topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday November 13, 2025, 8:13 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 148 149 150 151 152 [153] 154 155 156 157 158 ... 264next
3801
General Software Discussion / Re: Wave? Good-bye!
« Last post by IainB on July 03, 2013, 09:27 AM »
Ha...IainB.  I remember that, i still have all those business process documents you sent me.  In fact, I actually did complete that project, but "they" felt all that hardcore stuff was too much.  They have just last month started training the employees on that stuff.
I think I backed-up that Wave and it is now buried somewhere in my archives.
I'm curious to know exactly what you mean by "started training the employees on that stuff". Are you at liberty to disclose it?
3802
General Software Discussion / Re: Wave? Good-bye!
« Last post by IainB on July 03, 2013, 09:19 AM »
Getting serious for a min,
We're uncovering an unstated principle of "innovative". Apparently it's NOT enough to be "innovative". But that the innovation must also be "useful".
It's a variant on the old "Pure vs Applied Sciences" argument. I *totally* bet that Google invented some new "technologies" to make Wave.
But we *didn't like it*, so "who cares what they invented, it died in the marketplace".
In some ways, that's a problem.
I quite agree that one should not condemn innovation or (especially) pure research on the basis of it being "not useful", or something. Though ever-skeptical I would never suggest that, and I did not condemn Wave - I explored it, like I would any new thing.  I explored Google Reader and found it to be useful, but Wave was not, that's all.

A research example: My late father-in-law had been an industrial chemist with ICI in Northwich, UK. During WWII he was not allowed to enlist as the work he was doing was considered too important to the war effort - they were making polythene.
He told me how the stuff had originally been discovered by accident in their labs - produced as a gooey blob, a by-product of a production process gone wrong, and they thought it was a waste product.
However, after playing about with it and doing some further research, they found they could produce it consistently, and that it had several important potential applications (uses) - as Bakelite did, for example.
A bit of history here: History of the World: the first piece of polythene

But there are big differences between "pure research", innovation, and a product marketing ß test of a hyped-up piece of prototyped software - for example, such as Google Wave (which was based on an existing software design called EtherPad). There was arguably little if anything new that seemed to come out of Wave, and, if you look, you will see that the good bits (the existing EtherPad) seemed to have been incorporated beautifully into Google Docs collaborative editing, with apparently little if any major variation from the original EtherPad. So, one could say that nothing much of any good was wasted, and as @wraith808 suggests, some of the other bits may have been recycled and found their way into (Google+) Hangouts, or similar.
3803
General Software Discussion / Re: Wave? Good-bye!
« Last post by IainB on July 03, 2013, 08:26 AM »
@IainB - I'll +1 with you on Wave. I could never see what the big deal (or even the gist of it) was with that orphan.
I've since ensconced Wave in the same gallery in my memory palace I've put Chandler, the APL programming language,  all of deconstructionist literary theory, transformational grammar, the 'new' math, and the concepts of Slavoj Žižek, Jacques Lacan and Jacques Derrida in.
 ;D
Hahaha, very droll, if a little unkind.
As for APL, yes, but I recall reading somewhere that APL had been used by Readers' Digest at one time to just about run their entire marketing operation - no?
3804
Living Room / Making the most of your Microsoft Excel.
« Last post by IainB on July 03, 2013, 07:16 AM »
EDIT 2013-07-04: Oops, sorry for the duplication. I just did a search and saw this had already been posted about by @dspelley Excel graphics?
_____________________________________
I had been intending to make a post about how incredibly useful Excel had become in the MS Office 2013 incarnation, when I stumbled upon this:
Old Japanese Man Creates Amazing Art Using Excel (Wait, Excel?)

Amazing what can happen when you let an old artist - who is ignorant of PC technology - loose with MS Excel.
"But...but...you can't do that with Excel!"
Apparently, nobody told him he couldn't, so...

And he's been doing this for about 10 years too, so it's not just Excel 2013 that had such potential use.

Other/related links:
Stunning Japanese Paintings Created in Microsoft Excel
The Excel Drawings of Danielle Aubert
3805
General Software Discussion / Re: Wave? Good-bye!
« Last post by IainB on July 02, 2013, 10:03 AM »
   Sorry to resurrect this thread, but I thought it could be useful/informative to share a brief review of its history and collect the relevant bits and pieces together, since I was doing this for myself anyway.

