13 posts • joined Monday 9th April 2007 22:15 GMT
"It could be slid to the "on" position when the passport is needed to be readable via RFID and slid to the "off" position when the passport does not need to be read."
the passport could, I dunno, be slid through a device that reads the information from it directly. Oh wait, that's what we had/have!
Hmm... seems Ford was also into the nuke biz... or wanted to be :)
I don't usually consider the images to be relevant...
Democracy has nothing to do with it
This is not a question of democracy. This is a question of whether this person impersonated someone else. It is a crime in most countries to impersonate people in positions of authority (police, fire, etc) let alone those as part of either the administration of the country or the monarchy of it.
How do you think the British government would react if the same thing happened with someone from the Royal family?
How do you think the US government would react if the same thing happend with some child of the president, or similar?
I'm sure whomever was involved would get some severe punishment.
Massive Scale, even on Multi-Core...
If you're interested in exploiting the full power of your CPU, but aren't interested in the problems that come along with the "traditional" multi-threaded approach, or virtualization, or whatever, then I suggest you have a look at this article Brad posted a little over a year ago.
My colleague explains a bit behind how we attain massive scale without the constant need for more and more horsepower, or completely changing our techniques.
We have used this approach successfully over the last decade for telephony and "web-ish" systems, CPU intensive applications, network intensive, etc. We usually have the following problem: people in ops wanting to turn off our machines because we aren't using enough of the CPU, and us needing to keep it on for our redundancy model. We do, however, have a few CPU intense applications that run on quad-core machines with no problems. We run each app at 50% of a core, run 4 instances of it, and tell the "consumers" of that service about all of them, and they round-robin their requests among them.
Us canuks still call 'em cheques :) Irks me to see "check" used in the same context.
So, aren't the claims in the patent basically what "procmail" does? If so (if I read the patent correctly), isn't procmail (which was first released in 1990 - see http://www.procmail.org/procmail.HISTORY.html - it was up to version 3.11pre7 before the patent application was filed) an example of prior art, thus making this patent invalid?
If it isn't, doesn't that mean that anyone in violation of this patent would have to follow the exact flow described in the patent for the "automatic determination" of messages?
If this patent is valid, wouldn't it make all SPAM filters also violators?
/me hates trolls.
What "technology" ??
Having actually implemented such a calling service, I really am at a loss to figure out what "technology" Intel is going embed in computers. This is a server-hosted service invoked from a URL.
Too much hype!
Probably the first, and still there.
I don't really understand how this gets so much hype. At least Metacrawler and All4One consolodate the results. searchboth is one click more convenient than having two windows open... because it just opens two frames.
- World's OLDEST human DNA found in leg bone – but that's not the only boning going on...
- Lightning strikes USB bosses: Next-gen jacks will be REVERSIBLE
- Pics Brit inventors' GRAVITY POWERED LIGHT ships out after just 1 year
- Beijing leans on Microsoft to maintain Windows XP support
- Storagebod Oh no, RBS has gone titsup again... but is it JUST BAD LUCK?