I was ranting about this in another forum, but I wanted to point out that The Sam Vimes Theory Of Economics applies to ergonomics. It kills me to watch people who type 40+ hrs/wk using OEM trash when the difference between the best keyboards money can buy amortized over the amount of time you'll spend hammering on them in their working lifetime - the difference between "this is a joy to use" and "somebody please help my body is dying from the inside" - is pennies an hour.
Kuntavaalien siirrossa ei ole kyse vain tartuntamääristä vaan turvallisuuden tunteesta - ja demokratiasta.
Cintiq or Intuos?...or both? Here is a new 5min video about the two tablets I use on GNU/Linux, and also the making-of an illustration for Framasoft and CHATONS 😺
The idea that website owners have "a right" to track the clicks from their emails to you and to know everything about your journey in their system is wrong.
Imagine if you buy your child a bike - does the chain manufacturer have a right to know what time they use the bike and which friends they visit?
Of course not. We should stop pretending that websites are magical experiences that require persistent intrusion.
#Privacy is a right, even though it is far from being legally declared so.
@mhoye I read that as "Inbox Jira" and my heart skipped a beat.
(Been preparing a talk on GTD for my team at work today, so "Inbox zero" has been on my mind, too, today.)
This practice has been made illegal in Germany, it was called "Routerzwang" here, what means 'forced router use'.
They went even further and denied to give you your login data, which was only provided by the update protocol hardcoded in that router.
This practise been made illegal by law a few years ago in Germany.
And they are forced by law to give you the login data.
Hihgly recommended talk: "What We Know We Don't Know" about software development. Summary: we know almost nothing; code review in suitable chunks works well; lack of sleep, too much stress, and too much overwork ruin quality.
@n8 I'm not sure I understand: how would I focus on encryption, without also implementing decryption?
I'm planning how to implement encryption in my backup program, Obnam. Review is welcome.
Radiating opinions into the aether. Mostly one-way. All opinions are mine. I don't represent my employer. I mostly don't follow back (I'm easily overwhelmed by a flood of information).
Lars and friends