   Though I lamented the death of Google Reader - it was so useful and thus had a high utility value for me - I did not lament the death of Google Wave. Having given Wave  a pretty good "suck-it-and see", I found it of no real/potential use (this was after trialling it on a collaborative side project with @superboyac).

   So when Google Reader was killed off, I decided to find out what had happened to Wave, just out of curiosity. Well, in short, after being released as Open-source under the name Apache Wave and Walkaround, work seems to have halted quite soon thereafter.

   Google Wave was based on Etherpad, which Google acquired and shut down, with the Etherpad software being released as Open-source.
Etherpad was a pretty nifty and unique tool, and I have used it - or branches of it - on separate collaborative bits of document-writing. Etherpad projects are alive and well and quite active as you can see from here: https://en.wikipedia.org/wiki/Etherpad

   A perspective on what actually happened to Etherpad and Wave is covered in this summary on Hacker News, from Aaron Iba, cofounder and former CEO of EtherPad:
The strange story of etherpad
(Copied below sans embedded hyperlinks/images.)
Spoiler
aaroniba 841 days ago | link | parent
Cofounder and former CEO of EtherPad here. I appreciate your kind words about our product. Allow me to clarify some aspects of the story.

First, we knew etherpad was more than a toy. We knew people were using it for real work. We had paying customers and thousands of dollars a month in revenue. (Not a lot of revenue, but decent evidence that etherpad was more than a toy).

Second, the relationship between etherpad and appjet is much different from how you characterize it. AppJet was a failing idea. We had like no users. We had spent over a year building this developer platform and we had practically zero developers actually using it. It clearly wasn't working. We were ecstatic when etherpad took off. After etherpad took off, we shut down appjet.com and focused our entire company on etherpad. appjet.com redirected to etherpad.com. It felt great to have a product that people were actually using!

Third, we never thought the Wave product was better than the etherpad product. However, the Wave vision was pretty awesome. Lars' narrative excited a lot of people when he delivered the announcement at Google IO '09. When we met with him, we were dazzled by his vision and the team's optimism. Perhaps we were naive.

The decision to sell to Google was one of the toughest decisions I and my cofounders ever had to wrestle with in our lives. We were excited by the Wave vision though we saw the flaws in the product. The Wave team told us about how they wanted our help making wave simpler and more like etherpad, and we thought we could help with that, though in the end we were unsuccessful at making wave simpler. We were scared of Google as a competitor: they had more engineers and more money behind this project, yet they were running it much more like an independent startup than a normal big-company department. The Wave office was in Australia and had almost total autonomy. And finally, after 1.5 years of being on the brink of failure with AppJet, it was tempting to be able to declare our endeavor a success and provide a decent return to all our investors who had risked their money on us.

In the end, our decision to join Wave did not work out as we had hoped. The biggest lessons learned were that having more engineers and money behind a project can actually be more harmful than helpful, so we were wrong to be scared of Wave as a competitor for this reason. It seems obvious in hindsight, but at the time it wasn't. Second, I totally underestimated how hard it would be to iterate on the Wave codebase. I was used to rewriting major portions of software in a single all-nighter. Because of the software development process Wave was using, it was practically impossible to iterate on the product. I should have done more diligence on their specific software engineering processes, but instead I assumed because they seemed to be operating like a startup, that they would be able to iterate like a startup. A lot of the product problems were known to the whole Wave team, but we were crippled by a large complex codebase built on poor technical choices and a cumbersome engineering process that prevented fast iteration.

I'm grateful for the many lessons learned through the whole experience. And I'm hopeful that the same software engineering and product skills that produced etherpad, combined with the many valuable lessons learned through the Google acquisition, will be able to produce even better products in the future. My cofounder David Greenspan and I have both left Google, so we are not, as you say, stuck in the vortex.

If you have more specific questions, I'd be happy to provide additional clarification.
(There are comments/discussion following this, at the link.)


The announcement and presentation of Wave is caught in this YouTube video: Google Wave Developer Preview at Google I/O 2009
The players in that presentation are:
  • Vic Gundotra, Google Vice President, Engineering (apparently still with Google).
  • Lars Rasmussen, Google, Engineering Team Leader (apparently now at Facebook).
  • Stephanie Hannon, Google, Project Manager (apparently now at Facebook).
  • Jens Rasmussen, Google, Engineering Team Leader (apparently still at Google?).

