It will require our undivided attention.
Don’t worry, DRM-ed content isn’t recorded, so big companies’ IP is protected.
A few things to note here. It is comparing deuteranomaly to protanopia. The first is anomalous trichromacy, the latter dichromacy - meaning the first type has all three cone types but one is malfunctioning, the latter is completely missing a (different) cone type. So this is not really a good comparison.
Second, as far as I know, no good anomalous trichromacy simulations exist. They all work by (usually linearly) interpolating between normal vision and dichromacy, but this is not supported by empirical evidence.
Third, this does not seem to take into account the lightness differences caused by missing cones.
Finally, while there are multiple types of “total colourblindness”, most if not all suffer from severe acuity problems as well, and usually many other vision problems. The final picture is very unrealistic.
Source: several years of an amateur’s interest in the topic.
What happened to Lord Buckethead?
Pff, with traffic jams you can do that without ever leaving Brussels.
He was using a decimal comma. The counter offer was 1000 times more than he wanted to pay.
I didn’t count them, but wired itself has a very impressive list of “partners” in their cookie disclaimer too.
Should’ve brought a shrubbery.
“This button turns on the light in the hallway. Sometimes it brings the whole house down on you, but we haven’t found a way to reliably reproduce this. If that happens just crawl from under the rubble, rebuild the house, and try again. This time the light should turn on.“
“Oh, and send us the log messages.”
10 years ago is giving Apple too much credit. They were using Intel processors then, ARM now. For now, you can still run Intel applications, but that won’t last much longer.
More importantly, a 10 year old application is likely to use Carbon instead of Cocoa. Unless it’s an extremely simple application (i.e. hello world), it is unlikely to run.
Then there’s the depreciation of resource forks, a new filesystem, tons and tons of extra security restrictions, etc.
The points made in the article are that server admins should have policies regarding privacy and data retention, that users should be aware of this possibility, and that developers should ensure more of the users’ data is encrypted at all times.
Breeding mosquitoes should help attract them.