re. " ... a human-made space lab ... "
Is there any other kind of space lab in our solar system? Do the Reg team know something we don't?
5019 posts • joined 10 Jun 2009
Is there any other kind of space lab in our solar system? Do the Reg team know something we don't?
Wasn't she the one who sold her shares in Lastminute.com just before the, er, last minute when the share price crashed? That was lucky for her, many people didn't sell or they bought before the last minute and were left holding losses.
I know that surrogacy is not adoption. Note that I said "... would cover ..." and "... associated legal issues ..." and " ... where this is going ...". I'm trying to imply a future scenario ....... don't you get it?
"Unfortunately the main limiting factor are not the eggs, it is the uterus. After reaching 40 or so, ...."
Yes, but read on .....
"We also offer an Adoption Assistance program, where Apple reimburses eligible expenses associated with the legal adoption of a child."
This would cover the 'rent a womb' arrangements that happen, with associated legal issues. You can see where this is going.
"Since the transmission began as IP, and a smartphone already has a high bandwidth IP path, why not just miss out the bit in the middle? "
If they tried that now, there would be many independent data streams, to individual mobiles, many carrying identical data. To reduce that, there would need to be special, additional, mobile data broadcast channels to be supported by the mobile operator and by each mobile phone. Maybe that could be the 'new DAB'?
Fur clad .... mmmmm ... I don't care what they sound like.
Is it a mobile phone as well? I thought it was just a WiFi tablet.
In the mid to late '70s, I used to use buses, underground and trains for all my travel. Then, the idea that there could be a phone on a train was the stuff of science fiction. I didn't even have a phone in my small rented flat (or a television or a computer). If I tell that to youngsters nowadays, they don't believe me.
... a sparrow snowed on them.
The initial registration of your card does need the credit card number and CC code (suitably encryted, etc) to be sent via Apple to the credit card company, so they can associate the token with your credit card account. After that, Apple don't need to store what was sent via iTunes and their servers. Even better, the data could go direct from iTunes to the credit card company servers and Apple would never see even the encrypted version of your data.
"After all, they pay their taxes."
Up to a point, maybe.
"If a given shape, proportionate to size, were ideal -- then you would want to divide by the *cube* of your height."
That would be true if the human body could be aproximated by a sphere, but it is more closely approximated by a cylinder, hence the square is used. Maybe the height raised to the power 2.3 would be more 'fair'?
In the average intake per person per day chart, there are two distinct and identicaly shaped dips for 2004-5 and 2008. I can't remember any national food shortages during those years or any national advertising campaign to eat less - so why the dips?
BMI: " ... there is no distinction between pure rippling muscle and unadulterated flab."
True, so BMI is not a good indicator of 'obesity' if you're a boxer, rugby player or a lumberjack, or very tall or very short. However, for the majority of the 'ordinary' population it is a reasonable and easy measure to take. So, unless the height or muscle development of the average population has changed much, it should be fine for long term use. If the average height does change then it should be easy enough to apply correction factors so as to make valid comparisons.
"Crucially, there is no measure there of waist circumference, which is what most of us use to make a judgement .."
What 'most of us' use to make a judgement is not medically uselful. From what I've read, the waist circumference in relation to chest and hip sizes can be a good indicator of future cardiac problems, so maybe these should be measured as part of the standard GP type of examination.
In the BMI category graph, there is a period of notable change between 1993 and 2001, then not much change after that to 2012. The BMI changes (for the worse) seem to coincide with the period of decreased calorie intake, though there are no figures for calorie intake after 2001. Does anyone know why this might be?
It all raises more questions than it answers, as do many of these types of studies.
You need to get its pawprint on a single sheet agreement giving you full rights to any image or sound recordings made during its time wearing the camera supplied by you. It's important to state that it can spend time with its own camera, outside the scope of the agreement, to ensure that the agreement couldn't be interpreted as unfair or onerous by a court (if it ever came to that). A few lines about undertaking to obey all applicable privacy laws would also be a good idea.
"Now I know many techies don't have much in the way of creative capacity."