Here is the transcript to the above presentation:
* Wave 2009 Presentation.txt (93.3 kB - downloaded 329 times.)

In the transcript there are a number of what I refer to as BS/buzzwords, clichés and alarm triggers, including, for example:
Word/cliché
excited
unbelievable
great
cool
[laughs]
amazing
No. of occurrences
      6
      2
      5
    10
    24
      5
3806
Living Room / Re: Peer Review and the Scientific Process
« Last post by IainB on July 02, 2013, 03:26 AM »
Taki's Magazine has a disturbing post about the demise of not just the peer review process, but of science and rational thought:
(Snippets copied below sans embedded hyperlinks/images.)
A Requiem for Science
As a science geek from way back—Andrade and Huxley were favorite childhood companions—I try to keep tabs on that side of things. This can be disheartening. To quote from that intergalactic bestseller We Are Doomed:
Scientific objectivity is a freakish, unnatural, and unpopular mode of thought, restricted to small cliques whom the generality of citizens regard with dislike and mistrust. Just as religious thinking emerges naturally and effortlessly from the everyday workings of the human brain, so scientific thinking has to struggle against the grain of our mental natures. There is a modest literature on this topic:...

...In a society such as the modern West, where intelligence is declining, where fertility trends are dysgenic, where cognitive elites enforce assent to feel-good ideological claptrap and the mass of citizenry is absorbed in frivolities, science hovers always on the edge of extinction....
3807
Living Room / Re: KPMG: Say it ain't so.
« Last post by IainB on July 01, 2013, 05:06 PM »
Hopefully, this is an isolated incident.

I'm sure it is, as the truly experienced crooks on Wall Street never get caught. This guy is just -- trying to help a buddy out -- low hanging fruit. Hell he was probably gifted to an SEC investigator by someone higher on the food chain to pay a turn-your-head-and-cough debt.

Yes, an ex-KPMG colleague of mine was overheard to say that, after the several tax fraud/corruption/malpractice cases against the global Big 5 auditors (now the Remaining 4, and of which KPMG is one), though KPMG did not change it's initials, the meaning of those initials was changed in the Articles of Association from the original "Klynveld Peat Marwick Goerdeler" to "Keep Plundering Money Greedily", so as to be more aligned with current professional best practice.

In similar vein, I heard a senior banking executive joke that, after the '80's property/financial crashes, "LOMBARD" came to stand for "Lots Of Money But A Real Dope". There were some rather more rude versions than that, I gather.
3808
Living Room / Re: Peer Review and the Scientific Process
« Last post by IainB on July 01, 2013, 08:39 AM »
On the other hand, here is what seems to be a rather tongue-in-cheek proposal to ban peer review altogether: Peer Evil – the rotten business model of modern science
3809
Ah, thanks for that. I had forgotten the TYPE command.
I knew there was some way to normalise all the encoding to the output file, but could not recall what it was.

Unfortunately, the COPY command seems to be no good in any shape or form, as there is apparently no way to force it to normalise the encoding to the output file.

What worked: for %i in (x*.txt) do type %i >> combined.txt
I have assumed it took the input files in alphabetic order - the out put looks as though it did, anyway.
3810
I was just reviewing the comments to the article in The Register - per the OP to this thread: When a country goes off the rails, why should we trust its computing systems?
I rather liked this one: (my emphasis)
Posted Saturday 8th June 2013 12:52 GMT
by Should b Working

I did enjoy one comment I saw somewhere on the interwebs (sorry can't remember where) - that the public would be much more accepting of this behaviour if the NSA gave away a browser, search engine, provided a free mapping service and hosted email.

I think that's a very good point indeed. All that would need to be done would be to formalise the shift that Google has already made from being an independent corporation to it being a department of the NSA. Problem solved.
3811
   As I have stated elsewhere in this forum, I am apolitical and do not really understand US politics.
However, I have been able to gather from my many American friends, colleagues and contacts how, in the US, one's religio-political beliefs/affiliations/leanings can be very important and seem to tend to - if not be expected to - override one's reason in any given matter.
   If, whatever the issue, how one thinks about an issue seems to be primarily dictated through the lens of one's religio-political paradigm - which would then necessarily colour one's stated views - then it may often be necessary for the individual to engage in a backwards rationalisation to justify said views.
   On the subject of the NSA PRISM surveillance leaks and associated revelations, there sometimes seems to be a general tendency to try to blame this on a particular political party/individual. Many might see this as being irrational, because it seems to be effectively abrogating the responsibility of the voters for whatever party was voted into power with whatever mandate(s) it had.
   In a democracy, you generally get what you voted for.
If you voted for (say) "the lesser of two evils", then that is what you will get - and it'll still be its evil self.

