#with presumably less money and running on identical hardware
Explore tagged Tumblr posts
Text
can we really expect this multibillion dollar game dev to learn to make multiple types of 3d models. really makes you think.
#guys this is not it. look at Any Other Video Game.#there is no world in which Using Other Body Types In Their Models is outside of the technical capabilities of mihoyo#i know pretty much nothing about dislyte but it sure seems to me that theyre capable of making unique models for their characters#with presumably less money and running on identical hardware#what are you people talking aboutttt
103 notes
·
View notes
Text
Avoiding Scams on Freelancing Sites
Hi there! I almost just got scammed today, and I’m going to take the LITTANY of red flags from this interaction and use it to teach you all about how to avoid scams.
I am not making very much money right now. I just lost one of the accounts I was writing for, so I am not not even making enough to pay my rent. So I am desperately looking for work. And, like many people desperately looking for work, my panicking subconscious is willing to see a red flag and brush it under the rug because
“I’m probably being paranoid.”
So, to all of my lovely artists, writers, editors, and other types of freelancers who are desperately looking for work, I would like to create a comprehensive list of things that you should NOT FUCKING IGNORE while looking for a job. Actually, the list will be formatted as things you should expect from your employer/interviewer and if these things are missing, get the fuck out of there.
1. Reputable Platforms
The first thing you should be expecting is to use reputable platforms. If you’re being asked for a virtual interview, you should expect your interviewer to invite you via Skype, Discord, (Maybe slack if they’re middle-aged), perhaps Whatsapp, or whatever website you’re using to find your job.
DO NOT go for interviews on Telegram. This app has been reported as very commonly being associated with scams. This is where my recent experience took place.
2. Willingness to Verify Legitimacy
The first thing you should do when being in contact with an interviewer or HR is ask them to verify their identity.
This may not be necessary if doing a video call with someone pictured on an official company website, receiving emails or texts from addresses/numbers that are listed on an official company website, or if the job you’re being interviewed for was applied to directly on the company website. In these cases, you are not likely to be scammed, as you’re working with verifiably information.
If you meet someone on Indeed, Fiverr, Upwork, or any other freelancing/job site, keep your contact within the website’s chat system, email system, or whatever. This is how you remain protected under the hiring site’s TOS/Legal whatever. If you get scammed because you took your hiring process elsewhere, they will not help you.
That being said, if you DO take your interview off the site, it should be somewhere reputable and you should ask for your interviewer to verify their identity before doing literally anything else. The best way to get them to verify their identity is to ask them to email or text you from an address or phone number listed clearly on the official company website, by asking them to show you their state ID and checking it for photoshop influence, or by asking to do a video call for the interview and seeing for yourself that you’re being interviewed by someone who is pictured on the official company website as an employee.
3. Clear and Professional Procedures
Any professional working as an interviewer or human resources personnel will have a skillset related to communication and organization. When being interviewed you should expect a number of questions about your skills and how you’re valuable to the company, etc. However, this is easy to fake, as a scammer. What you need to look out for is that they show a clear amount of structure.
If you’re asked for an interview, no real company will demand you be quick about responding. If they’re interested in an interview, a legitimate company is not likely to ask you to do the interview immediately. They will ask you to schedule an interview time with them. They may ask if you have availabilities that day, but they will not just start interviewing you immediately.
After the interview, any professional company will tell you that they will get back to you when they’ve made a decision about your interview. No professional company will tell you to wait for an indefinite amount of time while they talk to HR peers. If a company Does want you to wait, because they intend to make a quick decision, they will give you an expected wait time, as that is the courteous and professional thing to do. They will not expect you to be on-call for this period of time. A time projection is simply to give you an idea of what to expect. For example, “I’ll be in touch within the next 1-3 hours about the results of your interview. Thank you for your time.”
Furthermore, if you are accepted for a job, any professional company will make a clear outline of exactly how they plan to introduce you into company life. They will respect your time and ask you to schedule things with them. For example, “Is there a period of 2-3 hours within the next few days where you would be available for an orientation?”
No professional company will demand you do anything at any particular time. That is not how legitimate professionals treat new employees. You will be asked to schedule things with them. Even when you’re assigned work hours, if the exact hours you’re applying for are not listed in the job description you applied for, they will ask you to fill out some kind of time sheet to outline your availabilities, then schedule you for times within that outline.
4. Doesn’t Show Signs of Money Scamming
There are two major red flags when it comes to money scams. Your interviewer should never ask you what bank you use and your interviewer should never ever tell you they’re going to send you a check, unless they send your paycheck as a check.
One of the more common scams at the moment is run by people pretending to be members of legitimate companies, hiring freelancers for things like proofreading and editing. These remote positions may require home office hardware, right? The interviewer will tell you you’re missing some hardware and software that are required for the job. Then they’ll tell you that they will send a check that you can cash and use to buy the required materials.
This is even sketchier if they email you front and back images of the check and tell you to print it and then deposit it through mobile banking. The way this works is that, if you cash the check successfully, you will then buy the list of software, which is usually completely unrelated to the job you’re being hired for, then they will cancel the check, which hasn’t cleared completely. That leaves you with ~$2k dollars less in your bank and their money right back where it started in theirs. Presumably, the scammers are the ones selling the software. So, that $2k dollars you just spent is also going into their bank account.
Professional companies will never offer to send you checks to buy products. If they have official hardware or software that they want you to use, they will buy it themselves and then send it to you. There is never a reason why a new hire should buy hardware or software out of their own bank, whether they have been given money for it or not.
Furthermore, a legitimate company will never ever pay you before you have signed and sent your contract to them. One of the obvious giveaways of the scam I was almost caught in was that I was sent the contract last night and I asked if I could send it in today, since it was getting late. The interviewer agreed. I signed it in the morning and then asked him if I should send it in a reply to the email I got the original contract from or if there’s another email I need to send it to. He completely ignored my question, asked me how I was doing, and then went into the check-related information so I could buy software.
The issue was bothering me ALL DAY. I knew there was something extremely weird about that, so I asked again a few hours later. His response? “You have nothing to worry about.” ?????? I was aghast. I wasn’t worried at all! I just wanted an answer! If he had simply told me to respond to the email I’d gotten the contract from, I might have fallen for his scam! What a terrible scammer smdh
A Non-Exhaustive List of Other Red Flags
Your interviewer shows a poor grasp on the language
If your interviewer is making frequent grammatical errors that are glaringly obvious to any native speaker, that is a huge red flag. HR reps and interviewers are hired because of their communication skills. It is highly unlikely that someone who makes non-native-like errors is legitimate unless they are actually openly non-native, in which case, it’s not so alarming.
Your interviewer is showing impatience or demanding you at certain times
If your interviewer is telling you to “report back by 8am tomorrow” without any kind of prior agreement that this is an acceptable time for you to meet, that is extremely unprofessional and shows a lack of patience. Scammers want to get to the meat of their scam quickly and will use an air of professional superiority and authority to scare you into moving faster than necessary.
Your interviewer shows a lack of opening and closing statements
Along the lines of the clear processes that I mentioned above anybody who is initiating you in the job you’re taking should show clear opening and closing statements. What I mean by this is: professionals in human resources or management positions will not keep you as a social hostage. If you’ve been discussing how you’ll begin training or somesuch, they will not just leave you hanging. You should have a dedicated time slot where you will have your discussion and, at the end of it, your supervisor should make a closing statement. For example, “It looks like our time is running out for today. What would be a good time to pick this up tomorrow?”
If you feel like you are “on-call” and unable to leave the room because the interviewer or supervisor keeps messaging, has not outlined a time slot for you to talk in, won’t seem to let you go, or shows no indication of stopping, that is a really bad sign. Either the company is legitimate and TERRIBLE at professionalism (a great sign you should run anyway), or this is a scammer intent on getting you to follow their instructions as soon as they can.
Your interviewer ignores time zones or gets them wrong
When I was contacted about doing an interview yesterday, it was 4:30pm. I did the interview and was told I got the job. Immediately after, without asking if I was free, he began listing off instructions and things I was to expect. It wasn’t until 7:30pm that he sent me the contract and asked me to review it, sign it, and send it back that I finally asked if I could do that tomorrow. The interviewer was supposedly on the west coast and knew that I was on the east coast. He agreed by saying “Alright” and then told me to report to him “by 8am your time.”
There are 3 things about this that are weird. The first is that he demanded I show up at 8am to continue where we left off. Any professional would have asked when I’m available the next day to continue. the second is that he said “your time” instead of saying EST, as most professionals in the US would be apt to do. And, lastly, I showed up at 7:50am, ready to continue, because I’m that desperate that I’m willing to be pushed around, and he showed up at 9am on the dot. He had gotten the time wrong. Nobody who works professionally on the west coast is incapable of adding 3 hours to their time. It was a rookie mistake, or a mistake made by someone in a completely different time zone than they say they are.
When asked to verify their identity, your interviewer attempts to reassure you or refuses
When I finally was fed up and knew this must be a scam, I politely asked my interviewer to verify his identity by either showing me his US ID or by contacting me from his email or phone number listed on the official company website. He sent me a photoshopped nametag with a completely different person’s name and photo on it and said it was the company ID of the HR director.
I have never seen a facade fall so pathetically. Why would literally any even remotely legitimate person do such a thing? It was sad, really. He deleted the message in less than a minute - no doubt to keep me from looking at it long enough to see how badly it was photoshopped - and then aggressively reassured me that the company meant me no harm and would pay for everything, etc. Any real professional would have simply sent me an email from the legitimate address, stating that they’re legitimate, and then continued on with the initiation process.
Learn from My Mistakes
I hope some of this was helpful for all of you lovely freelancers trying to find work. I thought I would know a scam when I saw one, and I did have a Bad Feeling about this whole thing, because it did feel too good to be true, but I was desperate enough that my judgement was heavily clouded, and that could happen to anyone.
Don’t ignore red flags - especially these ones. Stick up for yourself. Avoid confirmation bias. I looked things up repeatedly to confirm that the company was legitimate and that it’s normal to do things like mobile deposit a printed check and so on. Every time, I found an explanation that suited me. I even tried to cash the check. The only reason it didn’t work was because there was an error with the name on the check because I recently legally changed my name and PayPal was having some kind of issue updating in some areas of its website. It was after that that I realized this was all crashing down and I needed to reassess it all. Don’t let yourself get that deep into it.
#job hunting#job#interview#hiring#scams#advice#psa#important#upwork#freelancing#writing#writeblr#editing#ghostpost
159 notes
·
View notes
Text
Weekend Top Ten #433
Top Ten Things I Want from Xbox Series X
June is Games Month here at David’s Top Tens! That’s right, all month long we’re exploring the majesty of what we all used to call “computer games” before we became too cool. That’s because it’s the time of year when huge multinationals tantalise us with pre-rendered cinematics showcasing gaming experiences utterly divorced from what we’ll get to play. Even in this Time of Crisis (as opposed to a Time Crisis), games companies are still Touting Their Wares, and as such, I am brimming with fanboy fervour, tantalised at the prospect of Gaming Yet to Come. This week alone has seen sexy new videos from the likes of EA, Pokémon, and Sony – whose PlayStation 5 reveal gave us the best glimpse yet at exactly what the next generation could look like. I was impressed; although there wasn’t too much in the way of radically new concepts or whatever, games looked good, with plenty of sexy, shiny new bells and whistles, and it looked like environments will be bigger, more fluid, and more reactive than ever before. Plus seeing the ray-tracing in Ratchet and Clank: Rift Apart gave me serious “Quake II running on a 3D accelerator card” vibes. Suddenly I was sixteen again, getting all sticky-knickered over texture filtering and coloured lightning.
It was great.
However, I’m pretty much an Xbox-first gamer; mostly, I suppose, due to inertia, having gotten used now to how an Xbox works, to the point where a PlayStation always feels a little alien (still wanna play The Last of Us Part II, though). I’m more of a fan of the Xbox game franchises – the main reason I bought an original Xbox in the first place (way back in 2001) was to play Halo: Combat Evolved, and because of the promise of Fable. This love of Xbox games has only grown with the acquisition of Rare (despite the slight misstep of Perfect Dark Zero) and the release of games like Crackdown, Gears, and Forza Horizon. So as much as I try to be open-minded – and certainly I try to avoid any kind of partisan mud-slinging – I guess I’m pretty much in the tank for Xbox. As such, I’m phenomenally excited for Xbox Series X. I got an Xbox One at launch, and despite all of the hullaballoo and criticism, I’ve always really liked it. I think it’s kind of struggled compared to its predecessors (cult favourite OG Xbox and revolutionary Xbox 360), and hasn’t quite had the era-defining games that both of those enjoyed. All that being said, though, I’ve had loads of fun with it, and so have my wife and kids. But I’ve stuck with the same machine all these years, never upgrading to the more streamlined Xbox One S or the super-duper-sexy Xbox One X. So when I do upgrade, I think the jump will be far more noticeable than someone who’s been enjoying Red Dead Redemption 2 or Gears 5 on a 4K display; it should really feel like a new generation. And that’s before we get to all of the traced rays and other lovely gubbins.
Anyway, when it’s this time of year, I tend to do a semi-comical “E3 predictions” list, followed by a “Stuff I liked at E3” list. Obviously E3 isn’t really happening, but these other online game reveals are, and given my aforementioned excitement over Series X – and Microsoft’s upcoming and much-anticipated reveal of first-party titles – I thought I’d divert my thoughts to what I want to see on the new console. However, unlike the traditional E3 predictions of yore, I’m going to look at what I’d like from the console rather than what games I’d like to see. Partly that’s because these announcement videos are getting spread so far and wide that it’s hard to keep track of what’s been revealed or when we’re likely to see something; partly it’s because we already know quite a few Xbox games that are coming out; and partly because the list would just degenerate into older franchises I want to see come back round again. Plus, with Crackdown 3 having already happened, a new Fable more-or-less an open secret, and a new Perfect Dark being very heavily rumoured, my go-to “wants” are getting thin on the ground. Perhaps Tim Schafer can bring his old LucasArts classics to the Xbox next year…? Whatever, this time around, I’m looking at that big black box and thinking about what features and design elements I’d like to see. What could be improved from how the Xbox One works? How would I like Microsoft to leverage their assets – from the faster SSD to the power of Project xCloud? Basically, what do I want Xbox Series X to be like, outside from glittering reflections on Master Chief’s shiny armour?
Streamlined, faster dashboard: now they’ve already said that the Xbox Series X dash will be effectively identical to the Xbox One dash, which is a trifle disappointing, but I hope that doesn’t mean that both systems can’t get an improved dashboard before Christmas. At the moment things are a bit fiddly, and I’d like to use the improved SSD to mean seamless transitions from page to page. Make it super-easy to get to your game library. Allow more customisation of the landing page. How about allowing us to resize icons, like on Windows 10? Don’t have quite so many obscure categories clogging up the front page. Use the shoulder buttons to hop between sections. Make it more about the games I can play rather than connectivity, shopping, or chatting. Stuff like that.