Do you have any hard figures and reliable studies to back that up, or are you just being 'creative'?
I read the Linux forums and the various Linux 'howto' wikis, after a quick Google search for the topic. Then I read more forums to get a consensus opinion. After that I can clone my hard drive and do reckless things if I want to. It's worked nicely for me so far but I'd venture to say that the average member of the public wouldn't be able to do that or would get fed up very quicjkly. I remember I did a lot of swearing in the first month but after that I was fine and happy.
That should have been '@William Donelson re.' or just 're.'
[Coat: the one with the copy of 'Pedants Style Guide' in the pocket.]
" ... but the code didn't get hold of stuff like Social Security numbers, PINs or email addresses."
Why would anyone give this information to a high street retail outlet? After being 'hit' by spam e-mail and spam phone calls/txts some years ago, I now tell anyone who asks that I don't have a mobile phone and that I don't use e-mail. They seem surprised but they still sell me stuff.
From what I've seen of 'ordinary' laptops with two chunky hinges, there are four distinct and separate points of contact between the base and the screen unit. I've always assumed these were enough for power and video data/control and gave good insulation from each other as well as protection from dirt and grease ingress.
This 'watchstrap' hinge looks very complicated with many possible points of shorting and places where dirt and grease could get in to affect the signal paths. Does anyone know about the techniques for getting power and signals from base to screen and the actual design of this watchstrap hinge?
Well, they covered the robot snake with some kind of trouser, so .....
... I turn off the Wi-Fi with a little widget on the start screen. I do this because I don't want my battery draining as the phone pumps out Wi-Fi power looking for a connection. I also don't turn on mobile data unless I want to use it, for similar power saving reasons. It really does make a difference.
This is conflating two separate things. As I understand it, the remote kill switch is operated by the network and the user/owner has to contact the network and convince them of their identity to ask them to kill their stolen phone. The police only have to contact the network (probably via a special contact number) and tell them to kill a phone because they don't want the owner to be able to use it.
The remote wipe is under the control of the user and intended to protect private information from prying eyes. This is done via a website, with login process, run by the company that supplied the remote wipe app. Please correct me if I got any of that wrong.
The simplest ideas are often the best.
Also, "... It is like having your own personal roller coaster ..."
The thing about a roller coaster is that you're not in control of it and you do it for the thrills/terror. He seems to be talking in 'careless' mode.
It started off as ' ... fanning a patty' but it mutated very quickly in my mind so I'm confused now. How can this method be regarded as reliable?
Does this also mean that I can hack into US servers, because I'm a senior police officer in my own (self declared) small country? If there are any technical objections, I'll get the government (me) to enact laws to bypass them.
At $0.8 a share, I'm wondering how much it would cost to buy the company. Can anyone tell us?
Yesterday, I received no NSLs or FISA orders.
That's the title of a short and simple e-book that you could easily make for yourself and pass out to all your family and friends or maybe put it on some torrents. I'm sure it would cause amusement at Adobe when they look at what is 'trending'.
... I propose that government departments be put in sole charge of production, distribution and sales of alcoholic drinks, cigarettes and sugary foods.
" ... the G20 meeting to be held in Australia during November has placed multinational tax avoidance front and centre on its agenda."
This trans-international accounting dance has been known about for many years. Why have the pols only recently started to make disapproving noises?
Damn, I skipped a paragraph. Thank you.
(My attention was grabbed by the following entire paragraph in italics. It shouldn't be allowed.)
" ... for now you have to visit Estonia to apply for e-residency ..."
"Most Reg<.i> readers reside in nations where Estonia maintains a diplomatic outpost, ..."
If you have to visit Estonia, what does an Estonian diplomatic outpost have to do with the process?
Is it the middle ring that has the anti-gravity generators? It has a 'technical' look about it.
"Insiders are worse than hackers because there's no way to protect against them that's truly effective,"
It couldn't be truly effective if there were many rogue insiders working together, but surely there can be methods of 'dual authorisation' that would work. How many people in AT&T (and similar), on a day to day basis, actually need to access the sensitive information of customers? Not many I'd guess. How many customers a day do they need to access in this manner? Not many I'd guess.
