5 posts • joined 26 Nov 2007
Would you hand £470,000 to someone?
I'm guessing we have only the word of this convicted liar and con-man that handed this money on to someone else ?
I wonder if in two years he will be a rich con-man - it's almost worth spending two years in chink for that
You can request an invitation to Google's music service here
We're sorry. Music Beta is currently only available in the United States
If you play enough hours of Civ 5 you will probably find the problem of having any sort sex goes away
Actually, a lot of the best programmers are dyslexic - note I modestly include myself in this elite group. I seem to remember some research many years ago about this. Something to do with the brains being wired differently somehow giving one a oneness with computers.
I started with 370 assembler code but these days mostly do Java or PHP, just trying to picck up Python but I find I can read things in most languages.
One bad habit I did have was using two character variable names - less to make mistakes spelling -- and in the days before spell checking editors comments were a real effort.
But will it ever happen?
Ah but if you look at the actual accorde -
what it says (amongst other things) is that the ISPs have up to two years to talk to the copyright holders on experimental network filtering technologies and to deploy if the results are conclusive and technically and financially feasible.
So it will be a typical French farce. Appoint several doubtlessly highly paid functionnaires to oversee the thing. Waffle for two years, by which time the ISPs will have have looked at the cost of monitoring and decided they don't want to spend a fortune to damage their businesses. It will be all be quietly forgotten about......
- NASA boffin: RIDDLE of odd BULGE FOUND on MOON is SOLVED
- BuzzGasm! Thirteen Astonishing True Facts You Never Knew About SCREWS
- Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
- Worstall on Wednesday YES, iPhones ARE getting slower with each new release of iOS
- Plug and PREY: Hackers reprogram USB drives to silently infect PCs