There is an interesting post on The Reference Frame blog which touches on this: Pros and cons of the U.S. surveillance program
A well as the pros and cons being interesting, this bit of the post caught my attention:
...I was sort of pleasantly surprised by the New York Times editorial

    President Obama’s Dragnet (via NewsMax)

which sort of concludes that the Obama administration has lost all credibility on this issue. The surprise is nice not because I am sure that I agree with the Grey Lady – my feelings are mixed – but because I would agree that the newspaper's approach to similar questions has been consistent throughout the Bush and Obama administrations.

Some partisans who have criticized Bush for certain things suddenly get unbelievably silent when the same things are being done by Obama but the New York Times doesn't seem to belong to this hypocritical club. ...

The current situation regarding the NSA PRISM and related surveillance seems to be, for better or worse, a fait accompli, and the surveillance seems to have become well-established and was apparently accelerated over a number of years (probably starting since before 9/11/2001), and to have gone worldwide. So maybe it's time to accept, adapt, and move on - since one is generally likely to be impotent to shove these things back into Pandora's box.
Whatever happened before was then. This is now, and if you thought you understood the situation, then what you probably don't understand is that the situation just changed - again.
(I forget who it was who said that last bit.)
3812
I was reading an article the other day on the distortion/misuse of science, when I came across a link to an explanation of what "Post-Modern Science" was, and why it is in use today. It is a different and political approach to science, and it could help to explain why the abuse/misuse of science and why the lack of rigorous peer review occurs:
Post Normal Science:
Politicized Science? An excuse to stretch facts?

The Post Normal Science doctrine comes from a 1993 paper by the philosophers Silvio
Functowitz and Jerome Ravetz (refer Funtowicz and Ravetz "Science for the Post-Normal Age", Futures, 25/7 September 1993, 739-755).

Post Normal Science is promoted as appropriate when science is complex, uncertain, and the situation involves high stakes. It may be a mistake to call it science at all, since it appears to be a method for deciding on a course of action. In Post Normal Science, the players in the scientific quest are extended beyond scientists to include an “extended peer group” and even investigative journalists. Post Normal Science might better be referred to as participatory science.” The standards of evidence are relaxed to allow anecdotal information that ordinarily would not be acceptable in formal scientific investigations.

There are problems. Take the case of the possibility of an atomic bomb in 1942. The science was uncertain  would it work, could isotope separation be performed? The stakes were high  would the Germans get it first? The circumstances met the conditions for using Post Normal Science. But there was no extended peer group and investigative journalism was forbidden . The decisions were made by a small group of politicians, military leaders, and scientists. Lesson: If the stakes are high or there are competitors, secrecy is often essential. ...
...
...Post Normal Science should be seen as a political device that can be used to push a particular policy.

Source: Article here and paper here.

As one commenter to the article mentions:
"...a distressing number of posters are using broad brush terms to challenge the integrity of the many many scientists participating in the IPCC process. This is just wrong. Remember that the politicians have the final say in the contents of the final report."

That may be a fair comment, but it does not explain why only relatively few of these "many many" scientists seem to be standing up and denouncing what manifests as a generally unprincipled misuse/abuse of science and the peer review process. It seems to be simple dishonesty.
3813
I wanted to concatenate all my MBAM (Malwarebytes) text Log files into a single text file, with a view to using the latter as a database that I could search and analyse in some way (maybe as input to a spreadsheet or DB tool).

