Quotations
Filters: Sorted by date
If the big four music companies would license Apple their music without the requirement that it be protected with a DRM, we would switch to selling only DRM-free music on our iTunes store.
There's an unfortunate side-effect to altogether eliminating the sub-domain name from your site URLs [...] Every cookie you may want to set for that site will automatically "bleed" down to all sub-domain-based websites you might want to add later.
As ICD head analyst Walter Dickweed put it: "Releasing a new kernel on Superbowl Sunday means that the important 'pasty white nerd' constituency finally has something to do while the rest of the country sits comatose in front of their 65" plasma screens".
If you found a hole in software that millions of people use, and is very high profile, you can sell that to the highest bidder for perhaps one or two million dollars.
Nowadays, security guys break the Mac every single day. Every single day, they come out with a total exploit, your machine can be taken over totally. I dare anybody to do that once a month on the Windows machine.
At some point in the past rolling out an application to 300,000 people was the pinnacle of engineering excellence. Today it means you passed your second round of funding and can move out of your parents garage.
Flickr users are marked as such in the Yahoo user database. What this means is that the account is permanently protected from deletion, even if you cancel your SBC-Yahoo DSL and even if you never check your Yahoo Mail (if you elect to have one). Both free and pro accounts are protected. And your Yahoo signon name will not be displayed anywhere on Flickr -- your existing Flickr username will stay the same.
Two hosts are considered equivalent if both host names can be resolved into the same IP addresses [...] Note: The defined behavior for equals is known to be inconsistent with virtual hosting in HTTP.
It's still a privacy concern. If, for example, I work at and post from Microsoft all day and my identicon is that of the MS Proxy Server then I would be able to identify other mefi users who are my co-workers because our identicons would match.
Web Services based on SOAP and WSDL are "Web" in name only. In fact, they are a hostile overlay of the Web based on traditional enterprise middleware architectural styles that has fallen far short of expectations over the past decade.
— Nick Gall, VP Gartner
We're the largest domain registrar in the world, and my view is, for $8.95 its not okay for somebody to come and use our services to harm other people.
The basic concept here is given the ongoing dramatic drop in the price of bandwidth and hardware, they cost very little. I looked at the bandwidth bill for Wikipedia, for instance, and it is actually substantially lower in the last year than the year before, despite traffic growing by a factor of 4.
Which is the real explanation of where the name XMLHTTP comes from- the thing is mostly about HTTP and doesn't have any specific tie to XML other than that was the easiest excuse for shipping it so I needed to cram XML into the name (plus- XML was the hot technology at the time and it seemed like some good marketing for the component).
We have a unique opportunity with phishing and OpenID. OpenID can make the possibility for bad things to happen from phishing that much worse. However, having an OpenID means you create a more intimate relationship with your OpenID provider. You go there everyday. You will more likely know when something is wrong.
You need to lay out the user interface components visually, by hand, with total control over where they go. Automated LayoutManagers don't cut it. A corollary of this is that you can't move a UI layout from one platform to another and have the computer make everything fit. Computers don't lay out interfaces by themselves any better than they can translate French to English by themselves.
The way you make users understand your program model is with metaphors. When you make things look, feel, and most importantly, behave like things in the real world, users are more likely to figure out how to use the program, and the app will be easier to use. When you try to combine two very dramatically different real-world items (email and appointments) into the same kind of thing in the user interface, usability suffers because there’s no longer a real-world metaphor that applies.
I can also sum things up for you even more succinctly:
- users are task oriented, driving to complete the goal the
quickest way possible- users pay more attention to the content area than the browser chrome
- users don't understand how easy it is to spoof a website
As software architects, power consumption is now squarely in our camp to manage. There is plenty we can do to improve the quantity of power our data centers consume. [...] This is not just a hardware problem any longer.
Five things you may not know about me: 1. My PIN number. 2. The root password for my computer. 3. Where I put the front door key. 4. My sexual peccadillos. 5. What I’ve got in my pocketses.
The JavaScript alert(), confirm() and prompt() functions in Firefox, Opera and MSIE (but not Safari) will truncate the message after any null character. So an unsuspecting programmer who inserts user-provided text into one of these dialog boxes opens up an opportunity for the user to rewrite the bottom of the dialog box.
Mac OS X and OS X are not the same thing, although they are most certainly siblings. The days of lazily referring to "Mac OS X" as "OS X" are now over.
Apple doesn't give a damn. Steve Jobs doesn't build platforms, except by accident. He doesn't care about your thriving metropolis. All you independent Mac developers: you're all sharecroppers, and your rent just went up. Way up.
In fact Django reminds me a bit of the character in Airplane who always answers the "what do you make of that?" question literally... "Why, I can make a hat or a brooch or a pterodactyl..."
If you are subject to an XSS, the same domain policy already ensures that you're f'd. An XSS attack is the "root" or "ring 0" attack of the web.
With this much storage, you can imagine filesystems in which files are never deleted and files are never rewritten. The filesystem never forgets. Such systems could be much more reliable than the systems we use today which are based on the assumption that storage is a constrained resource.
If your average iPod weighs five ounces with packaging, then Apple has moved about 21,875,000 pounds of them, equivalent in weight to 1,325 full-grown male African elephants, 35 times as many as Hannibal's force.
The server understood the request, but is refusing to fulfill it because you're coming from digg.com and the proprieter of this system is frankly terrified by you people.
Why don't we have a .bank or .bank.country_code TLD that's regulated by the same people that regulate the banks themselves?
Seems easy to me; if you want to serialize a data structure that’s not too text-heavy and all you want is for the receiver to get the same data structure with minimal effort, and you trust the other end to get the i18n right, JSON is hunky-dory.
— Tim Bray
The good thing about reinventing the wheel is that you can get a round one.