But if they are not resolved by January 20, Trump’s administration will be in charge of handling this case. So a federal government run by Trump will have to decide how hard to push the bank that Trump owes so much to and that has been critical to Trump’s personal fortunes.
Read the whole article on Mother Jones, please!
»Essentially, when you give someone a telephone number, you’re giving them direct access to your attention. […] And you’re giving them the implicit permission to interrupt you, any place and at any time.« – Petro Salema, beyond tellerrand 2015
This is also the reason many developers hate to get phone or Skype calls out of the blue.
Just move the Office apps to the trash. If you have something like Hazel watching your trash, it will find most of the related files. It only missed some weirdly named folders in
~/Library/Group Containers/, but Microsoft has a document describing how to find them.
Neil Young on Facebook:
It’s about sound quality. I don’t need my music to be devalued by the worst quality in the history of broadcasting or any other form of distribution. I don’t feel right allowing this to be sold to my fans. It’s bad for my music.
Well, that’s bullshit. Apparently Neil Young always had crystal clear radio and never sold his music on cassette tapes. And surely, money and his relationship with PonoMusic has nothing to do with this at all.
»That woman is a hero.«
»I’m speaking to you from Silicon Valley, where some of the most prominent and successful companies have built their businesses by lulling their customers into complacency about their personal information,” said Cook. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be.«
From Verizon’s 2015 Data Breach Investigations Report (DBiR):
Before we get too far, let’s just get this out of the way now — Android™ wins. Not just wins, but Android wins so hard that most of the suspicious activity logged from iOS devices was just failed Android exploits. So while we’d love to compare and contrast iOS to Android, the data is forcibly limiting the discussion to the latter. Also, the malicious activity recorded on Android is centered on malware, and most of that malware is adnoyance-ware and similar resource-wasting infections.
It will take years and years to repair the damage, and it is absolutely devastating to the serious study and application of the power of games to real problems.