|
Quote: Everyone is staring at you ... all the time
99% of the time my camera is off.
Quote: The distraction of video
99 % of the time I've got the zoom window minimized.
Quote: You're so good looking ...
Can't see myself if my camera is off!
Quote: A highway-hypnotic semi-attentive fugue
and...
Quote: He figured one of the strengths of audio-only communication was how it enabled people to enter a fugue-like state where they wandered around doing other minor tasks while talking.
Exactly. I often do calls on my phone so I can clean the litterbox, do the dishes, cook something, etc.
Seems to me like people ought to get smarter about their video conferencing calls -- we'd have less of these silly studies, by places like Stanford, no less. Must have been an undergrad project,
|
|
|
|
|
Marc Clifton wrote: Exactly. I often do calls on my phone so I can clean the litterbox, do the dishes, cook something, etc. I would love too... but have a big reception problem at home.
Additionally it is not that easy to "join" the meetings if not in company net or vpn, so I end attending the meeting using the laptop and the usb speakers.
But camera is off 99% of the time too. I only connect it when body language is important for the moment, i.e. I have an important talk with my boss or something similar and only if the other person / people uses the camera too.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Nelek wrote: I only connect it when body language is important for the moment,
What amazes me is that some people require all the participants to wear masks!
|
|
|
|
|
Microsoft's AI can turn your text-based Word document into an online PowerPoint presentation with images. War and Peace as it was meant to be - 3600 slides
It's just... I mean... *Who* wanted this?
|
|
|
|
|
Kent Sharkey wrote: It's just... I mean... Who wanted this? Three letters. Starts with a 'P'. Ends with a 'B'. And has an 'H' in the middle.
|
|
|
|
|
just... why???
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
|
|
With WinUI launch there is a renewed desire by C# and XAML developers to write single codebase applications for Windows and the Web. Assuming you can program through the tears as Silverlight sails to the West
|
|
|
|
|
The 12 Factor App methodology is an influential pattern to designing scalable application architecture. Here is what that means for application architects and their architecture. Because three tiers is never enough
Sure, entirely different concept. No need to remind me.
|
|
|
|
|
Somewhere in that loooong post is some wisdom. I'm sure of it. But my attention span is too short to find it.
|
|
|
|
|
One of the really big pushes around Windows 10 has been mixed reality. Awww, man!
I was using that folder to store all my important documents; because no hacker would look in there.
|
|
|
|
|
As devices become less and less repairable, it’s always heartening when companies build devices with an eye on sustainability. I hope the startup sound is that noise the Transformers make when transforming
|
|
|
|
|
The Economic Security Project is trying to make a point about big tech monopolies by releasing a browser plugin that will block any sites that reach out to IP addresses owned by Google, Facebook, Microsoft, or Amazon. Just in case you feel like removing the web from your life
|
|
|
|
|
Huh??
I have to install Chrome to learn how to not be monitored on the web???
Oh, the irony.
|
|
|
|
|
Actually, to learn that it's impossible not to be monitored, so it's pretty spot on
|
|
|
|
|
Don't let perfection stand in the way of the good.
You are perfectly right that if you want to evade any form of monitoring, you must find some remote mountain cave where you can live on wild berries and drink water from the mountain creeks.
But you can reduce monitoring a lot. E.g.
* stay away from social media such as Facebook, Twitter and the like
* install email encryption, and urge your friends to do the same
* when obtaining an encryption certificate, find a provider that allows you to generate the keys yourself
* do not let any web service store your documents, photos, video etc.
* learn to encrypt sensitive documents, even when storing them locally
* choose software alternatives that does the least amount of 'telemetry' (as they call it)
* turn all telemetry options as low as possible when you can't evade it completely
* regularly delete all cookies and browser history
* regularly clean 'recent files' lists of various applications (editors, media viewers etc.)
* regularly clean all temp directories (there may be several)
* turn off your network connection when you are not actively using it
* pay with cash whenever possible
* don't use membership plastic cards (it will defy paying with cash!)
* avoid web sites that require login as far as possible.
* prefer physical shops to web shops
* buy CDs, DVD/BDs, and books. Do not subscribe to streaming services and other online media.
* keep smartphone GPS, WiFi and BT turned off when not using it actively (saves battery power, too!)
* don't install smartphone apps uncritically
* if you must install an app, reduce its rights as far as possible
* leave your smartphone at home when you don't need it (or turn it completely off)
* walk or bike short trips, rather than driving your car past a toll station
I do not claim that the above list is exhaustive for non-paranoia rules, but it covers most of it.
You can go a lot further than this, but that could soon bring you into the paranoia zone.
Some precautions may appear to cost you money. Say, by not using your membership card to get that 1% discount, you pay 1% more. But the very purpose of the membership card is to make you spend more money, through directed advertisements, 'special for you' offers and the like. If that makes you spend 1% more on goods you wouldn't have bought without it, the membership discount is negative for you.
Some precautions are relevant only if your PC is seized, whether by thieves, authorities or others, or web spies attempt to get hold of the information. You may consider such threats so improbable that you will ignore them
Sometimes you do 'loose something', e.g. you can't participate in the discussions in a web newspaper Comments column without logging in. I promise you: At least nine out of ten times, after you have quit, gone to watching the discussions from outside, within a few months you would start asking yourself: Why the elephant did I waste my time on that sort of discussions? It was just a waste of time that neither improved my own life nor contributed to the saving of the world. (Well, you may consider it a kind of pastime, but once you get used to it, watching the Comments column dogfights may be just as fun.)
You should know where monitoring is unavoidable - sometimes, that allows you to relax a little. Say, when driving on automatic toll roads (where a chip behind your windshield is read remotely), the authorities can track you anyway, so you might as well pay by plastic card (and have the discount given by your membership card) when fueling up.
Sometimes, you may trust a website not to sell or misuse information about your login; you trust CP, say, enough to let them have your email address and login password.
Even if you practice all of the above rules, you will not evade all monitoring, but a lot of it. You might say "It isn't worth the effort, if it isn't perfect!", or "To me, letting all my four thousand FB friends know my whereabouts at any time is so essential that I don't mind authorities and commercial businesses being able to track me as well". That is up to you. If you do mind, you may use the above list as a checklist. Add your own extra points as you find appropriate.
|
|
|
|
|
trønderen wrote: You are perfectly right that if you want to evade any form of monitoring That's not even close to what I said, making the rest of your rather long comment moot 😅
I read it though, and I agree, but I only go as far as to block as much cookies as possible when websites ask about it
|
|
|
|
|
I didn't send it as a personal message to you. Others may benefit from it.
|
|
|
|
|
Fair enough, you make good points
|
|
|
|
|
TOR browser.
You still monitored, but not much ways to identify a person, and those that are (like habits) aren't accepted in court as proof.
Don't have Twitter or FB but a hosts-file for common browsing. Using a VPN, so all my ads are in Norwegian. Using ProtonMail instead of GMail.
Privacy is not what you get, it is something you self need to take care of.
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Recruiters recommend going in armed with salary research and always asking about the potential for becoming a full-time employee. FYI: "Where's the nearest bar?" is not on the list
Now I know.
|
|
|
|
|
Two of the three questions are about contract-to-hire. Furthermore, contracts are almost always paid hourly, not a salary. This is a very silly article.
|
|
|
|
|
Elliott recommends being direct when it comes to money and starting with a question like this: "What does your company/agency have budgeted for this role?"
"This question turns your salary negotiation into a salary conversation," he said. That's actually some good advice
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
IBM's AI-based tools let engineers explore ways to extract value from legacy enterprise software Just in case you want to convert some PL/1 code for the web?
|
|
|
|
|