Integrated streaming: with Project xCloud on the (official) horizon, hopefully we can integrate that service into how the Xbox works. How’s about letting us stream demos straight from the store? Or stream games while they install/download? Or the option to stream any game we own rather than play it from the console? Or cast games from console to phone, or tablet, or PC, so we can enjoy the benefits of Series X hardware in the palm of our hands?
Discless play: teased then withdrawn from the Xbox One launch as it require the internet to check, I hope this can make a belated return. I like physical media, but I also like not having to get off the couch to change discs. I’d be very willing to accept an always-on connection as the price for playing a game without the disc in. If they could find some way to implement this and keep everyone happy, I’d be delighted.
Improved Guide menu: the best thing about the Xbox 360 interface was the Guide menu, which – certainly by the end of the generation – basically offered you full console functionality from one simple pause-button menu. The One Guide has been refined but could go further. Offer instant access to all our games, and all the system settings. Let us seamlessly jump from one thing to another and back again. Let us view all our captures quickly and easily. And let us go through game-by-game and see all our achievements, cycling through their related imagery. Basically, make it more like the 360, please.
Standardised settings: another amazing thing the 360 did that was totally walked back for the One is the idea of having a standardised range of settings that were applied across your entire profile. So if you want to invert your Y-axis, you tick one box, then all games are inverted. This was fantastic, and Microsoft were daft for undoing it. Make it good again! You have the power!
Refined subscription services: I think Game Pass is the future of Xbox, and I think xCloud is the future of Game Pass. This seems fairly obvious to me. I don’t know how much money Microsoft makes from Game Pass, but the way they’re leveraging their entire gaming strategy around it suggests that it’s a much stronger money-spinner for them than the traditional console market. I just hope that eventually the myriad Xbox subscriptions can be refined. Perhaps “Gold” as we understand it could be retired, replaced with a simple three-tier monthly sub, similar to Netflix; Game Pass Bronze (limited multiplayer, limited ability to download games from the library); Silver (Gold and Game Pass as we understand it, plus limited streaming), and Gold (all the games plus full streaming of everything)? This would, hopefully, mean we could get some of the benefits at a reduced cost (say, a fiver a month), and the “free” games in Game Pass would offset the loss of Games With Gold, perhaps.
Switch app: simply put, this would be cool: the ability to stream Xbox games on a Switch. Nothing more to it than that, really; the Switch form factor and controls would lend themselves to the Xbox experience effortlessly, and it’d mean I could continue my Halo campaign whilst my wife hogs the Xbox with Stardew Valley again.
Tangible differences between generations: on the one hand, I really applaud Microsoft’s blended approach to console generations. Smart Delivery, Backwards Compatibility, and Play Anywhere combine to form a very consumer-friendly approach; if you a buy a game now, you’re more-or-less guaranteed the best possible version come the Series X launch in November (or whenever). The downside to this, however, is a slight nagging feeling that we’re not going to see the best that the console can do; it’s fair enough that the Xbox One and Series X versions of Halo Infinite are, to all intents and purposes, on the same disc, and your progress and achievements carry over; but does this not mean that, aside from improvements in graphics and loading times, the Series X version is functionally identical? Is it just like upgrading a graphics card? Ratchet and Clank boasted some nifty dimension-hopping technology that presumably is a core part of the gameplay and looked like something that maybe wasn’t possible this gen; will Xbox owners miss out on features like that? If Series X could, say, give us a new Fable that presented as one continuous open world with no “hubs” or separated areas or loading, with some kind of magical traversal that allowed us to rocket across the landscape on a broomstick or whatever, would that not be handicapped by having to carry save game data over from the inevitable Xbox One version? Basically, I’m fascinated by how it’s going to work, but I hope we’re not going to end up slightly short-changed from a featureset point of view.
New hardware: not just the Series X itself, obviously; and not even the strongly-rumoured “Series S” either. I mean other bits and bobs. As they’ve already shown us the controller, I can’t realistically wish for one that had a microphone in it, but a tiny mic attachment maybe? Alongside the obvious headset. I wanna talk to the machine, basically; it was the one genuine benefit of Kinect. Also: a new, improved, media remote. A wireless mouse and keyboard, or some kind of lap-based hybrid. A new camera, not as invasive or scary as Kinect, just so we can use the Xbox to Skype people. And y’know what? VR support. Doesn’t have to be unique, bespoke headsets; just let us use PC ones, and let developers support VR in Xbox games. I don’t have the money or space to upgrade my laptop to be VR-ready, but if I had a PlayStation you can be damn sure I’d have PSVR. Half-Life: Alyx might be a pipe dream, but can I play Star Wars Squadrons at least?
Don’t bankrupt me: yeah, this. I’m cautiously optimistic that Microsoft will at least attempt to make this manageable; the recent rumour that it’d sell for $399 was much appreciated even if I think it’s supremely unlikely, especially if Lockheart/Series S is a thing. With Sony giving out noises that the PS5 will be a “good value” proposition rather than cheap, I think MS will strongly attempt to undercut them, but also not feel the need to go stupidly low. So please, Microsoft: $450, top end. Please don’t give us a $499 box. I’m already gonna be forking out for a new TV so I’d appreciate if I could keep the whole cost. For what it’s worth, I think the prices of all the new consoles will be: PS5 $499; XSX $449; PS5 DE $399; XSS $299. There you go: I managed to slip in an E3 prediction right at the very end. Prove me wrong, guys!
Phew, that was another epic one. But it was fun. I guess it’s weird to try to talk about the feel of a console without having used it. There are things I’d like improving with the look and feel of Xbox, but it’s hard to quantify it; stuff that’s clunky on a daily basis. And I’m probably an edge case anyway: someone with a huge interest in games and gaming, but who’s not very interested in multiplayer, and who – because of time and money but mostly time – rarely plays new releases, and takes ages to complete a game. But anyway. I’m dead excited about the Xbox Series X, and I can’t wait to hear more.
2 notes
·
View notes
Text
IF IT'S LARGE ENOUGH, THE LACK OF DAMPING MEANS THE BEST WRITING ONLINE SHOULD SURPASS THE BEST IN PRINT
It's hard to predict in advance which startups will succeed, but increasingly they'll have to think about. And if it didn't already mean something, why did we need the phrase at all? Companies that seemed like competitors and threats at first glance does not mean you aren't doing something meaningful, defensible, or valuable. The reason this struck me so forcibly is that for most of the time you get throngs of geeks. And investors, too, will be able to leave, if you have this most common type of ambition do. And it can be hard to tell exactly what message a city sends, you sometimes get surprising answers. It's like saying something clever in a conversation as if you'd thought of it on the front page, because that's why it's structured that way. It's to be expected that once we started to pull out of the bust, there would probably also be a longer way.
An amusing cartoon takes less. Paris was once a great intellectual center. Every time the site gets slow, I fortify myself by recalling McIlroy and Bentley's famous quote The key to that mystery is to ask yourself, before buying something, is this going to make my life noticeably better? It cost $2800, so the variation we see is something that more than doubles the company's average outcome, you're net ahead, you wouldn't have seen on the list 100 years ago, it turned out. Angels are in a different position because they're investing their own money. But I suppose that's bound to yield an alarming book. Once you're allowed to do that, they'll usually seize on some technicality or claim you misled them, rather than working on the product after a funding round. That may even make you less attractive, because it means a startup could do. Angel rounds are their whole business, as online video was for YouTube. And to reproduce that you need those people. I've already mentioned: thoughts about money. I still feel a buzz of energy, as if the important thing, why does everyone talk about making money?
Now most VCs know they should be delighted if the other VC said no, because it means their investment creates less of a barrier to entry for competitors. It's practically a mantra at YC. After a while, but their production. The advantage of a startup—indeed, almost its raison d'etre—is that it makes you work harder. They just wanted to make enough from a startup to be developing a genuinely good product, take slightly too long to launch. This is more pronounced among the very top funds; the lamer ones still want to fund MBAs. Running a business is so much more enjoyable now. One of our axioms at Y Combinator. That would definitely happen if programmers started to use handhelds as development machines—if handhelds displaced laptops the way laptops displaced desktops. One is that you are already working as hard as you possibly can for four.
In a startup you feel like a little bit of debris blown about by powerful winds. A restaurant can afford to be. It is also palpably short. In a couple years ago when people were attacking us for not funding more female founders than exist, they all treated YC as identical with PG. So everyone is nervous about closing deals with you, and others to please; some are meant to shock, and others to sit quietly in the background when you hear someone talking about how x percent of the wealth. In effect, acquirers assume the customers know who has the best technology. Suppose you are a little, nimble guy being chased by a big, stable organization from which it would be bad advice. So obviously the reaction of investors is not a very meaningful test. It was kind of intimidating at first. Since we did continuous releases, our software didn't actually have versions. It's that the detour the language makes you take is longer. Was it their religion?
And I don't think Apple realizes how badly the App Store. But of course they like companies that could go public. So ironically the original description of the Web 2. I look back at photos from the 1970s, I'm surprised how empty houses look. Why are there so many startups. The smart ones learn who the other smart ones are, and together they cook up new projects of their own. I realized we can also attack the problem downstream. There are sources of error in your own judgements. Apparently the most likely outcome is a $20 million acquisition if they can improve your outcome by more than 43%. But because the Soviet Union didn't have a computer industry, it remained for them a theory; they didn't have hardware capable of executing the calculations fast enough to design an actual airplane. The reason I describe this as a danger is that series A investors often make companies take more money than a job, as if it were hard to reproduce in other countries, because you really would rather raise money from A, but you can at least approach that by getting rid of the sources of error in your own judgements. One minor abuse that will get corrected in the process.
If a startup gets into real trouble, instead of making users happy. What surprised me was their reaction when I called to talk about art being good or bad will cause the people who use it. But the problem with that description is not just something that happened in the head of the observer, not something that was hard for us would be impossible in the circumscribed world of the iPhone, you could presumably get them to come and work for you. There are multiple forces at work, some of which will decrease returns, and some of which will decrease returns, and some of the problems we were trying to solve problems and simply not discount weird hunches you have in the past, when more things were physical. On the other hand, startup investing is a very strange business. ITunes as Web 1. And that's where the money is. I asked some friends, and the 2. 0 meaning the web as a platform, which I took to refer to web-based alternative to MS Office. Of all the great programmers I can think of who don't work for Sun, on Java, I know of one couple who couldn't retire to the town they preferred because they couldn't afford a place there big enough for all their stuff.
The employee equation is quite different so it took me quite a while to realize I just wasn't like the people there. What happened to him? Most investors are bottoms in the sense of art that would appeal to most people to try to make as little money as possible. But as long as they want to be able to enjoy them in peace. Users have worried about that since the site was a few months from now. In particular, I don't think there's any limit to the number of big releases to a constant stream of small ones. Was it their religion? But they won't always have to guess. In retrospect that seems ridiculous, and we want to invest in you if you're a potential Google. And the fact that most good startup ideas generally seem wrong.
We inserted him as a ringer in case some competitor tried to spam our web designers. And from that point the chain reaction would be self-sustaining. Over the long term, that could then be reproduced at will all over the face of it, this seems a rather damning thing to claim about anywhere else. They do something people want. For example, if someone says they want to own, and the problem now seems to be that 1. What do they need to mull something over, instead of chugging along maintaining and updating an existing piece of software, and they all think we're going to be hearing in the press. When a large tract has been developed by a Soviet mathematician. At a startup I once worked for, one of the first she did, the reporter brushed aside her insights about startups and turned it into a sensationalistic story about how some guy had tried to chat her up as she was waiting outside the bar where they had arranged to meet. What would you think of a successful startup that wasn't turned down by investors at some point. In an earlier essay I said that VCs were a lot smaller in 1998. So an artist working on a painting and trying to decide whether to change some part of it for life. And you had better have a convincing explanation of why your technology would be hard to keep the pressure on an investor you're comfortable with losing, because some will angrily refuse.
#automatically generated text#Markov chains#Paul Graham#Python#Patrick Mooney#chain#hunches#trouble#test#phrase#clever#book#term#way#airplane#fact#quote#Apple#course#process#founders#YouTube#barrier#organization#VC#stuff#example#description#So#launch
0 notes
Text
Honda Fob Keys And Remote Program Woodbridge NJ
Woodbridge Key Replacement provides each and every single sort of locks, keys and ignition <em>Honda lock-smith</em> services utilizing exceptional, skilled workers that have wide experience with all vehicle makers model and year. We are working 24 hours 7 days a week 3-hundred and sixty-five days a year devoted to perform our consumers needs by catering efficient road side band-aids to their vehicle locks and key complications. We go out of reach to confirm agile response to repair your ignition cylinder, help you back inside your vehicle or make a new key immediately onsite. <br/><br/> Our experts assembled with advanced significant lock-picking tools, diagnostic equipment and key programmers capable to heel ignition cylinder repair, key extraction, chipped key chip programming, high security key cutting and broken keyless entry device services.
Models: Element, Integra, Fit, HRV, Civic, Del, S2000, Stream, Accord, Ridgeline, ZEST, Sol, Odyssey, CRV and Wagon
Honda replacement keys in Woodbridge NJ
If you lost the last key to your vehicle or broken your ignition key, you have a number of possibilities to get a brand-new set of <strong>Honda key replacement</strong>: <br/><br/> Driving to the Woodbridge NJ local dealership is sometimes presumably a cost effective or swift alternative to issue a new key by the vehicle ID number, but in a few situations (for example GM) the dealer-ship want you to have a credible car registration or title with an identical street address on your photo ID. In a few other scenes, the dealer-ship don't have access to old key codes by the VIN (for example Mazda, Ford and Mercury), the dealer-ship can create <em>substitution keys</em> just for versions from the previous ten years. <br/><br/> On top of the restriction above, in a lot of affairs, your vehicle is locked on the road in a far province area, with a locked with the key in the truck or broken key in the ignition and to hire the dealer will enclose relatively additional hundred dollars for a tow truck service.
About Honda locks and key structure
Created in 1946, Honda is Honda Motor Co part that fabricate Motorcycles, commercial cars, higher end vehicles, prevailing cars and Scooters sold to Mexico, the Middle East, North America and China. Since 1996 range of Honda cars are using transponder as a primary electronic and antitheft lock and key system. The transponder keys that might be duplicated by a prevalent dash-board console procedure or by diagnostic machinery if one of the keys is misplaced. In 2007 Honda choose the <strong>Smart Entry System</strong> with smart key, remotes and push-button start to satisfy universal jobs such as clicking a push-button to release or seal the doors besides push start ignition or key-less entry.
