Re: Came here for the obligatory Babylon 5 reference
'course, I found it after the post was approved…
28 posts • joined 3 Aug 2006
'course, I found it after the post was approved…
…and didn't find it. From http://www.geek.com/games/cgi-first-introduced-to-tv-in-babylon-5-by-mit-presentor-771051/:
> They used 24 Amiga 2000s, 16 of which were dedicated rendering engines. They had 32 megabytes of RAM, a Fusion-40 accelerator and the Toaster. The Amigas were connected via a Novell network and sent data to a 12 gigabyte 486 PC file server. They later upgraded to Pentium and Alpha-based systems.
Getting my coat^WVorlon encounter suit now…
Well, a bit of them is. According to http://www.intc.com/intel-annual-report/2013/10K/22-issuer-purchases-of-equity-securities.html Intel was buying back a lot of Intel in 2013, so there's less of Intel for sale.
It sounds like a harmless bit of fun, but every time you subsequently try to connect the Chromecast to a network it remains undiscoverable. You ask for its IP address and it says "I'm never gonna give you ARP".
How many times does Sylvester McCoy count? He played two different Doctors in one episode, as Colin Baker didn't come back for the 6-7 regeneration scene.</anorak>
A kilogram of water is as much a "physical entity" as a kilogram of platinum and iridium (also known as positronic brain stuff: http://www.tgdaily.com/entertainment/55384-stock-and-trade-us-robots-and-mechanical-men).
> There's clearly a pattern emerging from tech launches these days: announce the launch date and, on the day, sit back and await the 'sold out immediately' headlines.
On the one hand, you could put your money where your principles are and refuse to publish such non-news. On the other hand, if forum posts are a useful proxy for page views, you made quite a few ad dollars yourselves out of this "story".
I imagine companies don't tell you what the numbers are because they're uninspiringly low numbers. "We sold all of the 3000 UK Nexus 4s (which excludes the ones we'd already sold to carriers)" is less compelling.
Coincidentally, Sophos was founded in a house in Oxford in early 1985, and coincidentally, one of their early products was a prototype portable computer. I wonder whether they might have been one of the companies that the DTI approached.
Jack Daniels, quoted multiple times in the above article, is a variety of bourbon, while Jack Daniel is a ZZ Top lookalike and much-loved infosec community figure.
As linked from the article, this page demonstrates that the islands are duplicated on the map. http://theamazingios6maps.tumblr.com/post/31969863003/senkaku-diaoyu-islands-diplomatic-territorial
Facepalming not only at you, but at my decision to spend time reading the article to you.
Indeed, an ambulance. Anoraks at the ready: http://en.wikipedia.org/wiki/Ghostbusters_(franchise)#Transportation
12345? Amazing. That's the same combination I've got on my luggage!
"The new rules alter the number of API calls third-party apps can make from different “end points” – meaning a twit's devices or PCs running that application."
I took it to mean API endpoints - i.e. the different features exposed by the API. So you could have a different rate for reading mentions than posting photos, which currently isn't supported.
While they probably ended up paying handsomely for the domain, I'm sure they could've come to some arrangement where the US gets apple.co.uk in return for the UK getting next.com. It turns out that "warmed-over UNIX" workstations aren't as successful a business as chav trousers.
I wonder why they added that. Do they have some processes that fix bugs in such a way that they _do_ expect them to recur?
I think _could_, rather than should. There will be some apps that are basically non-functional without access to some personal info. Imagine installing a turn-by-turn nav app without giving it location access.
That's exactly what I'd like to achieve. I want to move us to a world where app makers say "we've got this feature, we need this data to make the feature work, and we only use it for enabling that feature".
Their numbers are certainly very _precise_, but probably not as _accurate_ as El Reg claims. Particularly as they don't actually know where I am with sufficient accuracy, even if they did know the location of their branches to the nearest gnat's quark.
Mine's the anorak.
"Talk of exponential malware growth is justified but needs to be put into context, that the huge rise is coming from a base of almost nothing and that the raw figures remain trivial compared to the Windows virus plague."
That's true, but not really relevant: you only need to be infected by one strain for it to ruin your day.
Tux - but only after he gets his shots.
I have one of those already.
It was for charity! Think of the children!
"If this is the design for the iPhone 5, could such a grip be a problem?"
Just avoid holding it in that way. Not that big of a deal.
At the time when you say all optical drives were slot-loading, I had a caddy-loading drive (plugged into a SquirrelSCSI adaptor on an Amiga 1200, which itself had a stack of 2p coins on top to address a "thermal surfeisance" issue).
Licensing Noah Wyle's image for an action doll. I would suggest using his performance in Pirates of Silicon Valley as the model.
/my coat wouldn't fit John Di Maggio
I've worked in a couple of multi-story buildings around Oxford, UK, and been in many others. Many of the elevators are made by a company called....Schindler's Lifts. No joke.
Tim Berners-Lee should get in on the litigation, too. His NeXTSTEP-based browser, WorldWideWeb.app, was renamed to Nexus.app. Android phones include a web browser, so Google are clearly trying to incite confusion in the marketplace.
Mine's the one with the grey beard.
In response to the comments on the NeXT NSEnumerator class, that in itself is not the Enumeration approach but it's certainly simple to achieve in Objective-C; the technique seems to have received the sobriquet "Higher-Order Messaging". Certainly searching cocoadev.com for HOM yields a few examples of the style.
Quote from the article: "Reports from folk who've tried it already suggest that it's a good idea to verify your hard drive and repair file-access permissions before running BootCamp."
Of course they did. It's part of the Mac Voodoo, that. Anyone who wants to appear knowledgeable but has no clear idea of what they're talking about will recommend one or more of: repair permissions; clearing PRAM; installing software updaters via the combo rather than incremental package. It certainly wouldn't help in this situation and almost never does at any other time, but it's part and parcel of The Mac Experience ;-)