OpenID. OpenID can make the possibility for bad things to happen from phishing that much worse. However, having an OpenID means you create a more intimate relationship with your OpenID provider. You go there everyday. You will more likely know when something is wrong.

Scott Kveton

# 24th January 2007, 3:02 pm / scott-kveton, openid, phishing

You need to lay out the user interface components visually, by hand, with total control over where they go. Automated LayoutManagers don't cut it. A corollary of this is that you can't move a UI layout from one platform to another and have the computer make everything fit. Computers don't lay out interfaces by themselves any better than they can translate French to English by themselves.

Jens Alfke

# 22nd January 2007, 9:41 pm / usability

The way you make users understand your program model is with metaphors. When you make things look, feel, and most importantly, behave like things in the real world, users are more likely to figure out how to use the program, and the app will be easier to use. When you try to combine two very dramatically different real-world items (email and appointments) into the same kind of thing in the user interface, usability suffers because there’s no longer a real-world metaphor that applies.

Joel Spolsky

# 22nd January 2007, 9:26 pm / usability, metaphors, joel-spolsky

I can also sum things up for you even more succinctly:

  • users are task oriented, driving to complete the goal the
    quickest way possible
  • users pay more attention to the content area than the browser chrome
  • users don't understand how easy it is to spoof a website

Mike Beltzner

# 19th January 2007, 5:33 pm / openid, phishing

As software architects, power consumption is now squarely in our camp to manage. There is plenty we can do to improve the quantity of power our data centers consume. [...] This is not just a hardware problem any longer.

Dan Pritchett

# 16th January 2007, 8:20 am / dan-pritchett, power

Five things you may not know about me: 1. My PIN number. 2. The root password for my computer. 3. Where I put the front door key. 4. My sexual peccadillos. 5. What I’ve got in my pocketses.

Jeremy Keith

# 15th January 2007, 11:44 am

The JavaScript alert(), confirm() and prompt() functions in Firefox, Opera and MSIE (but not Safari) will truncate the message after any null character. So an unsuspecting programmer who inserts user-provided text into one of these dialog boxes opens up an opportunity for the user to rewrite the bottom of the dialog box.

Neil Fraser

# 13th January 2007, 12:28 pm / security, javascript, neil-fraser, firefox

Mac OS X and OS X are not the same thing, although they are most certainly siblings. The days of lazily referring to "Mac OS X" as "OS X" are now over.

John Gruber

# 12th January 2007, 10:29 am / iphone, john-gruber, apple, macos

Apple doesn't give a damn. Steve Jobs doesn't build platforms, except by accident. He doesn't care about your thriving metropolis. All you independent Mac developers: you're all sharecroppers, and your rent just went up. Way up.

Mark Pilgrim

# 12th January 2007, 9:51 am / open-source, iphone, sharecropping, steve-jobs, apple, mark-pilgrim, macos

In fact Django reminds me a bit of the character in Airplane who always answers the "what do you make of that?" question literally... "Why, I can make a hat or a brooch or a pterodactyl..."

Scott Gilbertson

# 10th January 2007, 11:17 am / django, airplane

If you are subject to an XSS, the same domain policy already ensures that you're f'd. An XSS attack is the "root" or "ring 0" attack of the web.

Alex Russell

# 8th January 2007, 10:48 pm / xss, security, alex-russell

With this much storage, you can imagine filesystems in which files are never deleted and files are never rewritten. The filesystem never forgets. Such systems could be much more reliable than the systems we use today which are based on the assumption that storage is a constrained resource.

Douglas Crockford

# 8th January 2007, 7:04 pm / storage, douglas-crockford

If your average iPod weighs five ounces with packaging, then Apple has moved about 21,875,000 pounds of them, equivalent in weight to 1,325 full-grown male African elephants, 35 times as many as Hannibal's force.

Paul Ford

# 8th January 2007, 1:46 pm / ipod, hannibal, paul-ford, apple

The server understood the request, but is refusing to fulfill it because you're coming from digg.com and the proprieter of this system is frankly terrified by you people.

Ryan Tomayko

# 7th January 2007, 10:34 pm / digg, funny, ryan-tomayko

Why don't we have a .bank or .bank.country_code TLD that's regulated by the same people that regulate the banks themselves?

Dean Wilson

# 7th January 2007, 10:22 pm / dean-wilson, security, phishing

Seems easy to me; if you want to serialize a data structure that’s not too text-heavy and all you want is for the receiver to get the same data structure with minimal effort, and you trust the other end to get the i18n right, JSON is hunky-dory.

Tim Bray

# 22nd December 2006, 12:47 am / tim-bray, xml, json

The good thing about reinventing the wheel is that you can get a round one.

Douglas Crockford

# 21st December 2006, 10:14 am / douglas-crockford, json