|
We’re heading towards the end of 2016 more than two years after Microsoft first introduced Windows 10 and over 4 years since Microsoft introduced the new Windows apps framework in Windows 8 and Microsoft still hasn’t figured out how to make them work for users who want to be productive. But you can be non-productive on all platforms!
|
|
|
|
|
Not allowing multiple instances is a problem, but not the only one. It only demonstrates that the UWP platform is really designed for mobile-first scenarios, where more than one instance is not required. The "universal" part was only tagged on after these apps were failing with Windows 8 on the desktop, along with a window frame.
Other problems are:
a) No sufficient controls for productivity apps, the inbox ones are all touch-focused and oversized for non-touch input (so much about "adaptive layout"). I miss "normal" menu bars out of the box, for example.
b) No real extensibility. I know, they've got app services and app extensions by now, but they work like REST services, which can be problematic and is a serialization nightmare if you're trying to pass huge amounts of data. I miss "LoadLibrary" capabilities.
c) No system access. I miss a capability/contract to allow an app to call any "unsafe" API. Registry access, for example. It's OK if it wasn't allowed for apps you'd like to put on the Store, but it should be possible for sideloading scenarios, without the need for complicated and limited concepts like brokered components. I miss the ease of Win32 where everything was right at your fingertips without artificial barriers for the sake of security because you can't trust developers to do the right thing.
Last but not least, they are COM-based. If you ever take a look at the WRL, you can see all the madness and ugliness that is working underneath the shiny surface. 
|
|
|
|
|
d) no good way to distribute outside of the MS App store.
I'm currently working on a kiosk style touchscreen application for a local business service provider in WPF so that the sale/deployment model is them selling a paid account to the web site end of the system and then downloading the app and a product key to the client; both dependent on subscription pricing to keep working. Even if they were willing to change their sales channel model to go through the MS Store, having to fork over 30(?) cents on the dollar for the privilege of MS pushing the app to their end users is unlikely to be positively received if we were to float it to them.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
In this study, Wressnegger et al. reveal how a codebase originally written for 32-bit, and which is perfectly secure on 32-bit platforms, can have new vulnerabilities simply by compiling it for 64-bit systems. That's why I compile everything for 8-bits
Maybe I should switch to 4? That would be more secure, right?
|
|
|
|
|
Why don't you delete the codebase? That way is perfectly safe from outside attacks
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
But, don't you get twice the amount of work done for half the price ?
«There is a spectrum, from "clearly desirable behaviour," to "possibly dodgy behavior that still makes some sense," to "clearly undesirable behavior." We try to make the latter into warnings or, better, errors. But stuff that is in the middle category you don’t want to restrict unless there is a clear way to work around it.» Eric Lippert, May 14, 2008
|
|
|
|
|
The music's more catchy in 8-bits, too.
(Anyone not humming an 8-bit game tune by now obviously hasn't lived)
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Well, if you have a codebase that's only ever been fully tested compiled as 32-bit, you should not be surprised that it'll have bugs when compiled as 64-bit.
|
|
|
|
|
SpaceX has detailed ambitious plans to bring fast Internet access to the entire world with a new satellite system that offers greater speeds and lower latency than existing satellite networks. It will be composed of hundreds of Teslas using their self-driving capabilities
|
|
|
|
|
Don't forget the full equipment of IoT gadgets consuming the most of it.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
I read about one of Musks plans where he hopes to bring launch costs down so much that thousands of new satellites will be able to launch. It's going to get crowded up there.
|
|
|
|
|
These guys are trying to eat too much pie at a time. They need to finish something before announcing colonies on Mars, revolution in transport, and gigabit internet from space.
|
|
|
|
|
According to a new study, 69.7 percent of cloud applications do not specify whether the customer keeps ownership of uploaded data, just 8.7 percent commit to not sharing data with third parties, and only 16 percent delete data immediately after contract termination. Ya think?
|
|
|
|
|
And 95% of business using the cloud haven't even read the user agreements.
I can't understand why is people so blind for some things.
Example:
Moving company to a new place. Discussion about moving the Servers.
Idea x: Clone a HDD and send it using a logistic company (like UPS, DHL or so...)
Manager: hey, that is not secure... use the cloud instead.
Wait... WHAT?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
If you don't know where your data are and who can access them, are them your data?
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
In other news, eating rat poison might make you ill!
This new science amazes me.
|
|
|
|
|
When you are dead, you won't even know that you are dead. It's a pain only felt by others.
Same thing when you are stupid.
modified 19-Nov-21 21:01pm.
|
|
|
|
|
Basildane wrote: In other news, eating rat poison might make you ill!
... or it might be the only thing keeping you alive[^] if you have the right (wrong?) health problems.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Russian digital forensics firm Elcomsoft has found that Apple’s mobile devices automatically send a user’s call history to the company’s servers if iCloud is enabled — but the data gets uploaded in many instances without user choice or notification. But I'm sure *they* would never misuse that data, right?
|
|
|
|
|
Kent Sharkey wrote: if iCloud is enabled At least is something I don't have to worry about.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
That's why I disable every Cloud-something in every product I own. Cortana, Steam cloud, Origin cloud... my data reside on my machine, Internet shortage don't cost me functionality EVER (my country has 40% of surface not covered by broadband and part of the population can't ahve the phone line either so the possibility of ending up without connection for months or years is always at the door) and noone can put its silmy hands on the data I don't explicitly share.
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
den2k88 wrote: Steam cloud, This is the exception in my case. But I don't have any personal / economical data inside. I only play free games there. The few games I have bought, I installed them from CD / DVD, no need of cloud.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Kent Sharkey wrote: But I'm sure *they* would never misuse that data, right? I mean, in itself the feature is actually nice. Just recently bought a new phone, restored the previous phone's iCloud backup to it and instead of the call list being empty I can see all the calls made on the previous device. I would assume this is the intended scenario for the feature and not "theft". Maybe I'm just naive though. On the other hand I have just checked the backup settings and there is indeed no switch to indicate this is going to happen, which is somewhat worrisome.
|
|
|
|
|
"Anything you say that can be used against you will be used against you."
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Google senior security engineer Darren Bilby has asked fellow hackers to expend less effort on tools like antivirus and intrusion detection to instead research more meaningful defences such as whitelisting applications. You go ahead and whitelist all the script code you allow to run on your network
|
|
|
|