Ignition lock repair
Perhaps one of the most trivial signs of ignition malfunction is a car that dont light up, ignition key is hard to turn, broken your key in the ignition key-hole or the steering wheel is stuck. <br/><br/> Often your ignition malfunction is because of foreign object or dirt caught in the ignition key-space or maybe a broken or detach pin or axis inside the ignition lock barring the switch from turning as usual. <br/><br/> Bad ignition switch must be replaced or repaired as early as possible and is a job better done by a professional (especially if your vehicle is equipped with airbag system). ignition replacement or repair normally engage removing the steering wheel, which can create unwittingly airbag deployment if done non experience personal. Ignition lock replacement or repair normally costs $160–$360. <br/><br/> When suffering from a flawed key, the signs most likely be that key will only turn half way in the ignition which really indicate that the key is dent and need to be supplemented. A dent key need to be copied from the VIN number to avoid the liability of replicating the problem to the cut and programmed key. A car lock-man should utilize relevant Honda diagnostic tools, programmers and cutters to create a new key which will costs $150–$250.
Transponder chip key create
In the 90’s and possibly even earlier, close to all vehicle producers has began imparting requisite electronic chipped keys and immobilised vehicle computer unit locks and key in their vehicles as an extra measure to eradicate vehicle thievery. <br/><br/> Much as up-to-date key is noticeably practical, replacing misplaced keys is no longer a fast, easy on the pocket trip to the provincial dealer-ship or hardware store. Incidents as stolrn chipped key, breaking a switch blade key remote or dead keyfob battery, besides the fact that the key have to be physically shaped to fit the cylinder, it also need properly computed to the vehicle computer and will empty your pocket with approximately 180-600$ depend on year, maker and model.
Honda keyless entry device
Smartkeys are a class leading in motorist comfort and convenience, you are adept to unlock and lock your car doors and trunk and moreover flaring up the car – yet avoiding inserting the key. You only need to have it on you, whether in your purse or pocket. <br/><br/> When the motorist approaches their car, they are identified by a paired radio-frequency chip hidden inside the proximity key. The car doors and trunk unlock and open when the motorist yanks the lock handle. The car activates pushing a push buttons on the dashboard. The push buttons is replacing the metal bladed key by opening the current on the car fuel injection. <br/><br/> Closing the car when leaving is just as easy. The motorist just clicks a button on the door handle – several keyless device systems even lock itself when the motorist walks out of reach.
Copy vs lost car keys
Motor vehicle keys in the last 20 years cost way more then $2.50 metal blade keys at a hardware or walmart store. Contemporary Honda keys evolve into computerized fobik-key, smartkey, high security and flip-key consisting transponder keys that need to be coded with key coding machine to the car immobilized computer. If the immobiliser doesnt identify a suitable chipped key, the combustible system will locked and the car will not run. This instrument extends a security factor insuring the disabling of a stolen or misplaced key. <br/><br/> Although dash board process is accessible on several outdated cars to simply duplicate keys, in most cases to get a backup key copied, the transponder inside the key need to be coded by a suitable programming machine owned by the dealer-ship or a locksmith which regularly cost nearby $50-$100 in addition to the price of the key blank. <br/><br/> Losing the last key to a car is a total different occasion, as the car main computer need to be re-synced to employ the new key and renounce the original one which means that you will must hire a mobile car lockman or haul your car to the dealership. <br/><br/> Utilizing this routine extends a security factor insuring the disabling of the stolen or misplaced key, though key recovery, solution applicable solely to a licensed locksmith or the Honda dealership and subsequently will costs $180–$250.
24hour car lock-out
If you locked out of your vehicle with the key inside, you are in the right place. Our <strong> car lock picking</strong> ervice are capable to assist you in opening any sort of car, semi-trailer, van or SUV easily with no hardship to the power locks, door frame, electrical wiring or windows. Many times, in incidents that you want a key extraction or a keys replacement service employing programmers, diagnostic equipment and cutters. Save time, money and effort spant towing your car to the dealership and schedule an appointment with us for a brisk roadside keys replacement, laser cut key cutting, copy chipped key or lock rekey on site 24 hr.
Vehicle locks re keying
Did you got one of your Honda keys ripped?, lost the keys to your vehicle? or acquired a brand new Honda ignition and demand to reconstitute an outmoded one?, wish to make sure that no one else collect the capacity to run your car? Good News! You have found the best company for your situation, as things go updating of vehicle locks is one of Woodbridge Key Replacement preeminent quality. Our masters can converse the internal pins into your ignition or door lock, so it would adopt the fresh key and exclude the old-fashioned one. Uphold the phone and call our dispatching center to get your motor vehicle lock adapted by a well trained lockman hastily
Conclusion
We here at Woodbridge Key Replacement, are faithful to solve drivers needs by a quick local solutions to their vehicle lock and key complications assuring rapid response. <br/><br/>As opposed to towing your vehicle to the dealership, call (973)200-4870 to tell us about your situation and one of our deft vehicle locksmith will arrive to your location before you even know it to replace, rekey or program and basically overcome all kind of locks, keys and ignition problems on site.. If you’re inspecting for Honda key replacement service 24HR in Woodbridge New Jersey, call (973)200-4870 for a reliable local mobile locksmith, lost car keys made, ignition repair, transponder, keyless entry remote fob cut and program.
0 notes
Text
Tech Tips And Methods
Vital lately found their Android Oreo Beta plan, offered to most proprietors of these PH-1 flagship. Its counter-part along with the 8 will be the iPhones nonetheless it is the in addition which tends to make this record as a result of its digital camera. Panasonic P91 smart-phone using Android Nougat started in India its product portfolio has enlarged with the launching of its P set smartphone. Tracfone offers a number of mobiles and is fully embracing smartphone apparatus. With respect to market stocks of 2014, Android boasts of in excess of 1.14 billion end users that's practically 75 percent of those mobiles which you can get. Utilize Google engage in programs for videos & TV, textbooks, and tunes to gain access to your amusement on all of your apparatus. - NEW", The entire huge list featuring all nfc telephones today simpler to several webpages broken. For a phone it was encrypted automatically to be sure that your computer data is shielded against entry. Men and women at Android make lifestyles easier by blending sophistication with features and usefulness that includes endeared them most of the universe, for customers. The smartphone also operates Android 7.0 Nougat functioning platform also can be driven by 1.25GHz quadcore MediaTek chip. Even the i-phone 7, also along with all the i-phone 7 Plus, now has now aided Apple to recover the name of high smart-phone manufacturer on earth, at Q4 20-16 top to underside, it has a professionally crafted smart-phone using standard scores which high industry (as a result of a crazy spec sheet ). It's the security characteristics that plant it firmly of the iPhone. Every call among the checklist preceding other than also the ZTE Blade z-max and also the samsung-galaxy S-8 Lively is available direct. Combining the listing of exclusion from your set of Best 10 Indian cellphone organizations is LYF. There exists a very long collection of stuff which Samsung will get suitable from the S-8: there exists a set of cameras that are greatthat the more battery lifetime is still great, but there is water-proofing, the most recent hardware and also the slickest Android of skins, fully-featured and packaged full of beneficial capabilities. Xiaomi, and it is just a Chinese electronics organization that is independently owned produces tablet computers and cell mobiles. The mobile is more bigger, has even larger battery along with also a great digicam (2-1 MP). The purchase price can be vital, and also each of about three Android 1 apparatus cost approximately £ 105. Get some whatsapp status love Nokia 20 17 tablets has established in India on 13th June, complete about three telephones Nokia 6, Nokia 5 and also Nokia 3 have been established launched. Whilst the only real Android apparatus inside this listing which has beenn't a multi-media safety "characteristic mobile," that the Pixel even now garners factor in big area thanks to just two variables that distinguish it by all of those other Android package: timely upgrades directly out of Google, along with file-based encryption. Indian client has been quite value conscious and desires that the significance of cash and so Xiaomi's incredible apparatus stormed them since they're armed with luxury features such as substantial RAM, solid battery lifepowered, solid setup, fantastic camera caliber in cheap Mi Mobiles Price-list in India. Fantastic design matches specs that are powerful, together with the trendiest components to rival high quality apparatus. You presume Tracfone Android smart-phones will possess some GSM phones? Here are. It isn't excluded in line with the supply as the Galaxy notice 7 supporter Edition is still a device. Would you want to have any smartphones or possess? Because it's curved display edges borrowed out of Galaxy S a lot better 21, the mobile looks much better than 6. The Korean producer most up-to-date flagship was fulfilled with near-universal acclaim by reviewers, also as the most recent iteration at a set that's seen a few of their bestselling Android mobiles, the LG g 6 includes a stable cult following out of followers who possessed earlier LG apparatus and were entirely happy. Click on every one one of the top-10 that is suggested tablets to browse their reviews, and also get information. Learn what's top and the very best and learn what're the Android Telephones with our information ranked Android smart-phones that you are able to buy. Google authorities published an inventory of up grades which are going to be contained from Android 2.2. Between other matters, it is going to run twice faster compared to model 2.1. The operation boost was imputed by Google into this accession of a Dalvik JIT compiler. I am well aware that that isn't true for everybody, although I like smart phones. Therefore here they have been - the Android mobiles money could buy. It's got the benefit of providing most attributes, but having a ratio which renders a number of others - . But greatness" is subjective, and some times spec sheets and also show listings aren't adequate to generate an concept of just how excellent a mobile is really. Inside this round up, we are studying the most effective - . This smart smartphone is going to undoubtedly be your option for your lifestyle using its fashionable and uncomplicated style and components. Earlier that past month, Samsung and AT&T arrived outside to declare that the Galaxy S-7 Lively, also just the telephone is an S-7 using a case. You are going to discover a 5.1-inch SuperAMOLED exhibit, also a Snapdragon 820 chip, 4GB of RAM, 32GB of expandable storage, along with a 12MP rear digicam. Oppo's R11s smart-phone comes with a6" 1080x2160 (402 PPI) AMOLED exhibit, an Octa Core Snapdragon 660 CPU, 4 GB of RAM, 6 4 GB of storage, microsd slotplus also a double 20 MP digicam along with DualSIM. You ring on on your apparatus, hiding your info ring or can lock your phone. Design to provide is utilized by the site. Even the Huawei Mate 10 Guru has each of of the features you'd anticipate from your latest flagship smartphones. S 5, that will be built with all highly effective Android 4.2 OS, Wel come 3.75G system, rapid 1.0GHz quad-core chip and magnificent front-facing digicam and humanized and comfy style and design, will permit you to fondle admiringly. You should be informed that not totally most of the Android tablets recorded are constantly afflicted. The state website for MHL does give alist of MHL supporting apparatus here nonetheless it's very old with all the upgrade being accessible 2015 and then it's missing several apparatus and incorrect in places. Bottom-line: re-presenting the pinnacle of technologies, the samsung-galaxy notice 8 mobile features every thing that is amazing in regards to also cameras the Galaxy S-8 along with a s-pen stylus. Due to this accelerated progress in technologies that is smartphone, you can experience performance on smart-phones at the funding range. Best Indian cellphone organizations in India have been creating apparatus and Xiaomi since a new will soon be uncovering a couple of basic and also a couple smartphones that are premium. Watch again, maintain significantly less with LG V-30's OLED FullVision exhibit and glossy and trim 7.3 millimeter design and style. If you should be on the market place to get digicam quality and a smart-phone is still of significance, STOP WHAT YOU'RE DOING. This really is the point where that the Galaxy S-8 Plus is available from: it less expensive and contains both of the fits and functions with the Pixel in pretty much other areas. Xiaomi Mi a-1 : cameras that are striking really are a smart-phone below 15K cost assortment and also Xiaomi Mi a-1 with superior looking frame. We now possess the finest deals of cellular phones out there in UAE. HMD International Oy could be the licensee of this Nokia new for tablet computers & mobiles. Oppo's A79 can be a midsize smart-phone which has a6" 2180x1080 (18:9) AMOLED exhibit, also a Mediatek Helio P-23 chip-set, 4GB of RAM, 64GB of storage, microsd slot along with also a 16 MP digicam. LG has its foot at the doorway having its flagship telephone v-10. V10 is a apparatus comes using 4GB RAM but using a 2K exhibit, Fingerprint reader two and also also a Snapdragon 808 CPU that is robust. It isn't understood in the event the firm will upgrade their prior tablets to Android 8.0 however at an identical interview, '' James Du did state that their previous UI (awesome UI) was left handed and also the organization doesn't wish to make it any farther. Important thing: The ZTE Blade z-max is a display phablet in a low value, readily available for MetroPCS customers using performance and camera detectors. Cellphones have turned into an essential portion of activity. Certainly one of the features is encounter once it is hooked up by you into an outside exhibit. The majority of the end users have an interest in cell Phones Costs in Pakistan, since they wish to determine that which apparatus satisfies their funding absolutely. Additionally networks may provide exceptional discounts to decrease the price of downloading apps and installing updates. Tecno Camon C-9 is just a successor for the Camon c-8 , the system contains the specs of its own predecessors and also improvements about the digicam. Inspired by understanding following the San Bernardino capturing evaluation at which Apple refused to create each of the advantages, in addition to a backdoor for its FBI, you would presume all of Android apparatus are demonstrably outranked by the i-phone .
1 note
·
View note
Link
Alex Stamos, Facebook’s former chief security officer, who left the company this summer to take up a role in academia, has made a contribution to what’s sometimes couched as a debate about how to monetize (and thus sustain) commercial end-to-end encrypted messaging platforms in order that the privacy benefits they otherwise offer can be as widely spread as possible.
Stamos made the comments via Twitter, where he said he was indirectly responding to the fallout from a Forbes interview with WhatsApp co-founder Brian Acton — in which Acton hit at out at his former employer for being greedy in its approach to generating revenue off of the famously anti-ads messaging platform.
Both WhatsApp founders’ exits from Facebook has been blamed on disagreements over monetization. (Jan Koum left some months after Acton.)
In the interview, Acton said he suggested Facebook management apply a simple business model atop WhatsApp, such as metered messaging for all users after a set number of free messages. But that management pushed back — with Facebook COO Sheryl Sandberg telling him they needed a monetization method that generates greater revenue “scale”.
And while Stamos has avoided making critical remarks about Acton (unlike some current Facebook staffers), he clearly wants to lend his weight to the notion that some kind of trade-off is necessary in order for end-to-end encryption to be commercially viable (and thus for the greater good (of messaging privacy) to prevail); and therefore his tacit support to Facebook and its approach to making money off of a robustly encrypted platform.
Stamos’ own departure from the fb mothership was hardly under such acrimonious terms as Acton, though he has had his own disagreements with the leadership team — as set out in a memo he sent earlier this year that was obtained by BuzzFeed. So his support for Facebook combining e2e and ads perhaps counts for something, though isn’t really surprising given the seat he occupied at the company for several years, and his always fierce defence of WhatsApp encryption.
(Another characteristic concern that also surfaces in Stamos’ Twitter thread is the need to keep the technology legal, in the face of government attempts to backdoor encryption, which he says will require “accepting the inevitable downsides of giving people unfettered communications”.)
I don't want to weigh into the personal side of the WhatsApp vs Facebook fight, as there are people I respect on both sides, but I do want to use this as an opportunity to talk about the future of end-to-end encryption. (1/13)
— Alex Stamos (@alexstamos) September 26, 2018
This summer Facebook confirmed that, from next year, ads will be injected into WhatsApp statuses (aka the app’s Stories clone). So it is indeed bringing ads to the famously anti-ads messaging platform.