Make all such data access a 'red flag' operation that is marked for oversight by a higher level manager in a different department. Have any mass access require a further password to be entered by a higher level manager in a different department. etc.
People would moan and complain, yes, but the answer to that is, "It's part of your job, so if you don't like it then go looking for another job."
If you wear 'fashion' glasses with those big chunky arms, you can tilt the phone slightly so the edge presses against the spectacles and keeps it away from your hair. (Not guarenteed if you have a bristly beard.)
Any such spectacles for use with an iPhone would have to be stylish and very expensive. This may be why Karl Lagerfeld has become involved with Apple (at the recent Paris launch).
It's possible to be a physiscist and not a physicist, both at the same time, so you don't need to pretend anything.
Have a look at the San Disk Ultra Plus and the Kingston SSD-Now V300 range on Dabs.com
I've used both with no problems.
(My desktop PC has vertical card cages and the two SSDs just hang in space, their weight supported by the SATA data and power cables. I don't see any need for mounting adaptors in a domestic PC.)
Unless you're a sales/marketing type, with lots of hi-def promotional videos to show to people, I can't think why you'd need 128GB of drive space on your laptop, or even desktop. I get by quite happily with 32GB SSDs on my two old laptops and my desktop.
" ... smart devices can broadcast URLs into the area around them. ...Any nearby display such as a phone or tablet can then see these URLs and offer them up to the user."
The possibilities for mischief (and worse) are endless.
This is off-topic but I'm wondering if anyone can give me some technical information:
If you take a good quality and well made semi-automatic pistol, it should be possible to make a 'carrier' for it that turns it into an 'automatic' sprayer of bullets. The standard ammunition clip could be replaced by a modified (longer/deeper) version that contains more than the standard six rounds and the pistol itself could be clamped into a carrier that looks like a rifle stock and performs the same function. The shoulder butt would contain a clockwork or battery poweed mechanism that pulled a mechanical 'finger' that hooked around the trigger of the pistol.
All the user would have to do is press a button and try to hold it on target as the 'finger' repeatedly pulled the pistol trigger. From a purely technical point of view, it seems to be an easy way of making an 'automatic' weapon out of an 'easily obtainable' pistol and does not involve any modification to the pistol itself.
Has anybody tried this? Is there any technical reason why it shouldn't be done?
I got that wrong. Since he did say, "on a voluntary basis", he is technically correct. The IWF 'ban list' has no force in law and so ISP blocking is voluntary on their part. They block because the government threatened to wrap them up in legal red tape if they didn't.
So, it's purest twisted weasel-logic bullshit.
"The proposals would have prevented network operators from blocking access, on a voluntary basis, to websites hosting illegal child sex abuse material."
That is the purest lying bullshit I've ever read. I'm sure I don't need to explain why.
,,, you make a 'good' parody then upload it to your YouTube channel, which has advertsing on it, then it gets lots of views and you make money from it?
“The Court is unable to find that the jury’s finding as to invalidity of claims 1 and 10 of the ’802 patent is supported by substantial evidence. Accordingly, the jury’s invalidity verdict cannot stand,”
Why do they bother with a jury? If there was a fault of process or procedure, or if a jury member was shown to have acted improperly, or new evidence was discovered, then sure. What the court/judge seems to be saying is that the jury were just 'wrong'. So why not just have Judge Rodney Gilstrap decide all cases on his own?
I had a look at 3 recently and it seems that tethering is limited to 4GB a month on the 'all you can eat' plan. I assume they 'detect' this by looking at the user_agent from your browser, which would make it easy to work around. As another 'workaround', you could run a torrent client on your phone then WiFi transfer the files to your home network, etc.
He's back on the WMD thing again, (Weapons of Minor Detection). The paedos can deploy them within 15 minutes.
An AND gate isn't a majority gate.You could think of it as a 'totality' or 'unanimous' gate.