STEPS:
  • 1. Set up a SCRAP working directory.
  • 2. Copy all MBAM Log files from their folder into the SCRAP folder - there were 87 files, ranging from mbam-log-2010-12-28 (23-38-53).txt to mbam-log-2013-04-17 (04-38-12).txt.
  • 3. Mass renamed the 87 log files to the form xnn.txt (where nn = 01 to 87).
  • 4. Concatenated all 87 filenames into one long string with a "+" sign between each filename - e.g. x01.txt+x02.txt+…
    Spoiler
    x01.txt+x02.txt+x03.txt+x04.txt+x05.txt+x06.txt+x07.txt+x08.txt+x09.txt+x10.txt+x11.txt+x12.txt+x13.txt+x14.txt+x15.txt+x16.txt+x17.txt+x18.txt+x19.txt+x20.txt+x21.txt+x22.txt+x23.txt+x24.txt+x25.txt+x26.txt+x27.txt+x28.txt+x29.txt+x30.txt+x31.txt+x32.txt+x33.txt+x34.txt+x35.txt+x36.txt+x37.txt+x38.txt+x39.txt+x40.txt+x41.txt+x42.txt+x43.txt+x44.txt+x45.txt+x46.txt+x47.txt+x48.txt+x49.txt+x50.txt+x51.txt+x52.txt+x53.txt+x54.txt+x55.txt+x56.txt+x57.txt+x58.txt+x59.txt+x60.txt+x61.txt+x62.txt+x63.txt+x64.txt+x65.txt+x66.txt+x67.txt+x68.txt+x69.txt+x70.txt+x71.txt+x72.txt+x73.txt+x74.txt+x75.txt+x76.txt+x77.txt+x78.txt+x79.txt+x80.txt+x81.txt+x82.txt+x83.txt+x84.txt+x85.txt+x86.txt+x87.txt

  • 5. Turned this string into a DOS COPY command: copy [string] /A concatALL.txt /A
  • 6. Ran the COPY command.
  • 7. Examined the output file concatALL.txt

Examination of the output file concatALL.txt showed that it was fine up until somewhere before the middle of the file, when the text became weird-looking with embedded spaces, right after the end of the content from file 34.
Further inspection of the source files showed that:
  • files 01-34 had been encoded in Windows 1252 Western European.
  • files 35-87 had been encoded in Unicode, UTF-16 little endian.

So:
  • I concatenated files 01-34 into file concat01.txt
  • I concatenated files 35-87 into file concat02.txt

The latter two files each seemed to read fine in a text editor. It was only when you tried to concatenate them that problems arose.
I then copied/pasted all the text in file concat02.txt onto the end of concat01.txt, then saved and closed the concat01.txt file. Opening it subsequently, the text read fine all the way through. Problem solved.

My question is: What approach could have enabled me to do this quicker, or with more automation?
3814
Yes, but it will probably be no laughing matter if the balloon is doubling as an NSA surveillance device - which it probably will be...
3815
I have put this here for information as something in the wider context of total communications freedom and privacy, rather than just the Internet per se.
Depressing that the evidence we now have apparently shows that reality aligns very well with what we had often presumed or suspected to be the reality, and which reality would be an understatement to call a less-than-ideal norm.    >:(
Told You So: If You Have Been Using A Centralized Comms Service, You Were Wiretapped[
Saturday, June 29, 2013
tags: Headlines, Privacy
Rick Falkvinge

Privacy:
This night, news broke that the USA’s security agencies have been wiretapping essentially every major centralized social service for private data. Photos, video conferences, text chats, and voice calls – everything. We have been saying this for years and been declared tinfoil hat and conspiracy nuts; it’s good to finally see the documents in black on white.

This night, European time,  the  news  broke  that the USA’s National Security Agency (NSA) has had direct access to pretty much every social network for the past several years, dating back to 2007, under a program named PRISM. Under the program, a number of social services voluntarily feed people’s private data to the NSA. In short, if you have been using/uploading
  • e-mail
  • video or voice chat
  • videos
  • photos
  • stored data
  • VoIP calls
  • file transfers
  • video conferencing
  • (and more)

…from any of…

  • Microsoft (incl. Hotmail et al), since Sep 11, 2007
  • Google, since Jan 14, 2009
  • Yahoo, since Mar 12, 2008
  • Facebook, since June 3, 2009
  • PalTalk, since Dec 7, 2009
  • YouTube, since Sep 24, 2010
  • Skype, since Feb 6, 2011
  • AOL, since Mar 31, 2011
  • Apple, since Oct 2012

…then you have been wiretapped, and still are.

This piece of news broke just after it was revealed that the same NSA is demanding phone records from one of the major telco operators in the USA, and presumably all of them.