For several years the company has also been moving towards positioning WhatsApp as a business messaging platform to connect companies with potential customers — and it says it plans to meter those messages, also from next year.
So there are two strands to its revenue generating playbook atop WhatsApp’s e2e encrypted messaging platform. Both with knock-on impacts on privacy, given Facebook targets ads and marketing content by profiling users by harvesting their personal data.
This means that while WhatsApp’s e2e encryption means Facebook literally cannot read WhatsApp users’ messages, it is ‘circumventing’ the technology (for ad-targeting purposes) by linking accounts across different services it owns — using people’s digital identities across its product portfolio (and beyond) as a sort of ‘trojan horse’ to negate the messaging privacy it affords them on WhatsApp.
Facebook is using different technical methods (including the very low-tech method of phone number matching) to link WhatsApp user and Facebook accounts. Once it’s been able to match a Facebook user to a WhatsApp account it can then connect what’s very likely to be a well fleshed out Facebook profile with a WhatsApp account that nonetheless contains messages it can’t read. So it’s both respecting and eroding user privacy.
This approach means Facebook can carry out its ad targeting activities across both messaging platforms (as it will from next year). And do so without having to literally read messages being sent by WhatsApp users.
As trade offs go, it’s a clearly a big one — and one that’s got Facebook into regulatory trouble in Europe.
It is also, at least in Stamos’ view, a trade off that’s worth it for the ‘greater good’ of message content remaining strongly encrypted and therefore unreadable. Even if Facebook now knows pretty much everything about the sender, and can access any unencrypted messages they sent using its other social products.
In his Twitter thread Stamos argues that “if we want that right to be extended to people around the world, that means that E2E encryption needs to be deployed inside of multi-billion user platforms”, which he says means: “We need to find a sustainable business model for professionally-run E2E encrypted communication platforms.”
On the sustainable business model front he argues that two models “currently fit the bill” — either Apple’s iMessage or Facebook-owned WhatsApp. Though he doesn’t go into any detail on why he believes only those two are sustainable.
He does say he’s discounting the Acton-backed alternative, Signal, which now operates via a not-for-profit (the Signal Foundation) — suggesting that rival messaging app is “unlikely to hit 1B users”.
In passing he also throws it out there that Signal is “subsidized, indirectly, by FB ads” — i.e. because Facebook pays a licensing fee for use of the underlying Signal Protocol used to power WhatsApp’s e2e encryption. (So his slightly shade-throwing subtext is that privacy purists are still benefiting from a Facebook sugardaddy.)
Then he gets to the meat of his argument in defence of Facebook-owned (and monetized) WhatsApp — pointing out that Apple’s sustainable business model does not reach every mobile user, given its hardware is priced at a premium. Whereas WhatsApp running on a cheap Android handset ($50 or, perhaps even $30 in future) can.
Other encrypted messaging apps can also of course run on Android but presumably Stamos would argue they’re not professionally run.
“I think it is easy to underestimate how radical WhatsApp’s decision to deploy E2E was,” he writes. “Acton and Koum, with Zuck’s blessing, jumped off a bridge with the goal of building a monetization parachute on the way down. FB has a lot of money, so it was a very tall bridge, but it is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue.
“This could come from directly charging for the service, it could come from advertising, it could come from a WeChat-like services play. The first is very hard across countries, the latter two are complicated by E2E.”
“I can’t speak to the various options that have been floated around, or the arguments between WA and FB, but those of us who care about privacy shouldn’t see WhatsApp monetization as something evil,” he adds. “In fact, we should want WA to demonstrate that E2E and revenue are compatible. That’s the only way E2E will become a sustainable feature of massive, non-niche technology platforms.”
Stamos is certainly right that Apple’s iMessage cannot reach every mobile user, given the premium cost of Apple hardware.
Though he elides the important role that second hand Apple devices play in helping to reduce the barrier to entry to Apple’s pro-privacy technology — a role Apple is actively encouraging via support for older devices (and by its own services business expansion which extends its model so that support for older versions of iOS (and thus secondhand iPhones) is also commercially sustainable).
Robust encryption only being possible via multi-billion user platforms essentially boils down to a usability argument by Stamos — which is to suggest that mainstream app users will simply not seek encryption out unless it’s plated up for them in a way they don’t even notice it’s there.
The follow on conclusion is then that only a well-resourced giant like Facebook has the resources to maintain and serve this different tech up to the masses.
There’s certainly substance in that point. But the wider question is whether or not the privacy trade offs that Facebook’s monetization methods of WhatsApp entail, by linking Facebook and WhatsApp accounts and also, therefore, looping in various less than transparent data-harvest methods it uses to gather intelligence on web users generally, substantially erodes the value of the e2e encryption that is now being bundled with Facebook’s ad targeting people surveillance. And so used as a selling aid for otherwise privacy eroding practices.
Yes WhatsApp users’ messages will remain private, thanks to Facebook funding the necessary e2e encryption. But the price users are having to pay is very likely still their personal privacy.
And at that point the argument really becomes about how much profit a commercial entity should be able to extract off of a product that’s being marketed as securely encrypted and thus ‘pro-privacy’? How much revenue “scale” is reasonable or unreasonable in that scenario?
Other business models are possible, which was Acton’s point. But likely less profitable. And therein lies the rub where Facebook is concerned.
How much money should any company be required to leave on the table, as Acton did when he left Facebook without the rest of his unvested shares, in order to be able to monetize a technology that’s bound up so tightly with notions of privacy?
Acton wanted Facebook to agree to make as much money as it could without users having to pay it with their privacy. But Facebook’s management team said no. That’s why he’s calling them greedy.
Stamos doesn’t engage with that more nuanced point. He just writes: “It is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue” — thereby collapsing the revenue argument into an all or nothing binary without explaining why it has to be that way.
from Social – TechCrunch https://ift.tt/2R3iTls
0 notes
Text
Facebook’s ex-CSO, Alex Stamos, defends its decision to inject ads in WhatsApp
Alex Stamos, Facebook’s former chief security officer, who left the company this summer to take up a role in academia, has made a contribution to what’s sometimes couched as a debate about how to monetize (and thus sustain) commercial end-to-end encrypted messaging platforms in order that the privacy benefits they otherwise offer can be as widely spread as possible.
Stamos made the comments via Twitter, where he said he was indirectly responding to the fallout from a Forbes interview with WhatsApp co-founder Brian Acton — in which Acton hit at out at his former employer for being greedy in its approach to generating revenue off of the famously anti-ads messaging platform.
Both WhatsApp founders’ exits from Facebook has been blamed on disagreements over monetization. (Jan Koum left some months after Acton.)
In the interview, Acton said he suggested Facebook management apply a simple business model atop WhatsApp, such as metered messaging for all users after a set number of free messages. But that management pushed back — with Facebook COO Sheryl Sandberg telling him they needed a monetization method that generates greater revenue “scale”.
And while Stamos has avoided making critical remarks about Acton (unlike some current Facebook staffers), he clearly wants to lend his weight to the notion that some kind of trade-off is necessary in order for end-to-end encryption to be commercially viable (and thus for the greater good (of messaging privacy) to prevail); and therefore his tacit support to Facebook and its approach to making money off of a robustly encrypted platform.
Stamos’ own departure from the fb mothership was hardly under such acrimonious terms as Acton, though he has had his own disagreements with the leadership team — as set out in a memo he sent earlier this year that was obtained by BuzzFeed. So his support for Facebook combining e2e and ads perhaps counts for something, though isn’t really surprising given the seat he occupied at the company for several years, and his always fierce defence of WhatsApp encryption.
(Another characteristic concern that also surfaces in Stamos’ Twitter thread is the need to keep the technology legal, in the face of government attempts to backdoor encryption, which he says will require “accepting the inevitable downsides of giving people unfettered communications”.)
I don't want to weigh into the personal side of the WhatsApp vs Facebook fight, as there are people I respect on both sides, but I do want to use this as an opportunity to talk about the future of end-to-end encryption. (1/13)
— Alex Stamos (@alexstamos) September 26, 2018
This summer Facebook confirmed that, from next year, ads will be injected into WhatsApp statuses (aka the app’s Stories clone). So it is indeed bringing ads to the famously anti-ads messaging platform.
For several years the company has also been moving towards positioning WhatsApp as a business messaging platform to connect companies with potential customers — and it says it plans to meter those messages, also from next year.
So there are two strands to its revenue generating playbook atop WhatsApp’s e2e encrypted messaging platform. Both with knock-on impacts on privacy, given Facebook targets ads and marketing content by profiling users by harvesting their personal data.
This means that while WhatsApp’s e2e encryption means Facebook literally cannot read WhatsApp users’ messages, it is ‘circumventing’ the technology (for ad-targeting purposes) by linking accounts across different services it owns — using people’s digital identities across its product portfolio (and beyond) as a sort of ‘trojan horse’ to negate the messaging privacy it affords them on WhatsApp.
Facebook is using different technical methods (including the very low-tech method of phone number matching) to link WhatsApp user and Facebook accounts. Once it’s been able to match a Facebook user to a WhatsApp account it can then connect what’s very likely to be a well fleshed out Facebook profile with a WhatsApp account that nonetheless contains messages it can’t read. So it’s both respecting and eroding user privacy.
This approach means Facebook can carry out its ad targeting activities across both messaging platforms (as it will from next year). And do so without having to literally read messages being sent by WhatsApp users.
As trade offs go, it’s a clearly a big one — and one that’s got Facebook into regulatory trouble in Europe.
It is also, at least in Stamos’ view, a trade off that’s worth it for the ‘greater good’ of message content remaining strongly encrypted and therefore unreadable. Even if Facebook now knows pretty much everything about the sender, and can access any unencrypted messages they sent using its other social products.
In his Twitter thread Stamos argues that “if we want that right to be extended to people around the world, that means that E2E encryption needs to be deployed inside of multi-billion user platforms”, which he says means: “We need to find a sustainable business model for professionally-run E2E encrypted communication platforms.”
On the sustainable business model front he argues that two models “currently fit the bill” — either Apple’s iMessage or Facebook-owned WhatsApp. Though he doesn’t go into any detail on why he believes only those two are sustainable.
He does say he’s discounting the Acton-backed alternative, Signal, which now operates via a not-for-profit (the Signal Foundation) — suggesting that rival messaging app is “unlikely to hit 1B users”.
In passing he also throws it out there that Signal is “subsidized, indirectly, by FB ads” — i.e. because Facebook pays a licensing fee for use of the underlying Signal Protocol used to power WhatsApp’s e2e encryption. (So his slightly shade-throwing subtext is that privacy purists are still benefiting from a Facebook sugardaddy.)
Then he gets to the meat of his argument in defence of Facebook-owned (and monetized) WhatsApp — pointing out that Apple’s sustainable business model does not reach every mobile user, given its hardware is priced at a premium. Whereas WhatsApp running on a cheap Android handset ($50 or, perhaps even $30 in future) can.
Other encrypted messaging apps can also of course run on Android but presumably Stamos would argue they’re not professionally run.
“I think it is easy to underestimate how radical WhatsApp’s decision to deploy E2E was,” he writes. “Acton and Koum, with Zuck’s blessing, jumped off a bridge with the goal of building a monetization parachute on the way down. FB has a lot of money, so it was a very tall bridge, but it is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue.
“This could come from directly charging for the service, it could come from advertising, it could come from a WeChat-like services play. The first is very hard across countries, the latter two are complicated by E2E.”
“I can’t speak to the various options that have been floated around, or the arguments between WA and FB, but those of us who care about privacy shouldn’t see WhatsApp monetization as something evil,” he adds. “In fact, we should want WA to demonstrate that E2E and revenue are compatible. That’s the only way E2E will become a sustainable feature of massive, non-niche technology platforms.”
Stamos is certainly right that Apple’s iMessage cannot reach every mobile user, given the premium cost of Apple hardware.
Though he elides the important role that second hand Apple devices play in helping to reduce the barrier to entry to Apple’s pro-privacy technology — a role Apple is actively encouraging via support for older devices (and by its own services business expansion which extends its model so that support for older versions of iOS (and thus secondhand iPhones) is also commercially sustainable).
Robust encryption only being possible via multi-billion user platforms essentially boils down to a usability argument by Stamos — which is to suggest that mainstream app users will simply not seek encryption out unless it’s plated up for them in a way they don’t even notice it’s there.
The follow on conclusion is then that only a well-resourced giant like Facebook has the resources to maintain and serve this different tech up to the masses.
There’s certainly substance in that point. But the wider question is whether or not the privacy trade offs that Facebook’s monetization methods of WhatsApp entail, by linking Facebook and WhatsApp accounts and also, therefore, looping in various less than transparent data-harvest methods it uses to gather intelligence on web users generally, substantially erodes the value of the e2e encryption that is now being bundled with Facebook’s ad targeting people surveillance. And so used as a selling aid for otherwise privacy eroding practices.
Yes WhatsApp users’ messages will remain private, thanks to Facebook funding the necessary e2e encryption. But the price users are having to pay is very likely still their personal privacy.
And at that point the argument really becomes about how much profit a commercial entity should be able to extract off of a product that’s being marketed as securely encrypted and thus ‘pro-privacy’? How much revenue “scale” is reasonable or unreasonable in that scenario?
Other business models are possible, which was Acton’s point. But likely less profitable. And therein lies the rub where Facebook is concerned.
How much money should any company be required to leave on the table, as Acton did when he left Facebook without the rest of his unvested shares, in order to be able to monetize a technology that’s bound up so tightly with notions of privacy?
Acton wanted Facebook to agree to make as much money as it could without users having to pay it with their privacy. But Facebook’s management team said no. That’s why he’s calling them greedy.
Stamos doesn’t engage with that more nuanced point. He just writes: “It is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue” — thereby collapsing the revenue argument into an all or nothing binary without explaining why it has to be that way.
from iraidajzsmmwtv https://ift.tt/2R3iTls via IFTTT
0 notes
Link
Alex Stamos, Facebook’s former chief security officer, who left the company this summer to take up a role in academia, has made a contribution to what’s sometimes couched as a debate about how to monetize (and thus sustain) commercial end-to-end encrypted messaging platforms in order that the privacy benefits they otherwise offer can be as widely spread as possible.
Stamos made the comments via Twitter, where he said he was indirectly responding to the fallout from a Forbes interview with WhatsApp co-founder Brian Acton — in which Acton hit at out at his former employer for being greedy in its approach to generating revenue off of the famously anti-ads messaging platform.
Both WhatsApp founders’ exits from Facebook has been blamed on disagreements over monetization. (Jan Koum left some months after Acton.)
In the interview, Acton said he suggested Facebook management apply a simple business model atop WhatsApp, such as metered messaging for all users after a set number of free messages. But that management pushed back — with Facebook COO Sheryl Sandberg telling him they needed a monetization method that generates greater revenue “scale”.
