Correct experimental protocol
Did the researchers send a tweet the next morning to find out if the finches were alright?
4551 posts • joined 10 Jun 2009
Did the researchers send a tweet the next morning to find out if the finches were alright?
For the Feat.Ed's Chew-Z comment.
When I was a little kid, my grandad (and dad, mum, etc) would call me a 'little monkey' when I did something naughty or disruptive. I'm sure they intended no racial slur.
Isn't this similar to the way in which Google automatically scans your Google Mail messages and shows you adverts (if you don't have AdBlock) triggered by keywords in your email? Their argument was that it is all done by computer and no record is kept that associates your email account with the keywords, which sounds reasonable if it's really true (and not 'corporately true').
Oriental: referring to the eastern part of the world. (cf. occidental: the western part of the world). Wealthy oriental visitors: a reference to the three magi who came from the east bearing gifts for Jesus. Christmas: the time when the birth of Jesus is celebrated. It all fits.
Fall of the machines. Wonderful to watch too.
My Dropbox folder is a subfolder inside my synchronised Google Drive folder. That seems to work nicely for me but I doubt if it's an 'enterprise class' arrangement.
This area of development has always been problematic.
... that a nuclear reactor wouldn't have any connection to the internet and any required data link to a separate control/monitoring facility was made using a truly physically private network. I've spent my entire life living in hope and have often been disappointed.
I've got a collection of very nice empty cardboard boxes in my garage and lots of wood offcuts. I _know_ they'll be useful one day.
As the 'local expert', once you've touched a computer, you are then responsible for all its actions or lack of actions from that point on.
Good advice from an ex-neighbour of mine: Never let anyone on the local Neighbourhood Watch or Church Committee, etc. know that you have a computer and a colour laser printer.
Good point about stolen documents being allowed as evidence. If the truth is illegally copied, is it still the truth?
I'm just glad that I stopped using my credit card for shopping/petrol about three years ago.
I see your comprehension gap.
I don't like Christmas. I'm patient; I'll wait.
I think they do that to enable checks on discrimination to be carried out, by themselves and other organisations. I thought that a similar thing was done for ethniciity so that checks could be run to ensure that the tenants represented a realistic mix of the local population, with no discrimination against particular groups of people.
Having said that, how do they know that the tenants answered the sexuality question truthfully?
Edit: Perhaps they could test them ..........
The use of 'refute' to _apparently_ mean 'deny' is (it seems to me) a recent change in language that has been popularised by politicians, who have been loudly 'refuting' accusations for many years. They do this so that if the accusations are proved to be true then they can always say, truthfully, that they never denied it. People have been too lazy to look the word up to establish its meaning and so this incorrect use propogates. Politicians may not be smart, but they're smarter than the average person and they're full of feral cunning.
(A similar thing happened with the word 'obviate', where people said things like, " this new gadget obviates the need to .....". If you know what the word 'obviate' means, then you'll realise what is wrong with that.)
If you're looking for a whatsit shop in Berlin, it's not surprising if whatsits.berlin and thingies.berlin appear high in the search rankings.
I notice that you are happy to use the word 'colts' in your comment, even though it is highly offensive to some people.
A large crater should be named 'Hermes'.
Would North Korea accept Sony setting up an office there?
How do you define " the original, authentic site"?
That's a relative temperature of course. At the new higher energies, nothing is certain.
If Axel Springer asked me to do something for their benefit, I'd start a discussion about how much they'd pay me.
Have you ever tried useful/helpful explanations? I know they can be difficult and need some thought but ..... oh.
"... the machine had never had a hardware failure before so software was more likely."
Is that actually a reasonable assumption? If a machine has never had a hardware failure, then doesn't the probablility of failure increase as time goes by?
Maybe they should run it past Tõnis Tiigi before they go public. He seems to be good at this.
It's the array that's large Their millimeters are standard size.
"... a legislative guarantee that this data will not be sold on to third parties ... "
The entire point was to make the data available to third parties, at a price. Drug companies and insurance companies were salivating at the prospect of getting their hands on the data. After that, it would have passed on to suppliers of incontinence pads, etc.
Maybe some US based comentards can tell us what it's like with four or five mobile 'players' for such a large region?
