...he intentionally uploaded the frank pictures, ...
I categorically refute these allegations.
3698 posts • joined 10 Jun 2009
I categorically refute these allegations.
... the photons are not so much 'bound together' but are constrained to act in a certain way due to some fundamental requirement involving allowed energy levels in what is some kind of quantum solid (the ultra cold rubidium). The overall effect is that they have to hold hands inside the rubidium 'crystal' I think a similar thing happens with Cooper pairs of elecrons in a superconductor. Life is never simple is it?
... the animals are upset about the obvious ripoff of their IP and indigenous artwork.
It's an Airbus.
How on earth do you negotiate a goodbye payment? Unless you threaten to tell secrets or break legs? I'd really like to know because it might be useful to me in the future.
Beautifully defined when they're cold, but ...... - I've lost my poetic inspiration now....
Knowing which house my phone is at each night is a very private issue.
I'm sure the regular short bursts of exercise are good for the staff.
... an outside thermometer/display in the form of a 2 inch square sheet that is stuck to the outside surface of the window and uses e-ink display that is updated every 15 minutes (or whatever). If the internal battery runs low then it can put up a 'please use the microwave' symbol.
"... Joseph Braybrook, used the Ordnance's OS OpenData products ..."
"To build the model, Braybrook and his supervisors at the Ordnance took ..."
I think the organisation itself and everybody involved deserves credit and admiration.
"Frank from across the street is an alternative operating systems hobbyist ...."
Jim Stone has been spying on me! How do I disable the phantom power supply?
Can't they fool the human eyes by using an array of Red, Blue, Green LEDs (in the right mixture) behind a diffusing screen? It wouldn't be a smooth spectrum but it's the visual effect that matters.
It's a fragment of a babelfish. (I'm good at jumping to conclusions.)
A Geiger counter? Yes please !!
It says 'techim'.
I'm boycotting ASDA as part of my small protest.
Does it compute some kind of 'hash' and compare it against a stored value, which was generated when the fingerprintee was first registered on the system?
" ...a summary: two Apple employees interview ..."
I could be bothered to watch it. I saw two product developers presenting a summary of their efforts to two different senior staff in various weekly (?) meetings.
Then again, maybe it was a series of therapy sessions where the two developers try to explore the source of their discomfort.
P.S. That picture should be subtitled 'Breaking Good'. (There may be some uncertainty about that.)
I assume this was as simple as formatting and then loading up a saved image onto a new SSD.
If you've ever made a quick bathroom visit, but forgotten to wash your hands after preparing some chilli peppers, you'll know not to do that. I'll never do it again!
Does the NSA get its own special OAuth token, just to make things a bit easier?
I think that should be 'to/into the black'. (Firefly reference.)
Can 'our' UK government exercise any kind of opt-out on this. I'm sure the big players like Vodafone and VM would be look unfavourably on all this.
I'll ask my mum to show me how it's done. This basement is getting a bit dusty.
The 'Titanic IN SPAAAAACCCEEEE' was a fully certified (for paying passengers) spaceship that had been built to resemble an old style ocean cruise liner. You need to pay more attention.
It would charge your phone (if it had the internal receiver kit) and keep your 'coffee' hot at the same time.
They should have released the Proton, Neutron, Electron family first.
(Use Tor or a VPN) - www.hobby.uk.com
If you consider the size of France and Germany (as a European example) and their short distance apart, we don't express surprise that the people in those two regions/countries speak in different languages. Then consider the size of the regions of China and their geographical separation from each other.
Great, but it costs over $3,000 in US money; not mainstream yet :)
For as long as I can remember, I've had cars where the steering wheel blocks my view of the speedo between about 65mph and 90mph; a critical range. I wish more car makers would take this into account.
Apart from that, I don't like badgery and I'd prefer black flashing instead of red.
" ... I can not come over ... management porno."
No matter how hard you tried?
What does that have to do with Unix??
Assuming that I follow what you are saying, would it be more correct to describe that as a 'measured/observed interaction in a Quantum Field'? Are you saying that photons are an intellectul construct of the observer? What does that imply for all the other force/field interaction particles, including the Higgs boson?
.... means easy to obtain and easy to monitor in detail in a small electronics lab. Then the forger can carefully determine the required charateristics of a genuine tag. The interesting part of the article is where the reader also writes data to the memory of the tag. That part could take some figuring out.
I did a recognised apprenticeship at the same time as a thin-sandwich degree course, obtaining a first class honours degree. How do I fit in to your terribly restricted little world?
I have two. They pick up a signal just about anywhere.
The people who create/implement/operate a system or process are not the people you should trust to tell you if it is working properly.
I'll wait for the M&S version - cheap and bland but does the job.
... in the form of a memory stick plugged into the little FTP server (NSLU2) that is connected to my home router. I worry about whether it could withstand a sustained brute force attack :)
That is often the problem and may be her epitaph.
The last time I (accidentally) drank the lees from home made beer, I manufactured my own very spreadable product about twelve hours later.
Maybe if you invented your own 'private language'; I'm thinking of the Navajo code-talkers of WW2 here. Then again, language is a form of encoding of meaning, so can encryption breaking techniques be used to translate an unknown language into your own language?
Maybe someone who's trying to establish the IP address and location of 4000 relays of a Tor network? Or, maybe someone who's applying for funding to fight the menace of increasing Tor traffic? Oh, the possibilities.
I may have tried to get too much concentrated goodness into it.
Flood Facebook with pics of neatly dressed, well scrubbed teens reading books while helping elderly people to cross the road.
"But my goal of learning something new each day has been accomplished, thanks to El-Reg!!"
That's the main reason I read this site, and the comments of course.
I'm waiting for replies from combat wombat and mutated wombat.