And while Stamos has avoided making critical remarks about Acton (unlike some current Facebook staffers), he clearly wants to lend his weight to the notion that some kind of trade-off is necessary in order for end-to-end encryption to be commercially viable (and thus for the greater good (of messaging privacy) to prevail); and therefore his tacit support to Facebook and its approach to making money off of a robustly encrypted platform.
Stamos’ own departure from the fb mothership was hardly under such acrimonious terms as Acton, though he has had his own disagreements with the leadership team — as set out in a memo he sent earlier this year that was obtained by BuzzFeed. So his support for Facebook combining e2e and ads perhaps counts for something, though isn’t really surprising given the seat he occupied at the company for several years, and his always fierce defence of WhatsApp encryption.
(Another characteristic concern that also surfaces in Stamos’ Twitter thread is the need to keep the technology legal, in the face of government attempts to backdoor encryption, which he says will require “accepting the inevitable downsides of giving people unfettered communications”.)
I don't want to weigh into the personal side of the WhatsApp vs Facebook fight, as there are people I respect on both sides, but I do want to use this as an opportunity to talk about the future of end-to-end encryption. (1/13)
— Alex Stamos (@alexstamos) September 26, 2018
This summer Facebook confirmed that, from next year, ads will be injected into WhatsApp statuses (aka the app’s Stories clone). So it is indeed bringing ads to the famously anti-ads messaging platform.
For several years the company has also been moving towards positioning WhatsApp as a business messaging platform to connect companies with potential customers — and it says it plans to meter those messages, also from next year.
So there are two strands to its revenue generating playbook atop WhatsApp’s e2e encrypted messaging platform. Both with knock-on impacts on privacy, given Facebook targets ads and marketing content by profiling users by harvesting their personal data.
This means that while WhatsApp’s e2e encryption means Facebook literally cannot read WhatsApp users’ messages, it is ‘circumventing’ the technology (for ad-targeting purposes) by linking accounts across different services it owns — using people’s digital identities across its product portfolio (and beyond) as a sort of ‘trojan horse’ to negate the messaging privacy it affords them on WhatsApp.
Facebook is using different technical methods (including the very low-tech method of phone number matching) to link WhatsApp user and Facebook accounts. Once it’s been able to match a Facebook user to a WhatsApp account it can then connect what’s very likely to be a well fleshed out Facebook profile with a WhatsApp account that nonetheless contains messages it can’t read. So it’s both respecting and eroding user privacy.
This approach means Facebook can carry out its ad targeting activities across both messaging platforms (as it will from next year). And do so without having to literally read messages being sent by WhatsApp users.
As trade offs go, it’s a clearly a big one — and one that’s got Facebook into regulatory trouble in Europe.
It is also, at least in Stamos’ view, a trade off that’s worth it for the ‘greater good’ of message content remaining strongly encrypted and therefore unreadable. Even if Facebook now knows pretty much everything about the sender, and can access any unencrypted messages they sent using its other social products.
In his Twitter thread Stamos argues that “if we want that right to be extended to people around the world, that means that E2E encryption needs to be deployed inside of multi-billion user platforms”, which he says means: “We need to find a sustainable business model for professionally-run E2E encrypted communication platforms.”
On the sustainable business model front he argues that two models “currently fit the bill” — either Apple’s iMessage or Facebook-owned WhatsApp. Though he doesn’t go into any detail on why he believes only those two are sustainable.
He does say he’s discounting the Acton-backed alternative, Signal, which now operates via a not-for-profit (the Signal Foundation) — suggesting that rival messaging app is “unlikely to hit 1B users”.
In passing he also throws it out there that Signal is “subsidized, indirectly, by FB ads” — i.e. because Facebook pays a licensing fee for use of the underlying Signal Protocol used to power WhatsApp’s e2e encryption. (So his slightly shade-throwing subtext is that privacy purists are still benefiting from a Facebook sugardaddy.)
Then he gets to the meat of his argument in defence of Facebook-owned (and monetized) WhatsApp — pointing out that Apple’s sustainable business model does not reach every mobile user, given its hardware is priced at a premium. Whereas WhatsApp running on a cheap Android handset ($50 or, perhaps even $30 in future) can.
Other encrypted messaging apps can also of course run on Android but presumably Stamos would argue they’re not professionally run.
“I think it is easy to underestimate how radical WhatsApp’s decision to deploy E2E was,” he writes. “Acton and Koum, with Zuck’s blessing, jumped off a bridge with the goal of building a monetization parachute on the way down. FB has a lot of money, so it was a very tall bridge, but it is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue.
“This could come from directly charging for the service, it could come from advertising, it could come from a WeChat-like services play. The first is very hard across countries, the latter two are complicated by E2E.”
“I can’t speak to the various options that have been floated around, or the arguments between WA and FB, but those of us who care about privacy shouldn’t see WhatsApp monetization as something evil,” he adds. “In fact, we should want WA to demonstrate that E2E and revenue are compatible. That’s the only way E2E will become a sustainable feature of massive, non-niche technology platforms.”
Stamos is certainly right that Apple’s iMessage cannot reach every mobile user, given the premium cost of Apple hardware.
Though he elides the important role that second hand Apple devices play in helping to reduce the barrier to entry to Apple’s pro-privacy technology — a role Apple is actively encouraging via support for older devices (and by its own services business expansion which extends its model so that support for older versions of iOS (and thus secondhand iPhones) is also commercially sustainable).
Robust encryption only being possible via multi-billion user platforms essentially boils down to a usability argument by Stamos — which is to suggest that mainstream app users will simply not seek encryption out unless it’s plated up for them in a way they don’t even notice it’s there.
The follow on conclusion is then that only a well-resourced giant like Facebook has the resources to maintain and serve this different tech up to the masses.
There’s certainly substance in that point. But the wider question is whether or not the privacy trade offs that Facebook’s monetization methods of WhatsApp entail, by linking Facebook and WhatsApp accounts and also, therefore, looping in various less than transparent data-harvest methods it uses to gather intelligence on web users generally, substantially erodes the value of the e2e encryption that is now being bundled with Facebook’s ad targeting people surveillance. And so used as a selling aid for otherwise privacy eroding practices.
Yes WhatsApp users’ messages will remain private, thanks to Facebook funding the necessary e2e encryption. But the price users are having to pay is very likely still their personal privacy.
And at that point the argument really becomes about how much profit a commercial entity should be able to extract off of a product that’s being marketed as securely encrypted and thus ‘pro-privacy’? How much revenue “scale” is reasonable or unreasonable in that scenario?
Other business models are possible, which was Acton’s point. But likely less profitable. And therein lies the rub where Facebook is concerned.
How much money should any company be required to leave on the table, as Acton did when he left Facebook without the rest of his unvested shares, in order to be able to monetize a technology that’s bound up so tightly with notions of privacy?
Acton wanted Facebook to agree to make as much money as it could without users having to pay it with their privacy. But Facebook’s management team said no. That’s why he’s calling them greedy.
Stamos doesn’t engage with that more nuanced point. He just writes: “It is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue” — thereby collapsing the revenue argument into an all or nothing binary without explaining why it has to be that way.
from Social – TechCrunch https://ift.tt/2R3iTls Original Content From: https://techcrunch.com
0 notes
Text
Facebook’s ex-CSO, Alex Stamos, defends its decision to inject ads in WhatsApp
Alex Stamos, Facebook’s former chief security officer, who left the company this summer to take up a role in academia, has made a contribution to what’s sometimes couched as a debate about how to monetize (and thus sustain) commercial end-to-end encrypted messaging platforms in order that the privacy benefits they otherwise offer can be as widely spread as possible.
Stamos made the comments via Twitter, where he said he was indirectly responding to the fallout from a Forbes interview with WhatsApp co-founder Brian Acton — in which Acton hit at out at his former employer for being greedy in its approach to generating revenue off of the famously anti-ads messaging platform.
Both WhatsApp founders’ exits from Facebook has been blamed on disagreements over monetization. (Jan Koum left some months after Acton.)
In the interview, Acton said he suggested Facebook management apply a simple business model atop WhatsApp, such as metered messaging for all users after a set number of free messages. But that management pushed back — with Facebook COO Sheryl Sandberg telling him they needed a monetization method that generates greater revenue “scale”.
And while Stamos has avoided making critical remarks about Acton (unlike some current Facebook staffers), he clearly wants to lend his weight to the notion that some kind of trade-off is necessary in order for end-to-end encryption to be commercially viable (and thus for the greater good (of messaging privacy) to prevail); and therefore his tacit support to Facebook and its approach to making money off of a robustly encrypted platform.
Stamos’ own departure from the fb mothership was hardly under such acrimonious terms as Acton, though he has had his own disagreements with the leadership team — as set out in a memo he sent earlier this year that was obtained by BuzzFeed. So his support for Facebook combining e2e and ads perhaps counts for something, though isn’t really surprising given the seat he occupied at the company for several years, and his always fierce defence of WhatsApp encryption.
(Another characteristic concern that also surfaces in Stamos’ Twitter thread is the need to keep the technology legal, in the face of government attempts to backdoor encryption, which he says will require “accepting the inevitable downsides of giving people unfettered communications”.)
I don't want to weigh into the personal side of the WhatsApp vs Facebook fight, as there are people I respect on both sides, but I do want to use this as an opportunity to talk about the future of end-to-end encryption. (1/13)
— Alex Stamos (@alexstamos) September 26, 2018
This summer Facebook confirmed that, from next year, ads will be injected into WhatsApp statuses (aka the app’s Stories clone). So it is indeed bringing ads to the famously anti-ads messaging platform.
For several years the company has also been moving towards positioning WhatsApp as a business messaging platform to connect companies with potential customers — and it says it plans to meter those messages, also from next year.
So there are two strands to its revenue generating playbook atop WhatsApp’s e2e encrypted messaging platform. Both with knock-on impacts on privacy, given Facebook targets ads and marketing content by profiling users by harvesting their personal data.
This means that while WhatsApp’s e2e encryption means Facebook literally cannot read WhatsApp users’ messages, it is ‘circumventing’ the technology (for ad-targeting purposes) by linking accounts across different services it owns — using people’s digital identities across its product portfolio (and beyond) as a sort of ‘trojan horse’ to negate the messaging privacy it affords them on WhatsApp.
Facebook is using different technical methods (including the very low-tech method of phone number matching) to link WhatsApp user and Facebook accounts. Once it’s been able to match a Facebook user to a WhatsApp account it can then connect what’s very likely to be a well fleshed out Facebook profile with a WhatsApp account that nonetheless contains messages it can’t read. So it’s both respecting and eroding user privacy.
This approach means Facebook can carry out its ad targeting activities across both messaging platforms (as it will from next year). And do so without having to literally read messages being sent by WhatsApp users.
As trade offs go, it’s a clearly a big one — and one that’s got Facebook into regulatory trouble in Europe.
It is also, at least in Stamos’ view, a trade off that’s worth it for the ‘greater good’ of message content remaining strongly encrypted and therefore unreadable. Even if Facebook now knows pretty much everything about the sender, and can access any unencrypted messages they sent using its other social products.
In his Twitter thread Stamos argues that “if we want that right to be extended to people around the world, that means that E2E encryption needs to be deployed inside of multi-billion user platforms”, which he says means: “We need to find a sustainable business model for professionally-run E2E encrypted communication platforms.”
On the sustainable business model front he argues that two models “currently fit the bill” — either Apple’s iMessage or Facebook-owned WhatsApp. Though he doesn’t go into any detail on why he believes only those two are sustainable.
He does say he’s discounting the Acton-backed alternative, Signal, which now operates via a not-for-profit (the Signal Foundation) — suggesting that rival messaging app is “unlikely to hit 1B users”.
In passing he also throws it out there that Signal is “subsidized, indirectly, by FB ads” — i.e. because Facebook pays a licensing fee for use of the underlying Signal Protocol used to power WhatsApp’s e2e encryption. (So his slightly shade-throwing subtext is that privacy purists are still benefiting from a Facebook sugardaddy.)
Then he gets to the meat of his argument in defence of Facebook-owned (and monetized) WhatsApp — pointing out that Apple’s sustainable business model does not reach every mobile user, given its hardware is priced at a premium. Whereas WhatsApp running on a cheap Android handset ($50 or, perhaps even $30 in future) can.
Other encrypted messaging apps can also of course run on Android but presumably Stamos would argue they’re not professionally run.
“I think it is easy to underestimate how radical WhatsApp’s decision to deploy E2E was,” he writes. “Acton and Koum, with Zuck’s blessing, jumped off a bridge with the goal of building a monetization parachute on the way down. FB has a lot of money, so it was a very tall bridge, but it is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue.
“This could come from directly charging for the service, it could come from advertising, it could come from a WeChat-like services play. The first is very hard across countries, the latter two are complicated by E2E.”
“I can’t speak to the various options that have been floated around, or the arguments between WA and FB, but those of us who care about privacy shouldn’t see WhatsApp monetization as something evil,” he adds. “In fact, we should want WA to demonstrate that E2E and revenue are compatible. That’s the only way E2E will become a sustainable feature of massive, non-niche technology platforms.”
Stamos is certainly right that Apple’s iMessage cannot reach every mobile user, given the premium cost of Apple hardware.
Though he elides the important role that second hand Apple devices play in helping to reduce the barrier to entry to Apple’s pro-privacy technology — a role Apple is actively encouraging via support for older devices (and by its own services business expansion which extends its model so that support for older versions of iOS (and thus secondhand iPhones) is also commercially sustainable).
Robust encryption only being possible via multi-billion user platforms essentially boils down to a usability argument by Stamos — which is to suggest that mainstream app users will simply not seek encryption out unless it’s plated up for them in a way they don’t even notice it’s there.
The follow on conclusion is then that only a well-resourced giant like Facebook has the resources to maintain and serve this different tech up to the masses.
There’s certainly substance in that point. But the wider question is whether or not the privacy trade offs that Facebook’s monetization methods of WhatsApp entail, by linking Facebook and WhatsApp accounts and also, therefore, looping in various less than transparent data-harvest methods it uses to gather intelligence on web users generally, substantially erode the value of the e2e encryption that is now being packaged alongside Facebook’s ad targeting people surveillance.
And, well, used as a selling aid for its otherwise privacy eroding practices.
Yes WhatsApp users’ messages will remain private, thanks to Facebook funding the necessary e2e encryption. But the price users are having to pay is very likely still their personal privacy.
And at that point the argument really becomes about how much profit a commercial entity should be able to extract off of a product that’s being marketed as securely encrypted and thus ‘pro-privacy’? How much revenue “scale” is reasonable or unreasonable in that scenario?
Other business models are possible, which was Acton’s point. But likely less profitable. And therein lies the rub where Facebook is concerned.
How much money should any company be required to leave on the table, as Acton did when he left Facebook without the rest of his unvested shares, in order to be able to monetize a technology that’s bound up so tightly with notions of privacy?
