A coalition of 39 states led by Massachusetts has filed an objection in federal court to Toysmart.com's proposed sale of its customer list, according to the Massachusetts Attorney General's Office.
onLine weblog archive
Saturday, July 22, 2000
The only way out is through. That's the message of XHTML. And if you think we're going to get anywhere without fixing the mistakes of the past, you're ignoring the lessons those mistakes should have taught you.
Friday, July 21, 2000
MTV2 created by and for individuals.Yes, created by individuals, individuals who LIKE TO FLASHTURBATE!
Sorry, Netscape. We believe in what you're trying to do, and we wish we could muster more enthusiasm. But two years in Internet time is a decade in any other industry. You once virtually owned this virtual space. How could you forget such a simple fact of the market you used to dominate?
Netscape, you have placed W3C standards advocates in the unenviable position of supporting plans instead of products. After two long years of endorsing your goals -- and barely mentioning the fact that your existing product is the least standards-compliant browser on the market -- we've begun to question our wisdom, if not our very sanity.
Thursday, July 20, 2000
HTMHELL - Creative Revolution on the Web II: Counterrevolution (wherein he uses the wonderful term "bugwards-compatible")
Web Developer's Journal: Web Site Trends
To conclude, I will eat my hat if Jobs unveils this very machine tomorrow. No, wait - I'll eat my hockey puck mouse.Crunch Crunch Crunch. [link via signal vs noise]
"This is a very profound moment historically," Time Warner President Richard Parsons says. "This isn't just about a bunch of kids stealing music. It's about an assault on everything that constitutes the cultural expression of our society. If we fail to protect and preserve our intellectual property system, the culture will atrophy. And corporations won't be the only ones hurt. Artists will have no incentive to create. Worst-case scenario: The country will end up in a sort of cultural Dark Ages."Thank you for your thoughts, Satan.
This is a buffer overrun vulnerability. A malicious user could exploit the vulnerability to send an e-mail that, when downloaded from the mail server, would have either of two effects. In the less serious case, it could cause Outlook or Outlook Express to fail. In the more serious case, it could cause code of the malicious user's choice to execute on the recipient's computer. Such code could take any action that the user was authorized to take on the machine, including reformatting the hard drive, communicating with an external web site, or changing data on the computer.
Wednesday, July 19, 2000
7-24 UPDATE: A workaround has been found! Thanks Brig!
As featured in the New York Times (June 12, 2000), this report shows how e-commerce sites can increase revenues by improving their customer experience. Includes strategies, tactics, and thirty-one e-commerce case studies on merchandising, e-mail, navigation, search, checkout, fulfillment, and more. Free download.
-Introducing Active Server Pages+
-How is ASP+ Different from ASP? -A Summary of the New Features in ASP+
Tuesday, July 18, 2000
How to find out what elements of your navigation people have actually noticed. (Usability, navigation, interface design)
Sunday, July 16, 2000
...through a problem with Microsoft's implementation of the Document Object Model (DOM), a standard way of letting scripts act on individual elements of a Web page, the edit component lets a malicious attacker peek at information on a victim's computer using a combination of frames--smaller windows within the Web page--and the clipboard, where computers temporarily store information when it is being cut or copied.