|
Yes, that's the way I read it, too. Wrap Windows Mail the concrete boots of Edge and watch them sink together whilst the legal fees spiral. It really is a spectacularly stupid idea.
If I had any shares in MS, I'd be looking to verify the story and I'd offload them if it turned out to be correct.
98.4% of statistics are made up on the spot.
|
|
|
|
|
Oy, MS - when you let ME decide where and how to display the favorites tab then I'll think about using you. Until then, Chrome (with an extension) does the trick.
Keep your friends close. Keep Kill your enemies closer.
The End
|
|
|
|
|
Much ado about nothing; this is merely having the built-in mail program (yes, it actually exists) open links in Edge. Who uses the built-in mail program? (I suspect that the real reason for this has more to do with changes to how the mail program is written than security. In other words, they're probably making it an Edge app.)
modified 19-Mar-18 11:49am.
|
|
|
|
|
Joe Woodbury wrote: Who uses the built-in mail program?
I'd imagine an awful lot of users would. Normal people don't tend to customise machines the way that developers do.
98.4% of statistics are made up on the spot.
|
|
|
|
|
This isn't customization; I suspect most people use a mail program through their browser. This is especially true for those who also have a smart phone. (My dad is the only person I know still using a stand-alone email client for personal use--Thunderbird. Of course, he used to also print out all his emails and file them.)
modified 19-Mar-18 12:11pm.
|
|
|
|
|
Joe Woodbury wrote: Of course, he used to also print out all his emails and file them My mother in law does it too. And she was perfectly calmed when my father in law got catched by the indian spammers and they deleted the HDD.
Luckily I have managed to recover a very big % of the data, but it could have been a disaster for him. She had all important things in paper and archived.
FAZIT: Analog ways are still important in the digital era.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
While most of that is true, its these kind of shenanigans that give MS a bad name, and multi-million lawsuits under anti-trust law in the EU.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
I'm going with the flow and am using Edge, it's great for reading pdf's and epub's
|
|
|
|
|
The biggest problem I have with Edge is the lack of control.
Sometimes, I like to go in and delete individual cookies, or find one particular link from days gone by by browsing the history. Or sometimes I have to clear the SSL certs.
Basically, all the things I can do with IE.
Edge is set up for people who don't.
|
|
|
|
|
That does it.
Oh Ron, you and your big threats.
|
|
|
|
|
But Windows 7 and 8.1 PCs must still contain approved antivirus to receive post-Spectre/Meltdown patches. That's one less way to avoid Windows Update
|
|
|
|
|
Software approved by Microsoft? I don't see anything going wrong there...
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
It's one of the finest examples of Antivirus undocumented feature abuse ery I've ever seen. A lot of them were doing abusive things in the kernel that broke with the spectre/meltdown patches; and since MS not the company guilty of garbage kernel drivers gets 99.99% of the blame for BSODs they initially went with a whitelist for AV software. Hopefully next month will see W7/8 switch to a blacklist model too.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Six orbiting instruments make up NASA's Clouds and the Earth's Radiant Energy System (CERES) project and they are used to study Earth's climate and the role clouds play in climate change. "Methinks it is like a weasel. "
|
|
|
|
|
So, "send pics" instead of "send codez".
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
As we approach useful hardware, human elements of computing are becoming critical. 5-10 years away, for the next 50-100 years
|
|
|
|
|
|
Security researchers and reporters have something in common: both hold the powerful accountable. But doing so has painted a target on their backs — and looming threats of legal action and lawsuits have many concerned. "If there were no bad people, there would be no good lawyers."
|
|
|
|
|
|
At this point, the concept of DevOps should be familiar to everyone. But with the rise of cybersecurity attacks, organizations have seen the need to incorporate security into the mix. Thus, the idea of DevSecOps Depends. What was it supposed to accomplish (beyond merging a bunch of salaries)?
|
|
|
|
|
Dev Protocol is a new project that uses blockchain to give software developers a secure place to build their professional reputations. "That's the sound of the men working on the chain gang"
And women, of course.
|
|
|
|
|
Safari, Edge, and Firefox were the favorite targets that fell to white hat hackers at the world's most well-known competitive hacking competition —Pwn2Own 2018— held over the past two days in Vancouver, Canada. So, IE is safe to use again?
|
|
|
|
|
As a programmer you have a unique style, and stylometry techniques can be used to fingerprint your style and determine with high probability whether or not a piece of code was written by you. Your code gives you away
It's those switch statements - you can't get a break!
|
|
|
|
|
Impressive stuff!
It's interesting to see the dip in accuracy as the sample grows (96% for 100 devs, 83% for 600). I'd imagine that there must be a large but finite number of code style combinations and would think that that illustrates that.
I suspect that this will soon be able to spot quite a few things about a programmer. I would imagine that there are more people coding in a Jon Skeet-like style than a me-like style because more people study and learn from Mr. Skeet's code than mine. As such, it wouldn't surprise me at all, if it will be possible to say "this dev learnt from K&R" or "this dev learnt from Schildt" with a fair degree of accuracy.
Similarly, I suspect it will be possible to have a good stab at what language someone first to code in, when they started coding, what country they come from, whether they were formally taught, what kind of organisation they tend to work for and who knows what else. I guess, the most interesting test would be to see how well it can recognise someone across different languages or periods of time.
Scary if misapplied (I have visions of a KGB interrogator yelling "Come on, we know you wrote it - nobody else inverts the logic of ternary statements like that!") but I think it could give us some really good insights into the way we work.
98.4% of statistics are made up on the spot.
|
|
|
|
|
Eto.Forms has been in development since 2012 and is a cross-platform framework for creating GUI (Graphical User Interface, natch) applications with .NET that run across multiple platforms using their native toolkit. Not like Java in the 90s with custom painted buttons on canvas. Getting to be as many of these as there are JavaScript frameworks
|
|
|
|