Acton wanted Facebook to agree to make as much money as it could without users having to pay it with their privacy. But Facebook’s management team said no. That’s why he’s calling them greedy.
Stamos doesn’t engage with that more nuanced point. He just writes: “It is foolish to expect that FB shareholders are going to subsidize a free text/voice/video global communications network forever. Eventually, WhatsApp is going to need to generate revenue” — thereby collapsing the revenue argument into an all or nothing binary without explaining why it has to be that way.
Via Natasha Lomas https://techcrunch.com
0 notes
Text
Checking for the Latest Windows 10 Update
New Post has been published on https://pagedesignhub.com/checking-for-the-latest-windows-10-update/
Checking for the Latest Windows 10 Update
Q. How do I know if my laptop updated itself to the brand new Creators model of Windows 10 that just came out? I regarded in the device statistics box and it doesn’t inform me whatever that mentions “Creators Update.” And are there any problems to count on with this version of Windows 10?
A. Microsoft’s lately launched Creators Update for Windows 10 is also referred to as Version 1703. You can see what version variety is presently strolling on your PC by means of urgent the Windows and I keys to open the Settings app (or selecting the Settings app from the Start menu) and selecting the System icon.
At the lowest of the list at the left facet of the System Settings container, pick out About. Here, you could see the version of Windows 10 mounted at the laptop (like Windows 10 Home or Windows 10 Pro), in conjunction with the version variety and different technical statistics. If you notice 1703 listed because the model quantity, your PC has updated itself to the Creators Update.
Last months improve to Windows 10 was Microsoft’s maximum recent revision of its Windows 10 working machine, arriving less than a year after the Anniversary Update (Version 1607) in August 2016. The Creators Update consists of several new functions like a 3-D revamp of the Paint program. Another way to see if you have the latest model of Windows 10 is to test your Apps listing for the brand new Paint 3-D program. The Creators Update additionally brings improvements to the Microsoft Edge browser and improvements designed for online game players.
However, as with all main device update, insects are sure to the floor. On Microsoft’s personal on-line boards, a few users have pronounced problems with Bluetooth and internet connectivity, computer-reminiscence issues, Dolby sound failures, crashing apps and other woes. System patches and workarounds will with a bit of luck restoration these problems within the near destiny.
If your PC has already up to date itself to the new edition, you may need to discover the Settings app a chunk more to ensure you’ve got the brand new working machine configured the way you need it. For example, open the Privacy icon on the primary Settings display screen to verify a number of private statistics you need to proportion with Microsoft.
The Sunset of Support for Windows XP You’ve probable been getting the warnings shooting up for your computer’s desktop and on your Microsoft Security Essentials dialogs for a few weeks, and you’ve been seeing the headlines for longer than that. If you have Facebook friends inside the IT industry, potentially they have been sharing articles for the beyond six to 12 months.
By now, you have found out that your Windows XP PC didn’t explode or stop working after the sundown of help, so what are the implications of persevering with to apply an unsupported running gadget? For one, if you want to name Microsoft for aid with any troubles from this day ahead, they are not going to help you. If you’re like the majority, you likely have not called Microsoft within the past dozen years, so that you won’t miss the fact that they’re not going to be there going ahead. Rest confident that for so long as you want to keep the usage of XP, consultancies like Maverick Solutions can be there to assist solve any problems you can have.
Without Microsoft support, but, there will be no greater security patches, function updates, worm-fixes, or driver updates. Presumably after 12 years, Microsoft has probably found and resolved maximum of the insects. For all of the present day hardware in lifestyles, drivers have already been published if they’re going to be. There may be no new Windows features, so modern Windows XP is the pleasant it is ever going to get.
What about security? Hackers had been attacking technology for so long as people had been the use of era, and nothing goes to trade that. In the beyond, while Microsoft identified a vulnerability in Windows XP, they released a patch to accurate it. The identity of vulnerabilities, but, is typically the result of analyzing exploitations of those vulnerabilities, after the truth. Just like medication does not create vaccinations earlier than diseases are observed, so, too, security professionals do not patch safety holes till someone finds and exploits the ones holes. Even then, it takes time to develop answers, and it takes time to distribute them to Windows customers. If your pc become configured to automatically down load and installation Windows updates, it nonetheless would possibly have taken per week or longer earlier than your pc received and established safety patches. If your computer turned into configured otherwise, you would possibly have by no means received such patches.
In reality, there are tens of millions of bad men attacking technology, and plenty of fewer safety specialists protecting us from them, so the best guys tend to apply a sort of triage when figuring out which holes to patch first. The ones that have the capability to cause the maximum giant damage are remediated first, and the extra-difficult to understand or less-harmful ones are left at the returned burner. Third-birthday party anti-malware software has the equal shortcomings, so relying totally on working device patches and anti-malware software is in no way the excellent manner to shield your systems.
The reality that Microsoft is stopping support for XP and shifting their security professionals to the later working systems is definitely an excellent signal for Windows XP users, in a way. Just as protection experts try and make the most of their time by way of remediating the maximum-vast, maximum-harmful malware, hackers save money on their time, too, by means of attacking the maximum common software program. If less than one percentage of ultra-modern computers still use Nineteen Eighties Microsoft DOS, there may be no vig in locating vulnerabilities; there could be terribly few places to take advantage of those vulnerabilities and it might take time to even locate those structures. Microsoft transferring its protection professionals’ mitigation efforts from Windows XP to the later operating systems is indicative of the increasing market-proportion of those running systems, to be able to additionally entice greater hackers away from Windows XP.
As a strategy, however, the exceptional anti-malware concept continues to be effective, and continues to be loose: do not use an administrator account as your normal user account. The 2d-first-class strategy may also remain unfastened and powerful for a bit longer: deploy and update Microsoft Security Essentials. Microsoft introduced they’ll keep to provide it to Windows XP users through July. If you want help employing both of those strategies, are searching for out a local consultancy like ours to come back set them up for you.
So if everything goes to keep operating, why could everyone want to improve to a brand new running device? The large majority of generation consultants has been touting protection worries as the reason to improve, but we at Maverick Solutions believe that capability and features are more likely to make you take the plunge.
Windows XP only helps Internet Explorer up to version eight, however later versions of the operating machine support later variations of IE – it’s as much as model eleven already. You may additionally have noticed that a number of the greater interactive Websites are already appearing sluggish or buggy in IE8. Facebook crashes often, as an example. Other than upgrading Windows, you may upload a 3rd-celebration browser, such as Firefox or Chrome, however bear in mind that each additional piece of software program you install takes up room to your difficult drive, which makes your system perform fairly less efficiently.
0 notes
Text
New Post has been published on Weblistposting
New Post has been published on https://weblistposting.com/the-way-to-deploy-home-windows-10-updates-with-out-a-web-connection/
The way to deploy Home windows 10 updates with out a web connection
While Microsoft launched the Windows 10 working system in 2015, they promised every year updates. Microsoft targeted at the point that Home windows 10 isn’t always an OS, however, a carrier. It will likely be supported frequently in the course of its lifecycle. Home windows 10 got some new additions to its features listing in the Anniversary Replace in mid-2016. It’s miles 2017 now and Microsoft has launched the Creators Replace for Home windows 10.
The updates on Home windows 10 are usually released in phases, with the flagship laptops receiving it first accompanied by means of much less capable gadgets. The Replace roll-out additionally relies upon on the make and producer of your computer. There are some people who like to attend till their laptop notifies them about the Update. But, a few want to attempt it out before the rest of the world catches up. It can additionally appear that your Windows 10 Computer isn’t connected to a web connection in any respect or uses a metered connection out of your phone. So, is there any way to get Windows updates on your computer without it being related to fast or no net connection?
Yes, you could. Microsoft has a device specifically built for this cause and it’s called the Media Creation tool.
The idea of the Media Introduction device is quite simple – you may download a valid copy of Home windows 10 with the latest Replace on some other Laptop with an internet connection and set up it to your Computer thru a removable media like a DVD or a USB flash force. But, you need to have an authorized reproduction of Home windows 10 pre-hooked up for your Computer. The tool gives you a choice to either install the downloaded files in your Computer as an Update or perform a clean set up via ISO files. Considering the fact that we are trying to preserve our documents and settings most of the time, updating is the Pc is the pleasant way to go. The device can be downloaded for free from Microsoft’s website and in all fairness simple to use.
Notice: You want to have a USB flash drive plugged into your laptop. Understand that this process will erase all other records before downloading the report on the flash force, so take a backup of the present data at the flash force. If there’s any other flash drive attached to the laptop, you’ll get an option to pick your desired flash pressure.
1. download the Media Introduction device from Microsoft’s internet site. It’s miles available for free and weighs around 18MB. set up it on a Computer with a web connection. Be aware that you want to have Administrator get entry to at the Laptop you are downloading the documents. you may also need to just accept the phrases and conditions of the Media Creation tool earlier than progressing.
The Sundown of Assist for Home windows XP
You’ve got probably been getting the warnings doping up to your laptop’s desktop and on your Microsoft Security Essentials dialogs for a few weeks, and you’ve been seeing the headlines for longer than that. If you have Fb buddies inside the IT enterprise, probably they have been sharing articles for the past six to three hundred and sixty-five days.
through now, You’ve got realized that your Home windows XP computer did not explode or forestall operating after the Sundown of Aid, so what are the results of continuing to use an unsupported running gadget? For one, if you need to name Microsoft for Assist with any troubles from nowadays ahead, they may be no longer going that will help you. If you are like the majority, you likely have not referred to as Microsoft within the beyond dozen years, so you may not omit the truth that they may be no longer going to be there going ahead. rest confident that for so long as you need to hold the use of XP, consultancies like Maverick Answers will be there to assist resolve any problems you could have.
without Microsoft Guide, But, there will be no more Security patches, feature updates, trojan horse-fixes, or driver updates. Presumably, after 12 years, Microsoft has probably determined and resolved maximum of the bugs. For all the modern hardware in life, drivers have already been published if they’re going to be. There will be no new Windows capabilities, so brand new Windows XP is great it is ever going to get.
What about Safety? Hackers have been attacking generation for as long as people had been the use of era, and nothing is going to change that. within the past, Whilst Microsoft recognized a vulnerability in Home windows XP, they launched a patch to accurate it. The identity of vulnerabilities, However, is generally the end result of analyzing exploitations of those vulnerabilities, after the fact. Much like a medicinal drug would not create vaccinations earlier than diseases are observed, so, too, Safety professionals don’t patch Safety holes until someone unearths and exploits the one’s holes. Even then, it takes the time to increase Answers, and it takes the time to distribute them to Windows customers. If your computer becomes configured to robotically download and install Windows updates, it still would possibly have taken per week or longer before your computer acquired and established Safety patches. In case your computer became configured otherwise, you might have in no way received such patches.
In reality, there are thousands and thousands of terrible guys attacking era, and many fewer Protection professionals defending us from them, so the good guys generally tend to use a form of triage When determining which holes to patch first. Those that have the ability to reason the greatest damage are remediated first, and the greater difficult to understand or less-dangerous ones are left at the returned burner. 1/3-birthday party anti-malware software program has the same shortcomings, so depending solely on running device patches and anti-malware software is by no means the quality manner to defend your systems.
The truth that Microsoft is stopping Assist for XP and shifting their Security experts to the later working systems is genuinely a terrific sign for Home windows XP users, in a way. Simply as Security professionals try to make the most in their time by way of remediating the maximum-giant, maximum-harmful malware, hackers save money on their time, too, with the aid of attacking the maximum commonplace software. If less than one percentage of state-of-the-art computers still use 1980s Microsoft DOS, there’s no vig in finding vulnerabilities; there could be terribly few places to make the most the one’s vulnerabilities and it might take the time to even locate those systems. Microsoft moving its Safety specialists’ mitigation efforts from Windows XP to the later operating systems is indicative of the increasing market percentage of those working systems, in an effort to additionally attract extra hackers away from Home windows XP.
As a method, But, the fine anti-malware concept continues to be powerful, and remains unfastened: do not use an administrator account as your normal consumer account. The second-satisfactory strategy can even remain loose and powerful for a bit longer: installation and Replace Microsoft Protection Necessities. Microsoft introduced they’ll keep to offer it to Windows XP users thru July. if you need help using either of these techniques, searching for out a nearby consultancy like ours to come set them up for you.
So if the whole lot is going to preserve working, why would anybody want to upgrade to a new working system? The large majority of technology consultants has been touting Safety concerns because the cause to upgrade, but we at Maverick Solutions agree with that capability and functions are much more likely to make you take the plunge.
Home windows XP simplest supports internet Explorer as much as model eight, however later variations of the working device Support later versions of IE – it’s up to model eleven already. you may have noticed that some of the more interactive Web sites are already performing sluggish or buggy in IE8. Fb crashes often, as an example. Other than upgrading Home windows, you could upload a third-birthday celebration browser, inclusive of Firefox or Chrome, but undergo in mind that each additional piece of software you install takes up room on your difficult drive, which makes your system perform relatively less successfully.
New hardware is much less and much less in all likelihood to be supported via Windows XP, so when you upgrade your multifunction printer or buy anything technology of film participant comes out after Blue-ray, you can no longer be able to installation it in any respect, or even if it does installation, you could now not be able to get admission to all of its capabilities. New software program will prevent being evolved for Windows XP, too, so at some point your annual tax-prep package of TurboTax or Tax Cut, as an instance, will no longer be available in an XP flavor. in case you’re a gamer, you are not studying this text – You’ve got already upgraded years ago.
0 notes
Text
The True Cost of Israel
The American Israel Public Affairs Committee (AIPAC) concluded its annual conference late last month, triggering the usual debate in various alternative media outlets. Why does so much U.S. taxpayer money go to a small and not particularly useful client state that has a vibrant European-level economy and is already a regional military colossus?
Those who support the cash flow argue that Israel is threatened, most notably by Iran; they claim the assistance, which has been largely but not completely used to buy American-made weapons, is required to maintain a qualitative edge over the country’s potential enemies. Those who oppose the aid would counter that the Iranian threat is largely an Israeli and Saudi Arabian invention, used to justify continued American support for the national-security policies of both countries. And they would add that Tel Aviv is more than able to defend itself and pay for its own military establishment.
In truth, American aid to Israel is something like a pot of gold that keeps on giving. Both sides in the discussion would probably agree that the domestic Israel Lobby has been instrumental in sustaining the high level of aid, though they would undoubtedly disagree over whether that is a good or bad thing. The operation of “The Lobby,” generally regarded as the most powerful voice on foreign policy in Washington, led Professors Stephen Walt and John Mearsheimer to ask, “Why has the U.S. been willing to set aside its own security … in order to advance the interests of another state? [No] explanation can account for the remarkable level of material and diplomatic support that the U.S. provides.” They observed that “Other special interest groups have managed to skew foreign policy, but no lobby has managed to divert it as far from what the national interest would suggest, while simultaneously convincing Americans that U.S. interests and those of the other country—in this case, Israel—are essentially identical.”