If neighbourhood systems receive and observe the 'comments', what will that tell them about intelligent life on earth?
You're quite right. 'ps -A' shows more like 135 processes though my point remains the same.
Right now, I have 35 processes running on my laptop (or so mate-system-monitor tells me). They all have a particular memory size and have other named characteristics. Could this list be regarded as 'normal' (assuming it is normal and my laptop is not infected in any way) and then any future changes be flagged as "alert - strange new process"?
I realise that as a home user I'm likely to install all sorts of stuff to try it out but for a stable commercial or industrial system then the 'normal' process profile should be stable and their characteristics known.
" ... aliases used by Daniel Craig, Natalie Portman, Sarah Michelle Gellar when they are travelling..."
Can I use an alias when I'm travelling or do the 'authorities' insist that I use the same name as on my passport and other ID documents?
That's what I use on my old router, but I realise that many people wouldn't have a clue where to start. I also realise that a serious and well equiped hacker would be able to sniff my WiFi devices MAC addresses; but there are further layers of protection as well as a 'strong' password.
.... when you give companies your mobile phone number. After a few similar but less distressing experiences, I don't give my mobile phone number to anyone anymore, unless I feel that I need/want them to call me and I regard it as a 'long term relationship'.
A 'beak' is a magistrate or a judge.
When I came back to England from Tunis airport, after a package holiday in Tunisia, back in 2000, lots of people were just standing around looking at noticeboards and waiting for flights. A security man was wondering around carrying what could best be described as a cross between a wand and a mace, about a foot long with a bulbous translucent plastic head. Every now and then he'd wave it around someone and every now and then it would flash coloured lights in the head and make a noise best described as 'beeeee-weeeeee-oooooo-beep'. Then he'd move on, apparently doing nothing about the lights and the sound.
He approached me and I decided the best course of action would be to ignore him. He waved the 'wand' over me as he passed me to my right, then the wand made it's noise. I made no reaction and he moved on. I can only assume that it was some kind of psychological test whereby a person who was feeling guilty about carrying a bomb or drugs would jump out of their skin and make a run for it - or so their security theory would go. The entire thing was surreal and very silly. Has anybody else encountered this type of thing anywhere?
If I am sent data in error and that data is encrypted, how can I see it if I don't have decryption processes and the decryption key? That would be the point of encrypting data for security in the event of sending it to the wrong person outside an organisation.
Within an organisation, there would be less risk in case of accidental sending to the wrong person, but you could compartmentalise by division/department etc. as far as was thought to be needed.
That would have been my immediate line of inquiry.
Edit: Mark, check out those 'environmental workers', I wonder how they might have disposed of the brains.
"dot-rodeo, dot-vodka", " .news, .golf", "dot-spot addresses"
How about .consistent and .convention?
(I remember when Star Wars was released and journalists wrote about those lovable characters called 'Artoodeetoo' and 'Seethreepio'. How I laughed.)
Can a player have the role of a female and/or a 'black' character and do all the things you described? If so, it would be non-discriminatory. (Just trying to be logical here.)
"Problems with the initial release of an operating system are nothing new, especially on existing hardware ..."
Does it usually run ok on non-existant hardware?
Wasn't that supposed to do away with the need to travel anywhere?
" ... you have to change the key frequently to prevent the world and his dog connecting from the car park over the road months after they left the company, ... "
Just remove their device from the MAC address filter whitelist.
That would be a series of experiments in which the measuring instrument is affected by each experiment. Not scientifically sound but good fun I'd say.
... my fridge and my central heating system will never be connected to the internet.
Why does an airport security gate need to be accessible from the internet anyway?
"As well as eccentric weights, which are already used in the gyroscopes of iPhones, ..."
I thought the integrated gyroscope used micro-machined beams with a mass at the end and force/strain gauge sensors on the beams? Am I thinking too 'modern'? One day, they'll use ring laser gyros I suppose.
" ... should warn every organisation that accepts credit card payments that they are an active target,..."
But it won't, because, "We're not retail/parking/whatever and we have good security; it was tested by experts (five years ago)."
My XP laptop went into terminal slowness after a long spate of Windows updates. This was just before Win7 was unleashed onto the world. I always thought that was a strange coincidence.