Thursday, June 29, 2006

Sure, I'm a webdesigner! I have Dreamweaver!

Take a look at this website from digg:

It is the blind leading the blind. I always hear 'Well, the client wanted it this way…' or 'The client really liked the way this was done…' - and that is it, that is the rationalization behind their lack of knowledge for building things improperly. … MANY poorly built sites that do absolutely nothing but sit there - stagnant.
The way I see it, the title should read "Sure I'm a Web Designer! I have FrontPage!" or better yet, based on what I've seen at atkda.com, "Sure I'm a Web Designer! I have the Latest Version of Microsoft Word!" When I told the guy who desinged it (he's being payed, by the way) that it wasn't working in my Browser (Firefox), he said "Well I tested it in Internet Explorer [XP] and AOL, so it should work..." A lot of people in NJ don't know how to desing websites. I curious to see what Jake Jarvis thinks of this...

Tuesday, June 27, 2006

From the weird-web-site-of-the-day dept.

From the weird-website-of-the-day dept:

The standard Windows beeps you hear when you've made a fatal error can be quite irritating. This guy made it into a nice composition and manages to create a great new use for the windows sounds.

Monday, June 26, 2006

Bush has got to step down

After reading this article, I hope that all of you bush lovers will change your minds, other wise, you're treasonous!

US Representative Peter King (Republican, New York), chairman of the House Homeland Security Committee, has called the New York Times "treasonous" for informing the public about another secret Bush Administration counter-terrorist program, the Associated Press reports. "We're at war, and for the Times to release information about secret operations and methods is treasonous," King reportedly told the wire service. King has also called for the US Department of Justice (DoJ) to investigate the Times and prosecute the reporters, editors and publisher on any and all charges they can dream up.

OFFICIAL NOTICE

I'm considering moving over to a WordPress Platform. As such, posts will no longer have anything in the "link" field to make the move over to Wordpress that much easier.

Saturday, June 17, 2006

...

WTF!!!???

GamePolitics has confirmed with her staff that Governor Kathleen Babineaux Blanco (D, seen at left) signed HB1381 into law last night. Under terms of the legislation, it takes effect immediately. The bill, sponsored by Rep. Roy Burrell (D) and drafted by controversial Miami attorney and anti-game activist Jack Thompson, defines violent video games as "harmful to minors" in much the same way as pornography.

Thursday, June 15, 2006

Microsoft

Bill Gates is leaving!

REDMOND, Wash. — June 15, 2006 — Microsoft Corp. today announced that effective July 2008 Bill Gates, chairman, will transition out of a day-to-day role in the company to spend more time on his global health and education work at the Bill & Melinda Gates Foundation. The company announced a two-year transition process to ensure that there is a smooth and orderly transfer of Gates’ daily responsibilities, and said that after July 2008 Gates would continue to serve as the company’s chairman and an advisor on key development projects.

Tuesday, June 06, 2006

No Comment

Quote:

Two years ago, my wife Carol and I decided that our children's education would not be complete without some grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we'd bought, such as Adobe's Photoshop and Microsoft's Word, and my wife and I were pleased that our gift was received so well. Our son Peter was most entranced by the device, and became quite a pro at surfing the net. When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out that "Peter is a computer hacker!"
Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider. I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter. This filter is vital to any parent who wants their son to enjoy the internet without the endangering him through exposure to "adult" content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.
Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".
Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer. If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.
There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school. If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.
8. Is your son obsessed with "Lunix"? BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone. Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional. If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
No Comment.

Google Spreadsheets - A solution to scheduling issues?

Of use to your kid's sports coach, your aunt in Omaha trying to organize a major family reunion, your friend who promised to compile a list of all your favorite hiking trails (and now wants you to help), or your project team which now has a way to keep tasks and status in one place for all to see.

read more | digg story