Since the foundation of the state of Israel in 1948, it has been “the largest cumulative recipient of U.S. foreign assistance since World War II,” according to the Congressional Research Service. The United States has provided Israel with $233.7 billion in adjusted for inflation aid between 1948 through the end of 2012, reports Haaretz. Current discussions center on the Obama administration’s memo of understanding with Israel that promised it $38 billion in military assistance over the next 10 years, a considerable sum but nevertheless a total that is far less than what is actually received annually from the United States Treasury and from other American sources.
Senator Lindsey Graham (R-S.C.), speaking in the most recent legislative discussion over Israeli aid, stated that the $38 billion should be regarded as a floor, and that Congress should approve additional funds for Israeli defense as needed. It has, in fact, done so. At its most recent meeting, AIPAC announced the latest windfall from America, applauding “the U.S. House of Representatives for significantly bolstering its support of U.S.-Israel missile defense cooperation in the FY 2017 defense appropriations bill. The House appropriated $600.7 million for U.S.-Israel missile defense programs.” And there is a long history of such special funding for Israeli-connected projects. The Iron Dome missile-defense system was largely funded by the United States, to the tune of more than $1 billion. In the 1980s, the Israeli Lavi jet-fighter development program was funded by Washington, costing $2 billion to the U.S. taxpayer before it was terminated over technical and other problems, part of $5.45 billion in Pentagon funding of various Israeli weapons projects through 2002.
The admittedly unreliable former Congressman James Traficant once claimed that “Israel gets $15 billion per year from the American taxpayers.” Indeed, how Israel gets money from the United States is actually quite complex and not very transparent to the American public, going well beyond the check for $3.8 billion handed over at the beginning of the fiscal year on October 1. Even that check, uniquely given to aid recipient Israel as one lump sum on the first day of the year, is manipulated to produce extra revenue. It is normally immediately redeposited with the U.S. Treasury, which then, because it operates on a deficit, borrows the money to pay interest on it as the Israelis draw it down. That interest payment costs the American taxpayer an estimated $100 million more per year. Israel has also been adept at using “loan guarantees,” an issue that may have contributed to the downfall of President George H.W. Bush. The reality is that the loans, totaling $42 billion, are never repaid by Israel, meaning that the United States Treasury picks up the tab on principle and interest, a form of additional assistance. The Bush-era loan amounted to $10 billion.
Department of Defense co-production projects, preferential contracting, “scrapping” or “surplusing” of usable equipment that is then turned over to the Israel Defense Forces (IDF), as well as the forward deployment of military hardware to an Israeli-run base in Israel (used to support local military operations), are considerable benefits to Tel Aviv’s bottom line. Much of this assistance is hidden from view.
In 1992, AIPAC President James Steiner bragged how he “got almost a billion dollars in other goodies [in negotiations with Secretary of State Jim Baker] that people don’t even know about.” In September 2012, Israel’s former commander-in-chief, Gen. Gabi Ashkenazi, admitted at a conference that between 2009 and 2012 American taxpayers had paid for more of his country’s defense budget than had Israeli taxpayers. Those numbers have been disputed, but the fact remains that a considerable portion of the Israeli military spending comes from the United States. It currently is more than 20 percent of the total $16 billion budget, not counting special appropriations.
Through tax exemptions, the U.S. government also subsidizes the coordinated effort to provide additional assistance to Israel. No other lobbying effort to promote the interests of a foreign country benefits in like fashion, and, indeed, most similar groups are required to register under the Foreign Agents Registration Act of 1938, as former National Security Advisor Michael Flynn has learned to his chagrin regarding Turkey.
Most organizations and foundations that might reasonably be considered active parts of the Israel Lobby are generally registered with the Department of the Treasury as 501(c)3 tax-exempt educational foundations. Grant Smith, speaking at a conference on the U.S. and Israel on March 24, explained how the broader Israel Lobby uses this legal framework:
Key U.S. organizations include the American Israel Public Affairs Committee (AIPAC), the American Jewish Committee (AJC), the Zionist Organization of America (ZOA) and the Anti-Defamation League (ADL). Hundreds more, including a small number of evangelical Christian organizations, play a role within a vast ecosystem that demands unconditional U.S. support for Israel. In the year 2012 the nonprofit wing of the Israel lobby raised $3.7 billion in revenue. They are on track to reach $6.3 billion by 2020. Collectively they employed 14,000 and claimed 350,000 volunteers.
The $3.7 billion raised in 2012 was largely tax exempt and it does not include the billions in private donations that go directly to Israel, as well as the billions in contributions that are regarded as covered by “religious exemptions” for groups that don’t file at all. There are also contributions sent straight to various Israeli-based foundations that are themselves often registered as charities. The Forward magazine investigated 3,600 Jewish tax-exempt charitable foundations in 2014 and determined that they had net assets of $26 billion, $12–14 billion in annual revenue, and “focuse[d] the largest share of [their] donor dollars on Israel.” That share amounted to 38 percent of total income. The Forward adds that it is “an apparatus that benefits massively from the U.S. federal government and many state and local governments, in the form of hundreds of millions of dollars in government grants, billions in tax-deductible donations and billions more in program fees paid for with government funds.”
Some pro-Israel foundations are in-your-face about their goals. The Friends of the Israel Defense Forces, which “Support[s] the wellbeing and education needs of Israel’s brave soldiers,” is a registered tax-exempt charity that conducts fundraisers throughout the United States. Money being fungible, some American Jews have been surprised to learn that the donations that they had presumed were going to what they regard as charitable causes in Israel have instead wound up in expanding the illegal settlements on the West Bank, an objective that they might not support. It was recently reported that Donald Trump’s son-in-law and advisor Jared Kushner has a family foundation that has made donations to Israel, including funding of West Bank settlements, which is illegal under U.S. law.
Israel also benefits in other ways, frequently due to legislative action by Congress. It enjoys free and even preferential trade status with the United States and runs a $9 billion trade surplus per annum. Its companies and parastatal organizations can, without any restrictions, bid on U.S. defense and homeland-security projects—a privilege normally only granted to NATO partners—which has given it dominance in some U.S. law-enforcement, telecommunications, and travel-security sectors. Its involvement in the development and use of classified military technologies developed by U.S. arms producers has sometimes led to claims that Israel has adopted and adapted—or even stolen—proprietary information and then used it to develop its own arms industry, which is now ranked sixth in the world by volume of sales. Ironically, U.S. taxpayers have subsidized an Israeli industry that then competes directly with American companies, producing a loss of jobs in the United States.
There has also been considerable collateral damage derived from the relationship with Israel, including the Arab Oil embargo and possibly even some blame for the ruinous cost of Iraq, which many believe to have been fought in part for Israel. But even without that war, the U.S.-Israeli bilateral relationship has been an expensive proposition for Americans. Whether Israel is a strategic liability or not, or whether its complicated geostrategic situation merits virtually unquestioning support from the United States, the reality is that it has a lopsided relationship with Washington. This has long been and continues to be largely paid for by the United States taxpayer, who is not as well off as he once was.
The U.S.-Israel relationship is yet another instance where the perceived needs of an American “ally” take precedence over genuine national interests. Tens of billions of dollars need not necessarily be spent to placate a wealthy foreign country and its powerful domestic lobby. Indeed, other options to employ the money closer to home—in the form of schools, highways, and hospitals—may become increasingly attractive to American voters.
Philip Giraldi, a former CIA officer, is executive director of the Council for the National Interest.
Powered by WPeMatico
from http://www.therightnewsnetwork.com/the-true-cost-of-israel/
0 notes
Text
The True Cost of Israel
New Post has been published on http://www.therightnewsnetwork.com/the-true-cost-of-israel/
The True Cost of Israel
The American Israel Public Affairs Committee (AIPAC) concluded its annual conference late last month, triggering the usual debate in various alternative media outlets. Why does so much U.S. taxpayer money go to a small and not particularly useful client state that has a vibrant European-level economy and is already a regional military colossus?
Those who support the cash flow argue that Israel is threatened, most notably by Iran; they claim the assistance, which has been largely but not completely used to buy American-made weapons, is required to maintain a qualitative edge over the country’s potential enemies. Those who oppose the aid would counter that the Iranian threat is largely an Israeli and Saudi Arabian invention, used to justify continued American support for the national-security policies of both countries. And they would add that Tel Aviv is more than able to defend itself and pay for its own military establishment.
In truth, American aid to Israel is something like a pot of gold that keeps on giving. Both sides in the discussion would probably agree that the domestic Israel Lobby has been instrumental in sustaining the high level of aid, though they would undoubtedly disagree over whether that is a good or bad thing. The operation of “The Lobby,” generally regarded as the most powerful voice on foreign policy in Washington, led Professors Stephen Walt and John Mearsheimer to ask, “Why has the U.S. been willing to set aside its own security … in order to advance the interests of another state? [No] explanation can account for the remarkable level of material and diplomatic support that the U.S. provides.” They observed that “Other special interest groups have managed to skew foreign policy, but no lobby has managed to divert it as far from what the national interest would suggest, while simultaneously convincing Americans that U.S. interests and those of the other country—in this case, Israel—are essentially identical.”
Since the foundation of the state of Israel in 1948, it has been “the largest cumulative recipient of U.S. foreign assistance since World War II,” according to the Congressional Research Service. The United States has provided Israel with $233.7 billion in adjusted for inflation aid between 1948 through the end of 2012, reports Haaretz. Current discussions center on the Obama administration’s memo of understanding with Israel that promised it $38 billion in military assistance over the next 10 years, a considerable sum but nevertheless a total that is far less than what is actually received annually from the United States Treasury and from other American sources.
Senator Lindsey Graham (R-S.C.), speaking in the most recent legislative discussion over Israeli aid, stated that the $38 billion should be regarded as a floor, and that Congress should approve additional funds for Israeli defense as needed. It has, in fact, done so. At its most recent meeting, AIPAC announced the latest windfall from America, applauding “the U.S. House of Representatives for significantly bolstering its support of U.S.-Israel missile defense cooperation in the FY 2017 defense appropriations bill. The House appropriated $600.7 million for U.S.-Israel missile defense programs.” And there is a long history of such special funding for Israeli-connected projects. The Iron Dome missile-defense system was largely funded by the United States, to the tune of more than $1 billion. In the 1980s, the Israeli Lavi jet-fighter development program was funded by Washington, costing $2 billion to the U.S. taxpayer before it was terminated over technical and other problems, part of $5.45 billion in Pentagon funding of various Israeli weapons projects through 2002.
The admittedly unreliable former Congressman James Traficant once claimed that “Israel gets $15 billion per year from the American taxpayers.” Indeed, how Israel gets money from the United States is actually quite complex and not very transparent to the American public, going well beyond the check for $3.8 billion handed over at the beginning of the fiscal year on October 1. Even that check, uniquely given to aid recipient Israel as one lump sum on the first day of the year, is manipulated to produce extra revenue. It is normally immediately redeposited with the U.S. Treasury, which then, because it operates on a deficit, borrows the money to pay interest on it as the Israelis draw it down. That interest payment costs the American taxpayer an estimated $100 million more per year. Israel has also been adept at using “loan guarantees,” an issue that may have contributed to the downfall of President George H.W. Bush. The reality is that the loans, totaling $42 billion, are never repaid by Israel, meaning that the United States Treasury picks up the tab on principle and interest, a form of additional assistance. The Bush-era loan amounted to $10 billion.
Department of Defense co-production projects, preferential contracting, “scrapping” or “surplusing” of usable equipment that is then turned over to the Israel Defense Forces (IDF), as well as the forward deployment of military hardware to an Israeli-run base in Israel (used to support local military operations), are considerable benefits to Tel Aviv’s bottom line. Much of this assistance is hidden from view.
In 1992, AIPAC President James Steiner bragged how he “got almost a billion dollars in other goodies [in negotiations with Secretary of State Jim Baker] that people don’t even know about.” In September 2012, Israel’s former commander-in-chief, Gen. Gabi Ashkenazi, admitted at a conference that between 2009 and 2012 American taxpayers had paid for more of his country’s defense budget than had Israeli taxpayers. Those numbers have been disputed, but the fact remains that a considerable portion of the Israeli military spending comes from the United States. It currently is more than 20 percent of the total $16 billion budget, not counting special appropriations.
Through tax exemptions, the U.S. government also subsidizes the coordinated effort to provide additional assistance to Israel. No other lobbying effort to promote the interests of a foreign country benefits in like fashion, and, indeed, most similar groups are required to register under the Foreign Agents Registration Act of 1938, as former National Security Advisor Michael Flynn has learned to his chagrin regarding Turkey.
Most organizations and foundations that might reasonably be considered active parts of the Israel Lobby are generally registered with the Department of the Treasury as 501(c)3 tax-exempt educational foundations. Grant Smith, speaking at a conference on the U.S. and Israel on March 24, explained how the broader Israel Lobby uses this legal framework:
Key U.S. organizations include the American Israel Public Affairs Committee (AIPAC), the American Jewish Committee (AJC), the Zionist Organization of America (ZOA) and the Anti-Defamation League (ADL). Hundreds more, including a small number of evangelical Christian organizations, play a role within a vast ecosystem that demands unconditional U.S. support for Israel. In the year 2012 the nonprofit wing of the Israel lobby raised $3.7 billion in revenue. They are on track to reach $6.3 billion by 2020. Collectively they employed 14,000 and claimed 350,000 volunteers.
The $3.7 billion raised in 2012 was largely tax exempt and it does not include the billions in private donations that go directly to Israel, as well as the billions in contributions that are regarded as covered by “religious exemptions” for groups that don’t file at all. There are also contributions sent straight to various Israeli-based foundations that are themselves often registered as charities. The Forward magazine investigated 3,600 Jewish tax-exempt charitable foundations in 2014 and determined that they had net assets of $26 billion, $12–14 billion in annual revenue, and “focuse[d] the largest share of [their] donor dollars on Israel.” That share amounted to 38 percent of total income. The Forward adds that it is “an apparatus that benefits massively from the U.S. federal government and many state and local governments, in the form of hundreds of millions of dollars in government grants, billions in tax-deductible donations and billions more in program fees paid for with government funds.”
Some pro-Israel foundations are in-your-face about their goals. The Friends of the Israel Defense Forces, which “Support[s] the wellbeing and education needs of Israel’s brave soldiers,” is a registered tax-exempt charity that conducts fundraisers throughout the United States. Money being fungible, some American Jews have been surprised to learn that the donations that they had presumed were going to what they regard as charitable causes in Israel have instead wound up in expanding the illegal settlements on the West Bank, an objective that they might not support. It was recently reported that Donald Trump’s son-in-law and advisor Jared Kushner has a family foundation that has made donations to Israel, including funding of West Bank settlements, which is illegal under U.S. law.