In short, practically every single service you have ever been using that has operated under the “trust us” principle has fed your private data directly to STASI-equivalent security agencies. Practically every single one. The one exception notably missing from the list is Twitter (but Twitter uses broadcast messages – you shouldn’t write anything secret on Twitter in the first place).

Carefully note that this PRISM program is not unique to the USA: Several European nations have the same wiretapping in place, Sweden among them. Also, these agencies share raw data freely between them, trivially circumventing any restrictions against wiretapping the own population (“I’ll wiretap yours if you’ll wiretap mine”).

This piece of news practically detonated when it hit this night. We have been saying that this is the probable state of things for years – it’s good to finally get rid of those tinfoil hats, with facts on the table. Predictably, the social comms companies named in the NSA slides are out scrambling with statements and comments.

Google, for example, said in a statement to the Guardian: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

As a politician, what strikes me is how carefully crafted this statement is to give the appearance of denying the allegations, without doing so. It stops exactly short of saying “the presented allegations are lies”.

[UPDATE: The follow-up response from Google's CEO changes this picture completely. See the followup article. You've still been wiretapped if you've been using a centralized communications service, but through no fault of Google.]

For example, a system could be in place that continuously fed the NSA data from Google servers in accordance with the NSA documents, and the above Google statement would still be true (if Google feeds data to the NSA, rather than the NSA fetching it from Google).

Microsoft – whose motto is “Privacy is our priority”, the Guardian notes – was the first to join the PRISM program in 2007. On the other hand, that company was never trusted much, so I don’t see a lot of surprise.

What we learn from this is something that us net liberty activists have known and practiced all along: if you want your data to be private, you can trust no one with it. No one. You must make sure to encrypt it yourself. Only then can you place it in the custody of somebody else. Putting an unencrypted file on Dropbox, Google Drive, sending it in e-mail, etc., is and has been the equivalent of shouting it out to the entire world.

A system that requires privacy, but is built on the assumption on trust in a third party, is broken by design.

You can only trust systems that are built around the principle of distrusting the entire world (like bitcoin, nota bene), or systems that are physically under your control. Note that I say physically: having virtual servers “in the cloud” is not enough, for an administrator of that cloud can trivially go in and take everything you’re processing there and feed it to whomever they like, and must be assumed to do so. For the same reason, having your own servers in a rented datacenter is not enough, either: an administrator of the datacenter can give access to your computers to whomever they like. That is the reason why I have servers for this site and other sites of mine running on my own balcony:
The servers for this journalistic site, and other sites with more sensitive personal information.

The servers for this journalistic site, and other sites with more sensitive personal information, are under my physical control.

This is the reason you cannot trust Dropbox and similar services with anything remotely sensitive. If you have sensitive data, you need your own servers to store and communicate it. Servers that are physically under your control. That is why you should be running encrypted SparkleShare on your own file servers rather than Dropbox in the cloud; that is why you should be running default-encrypted Mumble on your own servers rather than using Skype; that is why you should be using RedPhone from your cellphone instead of regular voice calls.

It’s already a matter of life and death in many places on the planet. Also, do note that it may not be the laws today you have to worry about: Everything is recorded and stored, and your innocent words today may come back to haunt you 30 years down the line under a different administration.

Privacy is your responsibility. You can trust no one.

As a final note, this shows very much why pirate parties are needed – worldwide – to kick politicians who authorize these egregious violations out of office, off the coast and into the ocean. (I usually write “next state”, but people from that state always complain how people there don’t want them either.)
3816
Updated 2013-06-29: Changes to opening post aligned with latest version 0.9.37.
See details of changes in the link to the Change Log in the table.
3817
...What I was hoping for was something that could support a few different collections of RSS feeds. Something that could take three different feed lists and use them to produce a daily newspaper, a weekly journal, and a monthly magazine, all on an fully automated basis.
calibre can't do that. But it's soooo close it makes me want to scream.
But that won't accomplish anything worthwhile.
So now I'm firing up my email program and composing an extremely polite message to calibre's developer Kovid Goyal to ask what it would take to get that capability added. ...
@40hz: I had cross-linked your post on this to the Re: Calibre - e-Book (Personal Library/Document) Management - Mini-Review, and as I am in the process of updating that Mini-Review, I wondered whether you had some news/response from  Kovid Goyal. If you do, then could you please post it here? I could add it in to the update.
Many thanks.
3818
Mini-Reviews by Members / Re: Qiqqa - Reference Management System - Mini-Review
« Last post by IainB on June 28, 2013, 12:50 AM »
2013-06-28 Update: Qiqqa v55s released end of May 2013.
Release notes: per the Qiqqa blog.
  • - Premium Fields allow you to restrict your searches to ANY of the fields that you have added in your PDF BibTeX records.
  • - Qiqqa now supports the Bluebook legal CSL style.
  • - Qiqqa supports the “short form" of journal name in your bibliographies.
  • - You can refresh the Annotation Report for a PDF or jump straight to a full blown Annotation Report.
  • - Qiqqa warns about DropBox conflicts.
3819
"Shadow on the Land" was from 1968? Seems remarkably prescient.
IFS = DHS/NSA/Militarily Armed Police?

