One is faced with a dilemma: If one places total trust in all other users, one is vulnerable to the antisocial behavior of any malicious user consider the case of viruses. But if one tries to be totally reclusive and isolated, one is not only bored, but one's information universe will cease to grow and be enhanced by interaction with others. The result is that most of us operate in a complicated trade-off zone with various arrangements of trust and security mechanisms.
As one of our colleagues recently put it, this Republican pledge of no new taxes is pure Bushlips. It's Bushlips when the president says 'No new taxes' and sends a budget requiring the Finance Committee to raise $20 billion in new revenues: $15 billion in taxes and $5 billion in user fees.lloyd bentsen
Program designers have a tendency to think of the users as idiots who need to be controlled. They should rather think of their program as a servant, whose master, the user, should be able to control it. If designers and programmers think about the apparent mental qualities that their programs will have, they'll create programs that are easier and pleasanter — more humane — to deal with.john mccarthy
They don't make poles long enough for me want to touch Microsoft products, and I don't want any mass-marketed game-playing device or Windows appliance near my desk or on my network. This is my workbench, dammit, it's not a pretty box to impress people with graphics and sounds. When I work at this system up to 12 hours a day, I'm profoundly uninterested in what user interface a novice user would prefer.erik naggum
Collective intelligence. Think of how Wikipedia works, how Amazon harnesses user annotation on its site, the way photo-sharing sites like Flickr are bleeding out into other applications... We're entering an era in which software learns from its users and all of the users are connected.tim o'reilly
"The internet has no government, no constitution, no laws, no rights, no police, no courts. Don't talk about fairness or innocence, and don't talk about what should be done. Instead, talk about what is being done and what will be done by the amorphous unreachable undefinable blob called the internet user base." (2004)paul vixie
Human beings today ... are surrounded by huge institutions we can never penetrate: the City [London's Wall Street], the banking system, political and advertising conglomerates, vast entertainment enterprises. They've made themselves user friendly, but they define the tastes to which we conform. They're rather subtle, subservient tyrants, but no less sinister for that.j. g. ballard
Never ask what sort of computer a guy drives. If he's a Mac user, he'll tell you. If not, why embarrass him?tom clancy
“We’re in danger of losing the ship generation.” “I’m aware of the problems,” she said. “‘You can’t tell the boys from the girls, they have no respect for their elders, their user interfaces are garish and unwieldy, everybody is writing a book, and their music is just noise.’ Found scratched on a potsherd in Sumer.”ken macleod
The user of the electric light -- or a hammer, or a language, or a book -- is the content. As such, there is a total metamorphosis of the user by the interface. It is the metamorphosis that I consider the message.Marshall McLuhan
The discarnate TV user lives in a world between fantasy and dream, and is in a typically hypnotic state, which is the ultimate form and level of participation.Marshall McLuhan
A vote is like a rifle: its usefulness depends upon the character of the user.theodore roosevelt
It was such a relief to program in user mode for a change. Not having to care about the small stuff is wonderful.linus torvalds
I approach each building as a sculptural object, a spatial container, a space with light and air, a response to context and appropriateness of feeling and spirit. To this container, this sculpture, the user brings his baggage, his program, and interacts with it to accommodate his needs. If he can't do that, I've failed.
The role of conceptual modelling in information systems development during all these decades is seen as an approach for capturing fuzzy, ill-defined, informal "real-world" descriptions and user requirements, and then transforming them to formal, in some sense complete, and consistent conceptual specifications.
Now, we need to understand that listening to music on your computer is an extra privilege. Normally people listen to music on their car or through their home stereos [...] If you are a Linux or Mac user, you should consider purchasing a regular CD player."
The state of the art in software design is the "enterprise architecture", where separate software components implement data processing (or other application specific-tasks), data storage, and user interface functionality. This approach enables, for example, the replacement of a database engine without changing the software components that process the data and those that support the interaction with the user.
The role of information management is a key enabler for demand chain management. It means capturing the market and end user demand information accurately, timely and in a relevant manner: capturing at all times the point of sales through all channels of inventory information.
While there is absolutely nothing humorous or amusing about the statement made by Respondent in his domain name that 'Glenn Beck Raped and Murdered a Young Girl in 1990,' the average Internet user finding the domain name GlennBeckRapedAndMurderedAYoungGirlin1990.com ("Disputed Domain Name") in a search would have no reason not to believe that they will be directed to a website providing factual information (as opposed to protected criticism or similar protected speech) about Mr. Beck.
The United States should lead the world when it comes to transparency , accountability , and respect of civil liberties and human rights. We filed the [law]suit today because we are not authorised at present to break out the number of requests, if any, that we receive for user data under specific national security statutes. We believe that the US government's important responsibility to protect public safety can be carried out without precluding internet companies from sharing the number of national security requests they may receive.
The reality of our century is technology: the invention, construction and maintenance of machines. To be a user of machines is to be of the spirit of this century. It has replaced the transcendental spiritualism of past eras
The user who visits Wikipedia to learn about some subject, to confirm some matter of fact, is rather in the position of a visitor to a public restroom. It may be obviously dirty, so that he knows to exercise great care, or it may seem fairly clean, so that he may be lulled into a false sense of security. What he certainly does not know is who has used the facilities before him.