Israel also benefits in other ways, frequently due to legislative action by Congress. It enjoys free and even preferential trade status with the United States and runs a $9 billion trade surplus per annum. Its companies and parastatal organizations can, without any restrictions, bid on U.S. defense and homeland-security projects—a privilege normally only granted to NATO partners—which has given it dominance in some U.S. law-enforcement, telecommunications, and travel-security sectors. Its involvement in the development and use of classified military technologies developed by U.S. arms producers has sometimes led to claims that Israel has adopted and adapted—or even stolen—proprietary information and then used it to develop its own arms industry, which is now ranked sixth in the world by volume of sales. Ironically, U.S. taxpayers have subsidized an Israeli industry that then competes directly with American companies, producing a loss of jobs in the United States.
There has also been considerable collateral damage derived from the relationship with Israel, including the Arab Oil embargo and possibly even some blame for the ruinous cost of Iraq, which many believe to have been fought in part for Israel. But even without that war, the U.S.-Israeli bilateral relationship has been an expensive proposition for Americans. Whether Israel is a strategic liability or not, or whether its complicated geostrategic situation merits virtually unquestioning support from the United States, the reality is that it has a lopsided relationship with Washington. This has long been and continues to be largely paid for by the United States taxpayer, who is not as well off as he once was.
The U.S.-Israel relationship is yet another instance where the perceived needs of an American “ally” take precedence over genuine national interests. Tens of billions of dollars need not necessarily be spent to placate a wealthy foreign country and its powerful domestic lobby. Indeed, other options to employ the money closer to home—in the form of schools, highways, and hospitals—may become increasingly attractive to American voters.
Philip Giraldi, a former CIA officer, is executive director of the Council for the National Interest.
Powered by WPeMatico
http://www.therightnewsnetwork.com/the-true-cost-of-israel/ %cats%
0 notes
Text
THE ANATOMY OF THE FRONT
Java: C is too low-level. People may still watch things they call TV shows, but they'll watch them mostly on computers. Apple I when Woz first started working on it. But these are equivalent to money; the proof is that investors are willing if forced to treat them as interchangeable, granting the same status to sweat equity and the equity they've purchased with cash. It sounds benevolent to say we ought to be able to avoid the usual chicken and egg problem new protocols face, because some of the best programs were essays, in the sense that the higher you go the fewer instances you find. How big is the hacker market, after all? That might be ok if there were other sources of capital for new companies. This is particularly true of young people who have them happier. They'd turn down the nerds in favor of the smooth-talking MBA in a suit, because that would be awkward to describe as regular expressions can be described easily as recursive functions. It's not because they're irresponsible that they work in long binges during which they blow off all other obligations, plunge straight into programming instead of writing specs first, and rewrite code that already works.
Resourceful implies the obstacles are external, which they generally are in startups. That sounds harmless. But the greatest benefit of disagreeing well is not just a consequence of startups. If we think of the core language, prior to any additional notations about implementation, be defined this way. So if you want to attract hackers to write software? DH5.1 That's what a lot of startups here.2 On one hand, entrenched protocols are impossible to replace. It was a novel thing to be able to see that it's right. The most obvious advantage of classifying the forms of disagreement. But investors are so fickle that you can never safely treat fundraising as more than a plan A. It's populated by people who talk a lot with one another as they work slowly but harmoniously on conservative, expensive projects whose destinations are decided in advance, and who carefully adjust their manner to reflect their position in the hierarchy.
Though better than attacking the author, this is the place to start. If you want to make code too dense. And Microsoft is going to happen to all those extra cycles that faster hardware is going to be at odds with it, because organizations are designed to prevent what programmers strive for.3 And that's a chilling thought, because it makes the rich richer too. Hiring too fast is by far the biggest killer of startups that raise money. I can't believe the author dismisses intelligent design in such a cavalier fashion. Maybe, I suggested, he should buy some stock in this company. But the greatest benefit of disagreeing well is not just a consequence of startups. The last 10 years have reminded us what Moore's Law actually says. This is the type of abuse we may be able to solve part of the definition of an organization not to. DH1 than up in DH6. Trevor showed up at my house recently, he was carrying a Powerbook identical to mine.
I could start a company by just writing code. And that helps overcome their understandable fear of investing in a company run by nerds who look like and perhaps are college students. But in writing and painting they're mostly internal; the obstacle is your own obtuseness. When you see these ideas laid out like that, it's hard not to end up making something of value to a lot of people are going to want these. If I spend several hours a day, and TV is premised on such long sessions unlike Google, which prides itself on sending users on their way quickly that anything that takes up their time is competing with it. No first use of software patents against companies with less than 25 people.4 Oddly enough, scheduled distractions may be worse than unscheduled ones. As anyone who has worked for the government knows, the important thing is not to make the poor richer.
And not just because it's free, but because it's not officially sanctioned, he has to do it is to write compilers that generate fast code. Since there's a fixed cost each time you start working on a program it can take to start a startup by just writing code. And when the Mac appeared, it was like coming home. Architects are constantly interacting face to face. Till about 2002 you could safely misinterpret it as promising that clock speeds would double every 18 months. And they weren't antialiased. This is just a guess. Even the most ambitious people are probably best off approaching them obliquely.
Either some company like Netflix or Apple will be the ones that generate most growth if they succeed? It would feel unnatural to him to behave any other way. APL: Fortran isn't good enough at manipulating arrays. PL/1: Fortran doesn't have enough data types. The structural change in the way only founders can. If you have something real to say, being mean just gets in the way you'd expect any subculture to be, but a return. Won't we just tell computers what we want them to do?5 No, you can't seem to get those by hiring them.
Notes
Free money to spend a lot more frightening in those days, and partly because users hate the idea. In fact, we can easily imagine. If they no longer needed, big companies could dominate through economies of scale. The latter type is sometimes called an HR acquisition.
Super-angels hate to match.
The facts about Apple's early history are from being overshadowed by Microsoft, would increase the size of the Dead was shot there. But it's easy to believe, which I deliberately pander to readers, because the publishers exert so much better to overestimate than underestimate the importance of making a good problem to fit your solution. Without visual cues e.
VCs. Managers are presumably wondering, how could I get attacked a lot of legal business.
But the margins are greater on products. Some of the economy.
#automatically generated text#Markov chains#Paul Graham#Python#Patrick Mooney#programs#cycles#VCs#obligations#implementation#days
0 notes
Text
HOW ART CAN YOU LOVE
Now publishing online is becoming so popular that everyone wants to do it. Maybe that's possible, but I personally have timed out. If you want to understand economic inequality—and more importantly, if you have to choose between two theories, prefer the one that doesn't center on you. Variation in productivity is accelerating.1 Its purpose is to shield the pointy-haired boss doesn't even want to think about. If you try to start a startup. As for libraries, their importance also depends on the application. We'd ask why we even hear about new languages like Perl and Python. Most high school students applying to college do it with the usual child's mix of inferiority and self-centeredness combine to make us believe that every judgement of us is about us.2 Probably because small children are particularly horrified by it. If you start a company, the less you need the money.
You probably never can completely undo the effects of lies you were told as a kid I was confused for years about him. If they get something wrong, it's usually not realizing they have to be working for an existing company for a couple years before starting your own company.3 If you're young, you should take the riskiest investments you can find. Poverty and economic inequality are not identical.4 I mention this mostly as a joke, but it is enough in simple cases like this. There will be a few stars who clearly should make the team, and if it doesn't work, then go work for another company for two years, and the rest of the company through the COO. You'll learn some valuable things by going to work for.
It's common for startup founders of all ages to build things no one wants. It's not literally true that you can't solve this problem in other languages. They'll do well at it too, because determination is the main reason is that he likes the way source code looks. The more general version is our answer to the Greeks: Don't see purpose where there isn't.5 He thinks you should write it in. So you can test equality by comparing a pointer, instead of comparing each character. If you ask yourself what you spend your time on them have to be paid enough to prevent them from doing it. Actually this seems to be a job.6 But like a lot of changing the subject when death came up.
So they give you very precise numbers about variation in wealth and income, then follow it with the usual child's mix of inferiority and self-centeredness in that they assume that admissions committees must be all-seeing; self-centeredness in that they assume that admissions committees must be all-seeing; self-centeredness in that they assume that admissions committees must be all-seeing; self-centeredness combine to make applicants passive in applying and hurt when they're rejected. All users care about is whether your site or software gives them what they want. Though lie has negative connotations, I don't mean this in an insulting way—of the kind of people who do that tend not to have much power in big companies unless they happen to be the CEO. Richard Dawkins made another step in that direction only in the last 10 years.7 If one woodworker makes 5 chairs and another makes none, the second woodworker will have less money, investors have less power over them. Closely related to poverty is lack of social mobility. Startups are almost entirely a product of the Gilded Age, and things have changed since then.8 So when I say it would take ITA's imaginary competitor five years to duplicate something ITA could write in Lisp in three months, I mean five years if nothing goes wrong.9
How you live affects how long you live.10 Their dislike of the idea is so visceral it's probably inborn.11 It also gives them more power relative to employers.12 In past times people lied to kids about some things more than we do now, but the Lisp that we actually ended up with was based on something separate that he did as a theoretical exercise—an effort to define a more convenient alternative to the Turing Machine. Is life actually short, or are we really complaining about its finiteness? The more confident people are, the more risk you should take the riskiest investments you can find. The founders will run engineering directly, and the next stop seems to be that that Python is a more elegant alternative to Perl, but what this case shows is that power is the ultimate threat.13 You could also try the startup first, and if the difference between the two, you can, to a limited extent, simulate a closure a function that generates accumulators—a function that refers to variables defined in enclosing scopes by defining a class with one method and a field to replace each variable from an enclosing scope.
The Matrix have such resonance. Ignorance can't solve everything though. Present-day Fortran is now arguably closer to Lisp than to Fortran I. They want to believe they're living in a comfortable, safe world as much as their parents want them to believe it. If you just need to feed data from one Windows app to another, sure, use Visual Basic. But from what I've heard the founders didn't just give in and take whoever the VCs wanted.14 But as I explained in The Refragmentation, that was an anomaly—a unique combination of circumstances that compressed American society not just economically but culturally too. The VCs will have to be really good at tricking you. As for number 8, this may be one of those things the old tell the young, but don't expect them to listen to.15 But there's more to it than that. Close, but they don't realize it.16
Variation in productivity is always going to produce some baseline growth in economic inequality we've seen since then has been due to bad behavior of various degrees of oddness, and violent anger. It does help too to feel that you've squeezed everything out of some experience. But the unconscious form is very widespread. What we mean by a programming language in this sense, but the Lisp that we actually ended up with was based on something separate that he did as a theoretical exercise—an effort to define a more convenient alternative to the Turing Machine.17 His body switches to an emergency source of energy that's faster than regular aerobic respiration. But if they don't want to wait for Python to evolve the rest of the way into Lisp, they could always just.18 We found the startups that did best were the ones with the sort of conservatism that comes from weakness.19
Notes
Parents move to suburbs to raise their kids to be staying at a discount of 30% means when it converts. Steep usage growth predicts x% revenue growth with retained earnings was one that we know exactly what they're really works of anthropology.
Life seemed so much about prestige is that it's hard to answer your question. Source: Nielsen Media Research. According to the year x in a rice cooker and forget about it. Digg is Slashdot with voting instead of happy.
Presumably it's lower now because it's a proxy for revenue growth with retained earnings was one firm that wanted to than because they want to learn.
Perhaps the designers of admissions processes should take more than serving as examples of how you spent your summers.
But politicians know the actual lawsuits rarely happen. At the time 1992 the entire period since the war, federal tax receipts have stayed close to the margin for error. No VC will admit they're influenced by buzz. Since I now believe that was mistaken, and unleashed a swarm of cheap component suppliers on Apple hardware.
Ideas are one step upstream from economic power, so it's conceivable that intellectual centers like Cambridge in that. Vii.
They have no trouble getting hired by these companies substitute progress for revenue growth. Obviously this is: we currently filter at the final version that afternoon. If you have significant expenses other than salaries that you can send your business plan to have to spend a lot about some disease they'll see once in their racks for years before Apple finally moved the door. Hodges, Richard.
Because we want to live. In practice most successful startups of all the money was the fall of 2008 but no more unlikely than it was considered the most powerful men in Congress, Sam Rayburn and Lyndon Johnson.
I should do is assemble components designed and manufactured by someone who doesn't understand what you're doing. And Beans for 2n olive oil or butter n yellow onions other fresh vegetables; experiment 3n cloves garlic n 12-oz cans white, kidney, or a complete bust. They overshot the available RAM somewhat, causing much inconvenient disk swapping, but they're not ready to raise that point though.
If PR didn't work, but that we wrote in order to win. You have to choose between the Daddy Model that it killed the best VCs tend to focus on the Daddy Model may be loud and disorganized, but that's not directly, but you should be the technology everyone was going to visit 20 different communities regularly. There is archaeological evidence for large companies, but if you do.
A fundraising is a huge loophole. If you're a big success or a blog that tried to attack and abuse. They want to impress are not more startups to have been the plague of 1347; the crowds of shoppers drifting through this huge mall reminded George Romero of zombies. Trevor Blackwell presents the following recipe for a long time?
If you're part of creating an agreement from scratch. The ordering system was small. Hypothesis: A company will either be a quiet, earnest place like Cambridge in that it offers a vivid illustration of that.
You have to think of the false positive, this is also a name. Indiana University Publications. The need has to convince at one point they worried Lotus was losing its startup edge and turning into a significant effect on college admissions process. Interestingly, the laser, it's probably still a leading cause of poverty I just wasn't willing to be actively curious.
I've found for dealing with one of the Web was closely tied to the traditional peasant's diet: they hoped they were beaten by iTunes and Hulu. If big companies couldn't decrease to zero.
If the Mac was so great, why did it.
Since most VCs are suits at heart, the apparent misdeeds of corp dev guys should be taken into account, they can be useful here, the initial capital requirement for German companies is 47. Proceedings of 2003 Spam Conference.
So it may seem to be the model for Internet clients too. If you invest in so many trade publications nominally have a group of picky friends who proofread almost everything I write out loud at least for those interested in x, and it introduced us to Steve Huffman and Alexis Ohanian, both your lawyers should be the last step is to write every component yourself, if you have two choices, choose the harder.
Which explains the astonished stories one always hears about VC while working on Viaweb. They're motivated by examples of how you spent your summers. A round VCs put two partners on your own compass. I had zero false positives caused by filters will be the model for Internet clients too.
Users judge a site not as hard as everyone assumes. This doesn't mean the Bay Area, Boston, or at least what they meant.
Thanks to Jessica Livingston, Trevor Blackwell, Yuri Sagalov, Fred Wilson, Emmett Shear, Geoff Ralston, Robert Morris, Sam Altman, and Michael Seibel for inviting me to speak.
#automatically generated text#Markov chains#Paul Graham#Python#Patrick Mooney#system#inequality#iTunes#Lisp#Boston#corp#students#time#ITA#variation#Gilded#dislike#cause#alternative#Trevor#parents#fundraising#kids#examples#mall#idea#Internet#Model#Startups
0 notes