On a lighter note, there is a super little post in Googland:
Securing your WiFi network
Posted: Thursday, June 27, 2013

This post is part of a regular series of privacy and security tips to help you and your family stay safe and secure online. Privacy and security are important topics—they matter to us, and they matter to you. Building on our Good to Know site with advice for safe and savvy Internet use, we hope this information helps you understand the choices and control that you have over your online information. -Ed.
...(Read the rest at the link)
It ends with a cute little narrated cartoon video, probably for people who maybe cannot read or are deaf, that gets the message across and emphasises the need for you to use WPA2 Wifi security keys.
This little missive comes hot from the press after Google had:
  • (a) deliberately collected Wifi location data in their StreetView video vehicles - which seems to have got them into legal hot water in Germany, but, strangely nowhere else;   :tellme:
  • (b) been pretty clearly identified as a major Big Data co-conspirator in breaching Internet users' privacy/security as per the Guardian's published NSA leak details.

On reading the post and watching the vid, my amazement at the barefaced effrontery of this post was followed by the thought "Supposing they are serious? Now why would Google seem to be so concerned about our improving/maintaining Wifi security?"

Then a possible answer hit me. I've done quite a bit of work in the area of what's called "Data Quality" for corporate databases. It's a complex subject, and difficult to achieve consistently good results. Google are probably obliged to ensure the quality and integrity of the surveillance data that they gather for the NSA is not only maintained, but also improved, and one of the ways that they can do that is to ensure that it is secure at source. That way, it is validated - it has its author's indelible "fingerprints" all over it, so to speak.

The NSA have an incredibly difficult surveillance job to do, and to do it they will probably need the data to meet at least three basic criteria:
  • (i) Accessibility: Is it fully accessible, and is that access controlled by us? (Check.)
  • (ii) Timeliness: Is it timely - i.e., not delayed? (Check)
  • (iii) Data Quality: Is the source security, quality and integrity of the surveillance data certain? (No, not yet.)

Hmm.
3820
Spinoff from the Snowden thread:
"Knight to queen's bishop 3 - Snowden charged with espionage."
1. Why are they using descriptive notation?! Is that a metaphor for outdated information and thinking in this whole thing?
2. Snowden's playing White as the "first to move", right? So charging Snowden is a defensive move ... so that's ...Nc6. But what was the US's first move? 1 ...e5 headed into a Ruy Lopez or 1...c5 headed into a Sicilian?
8)
Har-de-har-har. Very droll.
3821
^^ Yes. "The Front Fell Off" is a classic. Based on a real-life event, it was good satire.

Saw this today, had to take a screenshot of it. Unintentionally funny. Must be ever so easy to do.

Weebly - website quality fail.jpg

3822
Living Room / Re: Google Reader gone
« Last post by IainB on June 27, 2013, 03:39 AM »
BazQux reader: I have been trialling https://bazqux.com/ on and off for 20 days now, and it is very impressive indeed - if anything, it's better than Google Reader.
I had been hoping one of the "FREE" readers would come up to the same sort of standard, but they don't - not even the moribund Google Reader.
3823
Interesting charts found here: How Much Physical Memory Can Windows Actually Use (or See)?
[ Invalid Attachment ]

[ Invalid Attachment ]
3824
Interesting charts found here: How Much Physical Memory Can Windows Actually Use (or See)?
[ Invalid Attachment ]

[ Invalid Attachment ]
3825
Living Room / Re: One year on with Windows 7
« Last post by IainB on June 27, 2013, 02:00 AM »
Pages: prev1 ... 148 149 150 151 152 [153] 154 155 156 157 158 ... 264next