Nowadays people don't want you to sing good. They want you to sing sloppy and have a good beat to your songs. That's what angle I'm going to shoot for. That's where the money is. So just in case about three or four months from now you might hear a record by me which sounds terrible, don't feel ashamed, just wait until the money rolls in because every day people are singing worse and worse on purpose and the public buys more and more records.Link Discuss (Thanks, Scott!)
Lee-Daniel went out with a crew that Elaine was leading, up on the northern border of the sovereign. She had two junior surveyors with her, all of them loaded with positioning gear that tied into Galileo, the European GPS network -- the Galileo gear cost a fortune, but they'd found that their American GPS kit often mysteriously stopped working when they were working on projects in the territorial USA. They'd ordered the Euro stuff from a bunch of anti-globalization activists who'd found that the same thing happened in any city hosting an economic summit. Europeans were more likely to treat infrastructure as sacrosanct, while the US was only too happy to monkey with GPS for tactical reasons. The Series A man hated the expense of the Galileo gear, hated paying off crusty-punk Starbucks-smashers for critical tools, hated the optics of looking like a bunch of anarchists instead of a spunky startup.Seems a little more plausible in light of this:
A low cost device to temporarily disable the reception of the civilian course acquisition (C/A) code used for the standard positioning service (SPS) on the Global Positioning System (GPS/NAVSTAR) L1 frequency of 1575.42 MHz.Link Discuss (via Joi Ito)
This is accomplished by transmitting a narrowband Gaussian noise signal, with a deviation of +/- 1.023 MHz, on the L1 GPS frequency itself. This technique is a little more complicated than a simple continuous wave (CW) jammer, but tends to be more effective (i.e. harder to filter) against spread spectrum based radio receivers.
This device will have no effect on the precise positioning service (PPS) which is transmitted on the GPS L2 frequency of 1227.6 MHz and little effect on the P-code which is also carried on the L1 frequency. There may be a problem if your particular GPS receiver needs to acquire the P(Y)-code through the C/A-code before proper operation.
This device will also not work against the new upcoming GPS L5 frequency of 1176.45 MHz or the Russian GLONASS or European Galileo systems. It can be adapted to jam the new civilian C/A-code signal which is going to also be transmitted on the GPS L2 frequency.
One letter from the FBI archives, signed by Hoover in 1949, congratulates Harpo on his "loyal past services" to his country.Link Discuss (via MeFi)
Hoover hoped they might meet in the near future, saying: "There may be ways that you can help your country again."
1. The set-up at the top of the stairwell consists of a computer with a flat panel LCD screen and a USB video camera. When someone walks up to the screen they see live video of themselves. There is a button in front of the screen that when pressed takes a picture of the person. The picture is then translated into a 16 x 16 pixel grayscale image (desktop icon size) and displayed on the LCD.Link Discuss (Thanks, Jed!)
Also upstairs is a water valve attached to a fixed jug of water or connection to a water source/main. When the grayscale image is created, the computer then analyzes the color of each pixel and 'prints' out pulses to the electronically controlled water valve - a different pulse pattern depending on the color of the pixel on screen. The water then falls to the first floor.
2. The set-up on the first floor consists of a plexi-glass tray that awaits the falling water drops. The tray will sit on top of a custom built wooden box with a video projector inside. A funnel situated above an infrared switch watches for falling drops and through a microcontroller, feeds information to the computer at the bottom to decode which color pixel has been printed.
Rowling e-mailed Catie back with some tantalizing snippets from her fourth book -- "Harry Potter and the Goblet of Fire" -- and then phoned her in Albany, New York to read extracts.That really is a menschy thing to have done, and nevermind any cheap-shots about Rowlings's fans dying for a sequel. Link Discuss
"Catie's face just lit up," her mother recalled.
After the child's death, Rowling e-mailed her parents to say: "I consider myself privileged to have had contact with Catie...I am crying so hard as I type. She left footprints on my heart."
"During the war I had done quite a bit of pig farming, and I knew that manure contained gases and that pig manure was very potent. A number of experimenters and sanitation facilities have been extracting gas from sewage for years now, but it's diluted so much that the process is slow. I therefore decided to concentrate on animal manure and find the best blend from which to extract methane... and then develop a method of feeding this gas into a car's engine.Link Discuss (Thanks, zorca!)
"After experiments with just about every type of animal manure, I found I got the best results from mixing that of chickens and pigs. Chicken manure contains more nitrogen than others and pig droppings are useful because they generate heat so well."...
"I get five more miles to the gallon on methane than I get from an equivalent amount of petrol," Harold said. "This is because the dry methane has a higher calorific value and there is no waste of unvaporized fluid. Absence of oil dilution and reduced carbon deposits are just bonuses."
"My Christmas show has some new QTVR -- for example, this one (shown at left) made last Sunday in New York by Jook Leung, who recently won the Fujifilm Masterpiece Award for his Tribute in Light panorama which I featured in April.Discuss
And if you want a real 'White Christmas,' look at this image by Kjell Are Refsvik."
Mattel, the maker of Barbie, on its Barbie.com Web site, said the Happy Family preganancy-themed dolls "can help parents discuss pregnancy without having to resort to graphic descriptions of the reproductive process." It said the dolls can help children aged 5 to 8 to act out their feelings before the arrival of a new sibling.Link Discuss
Some shoppers said they were not convinced Wal-Mart's priorities were on target. "Wal-Mart pulling Barbie because she's pregnant, but they still sell guns and ammo?" said Laura Jamieson of San Francisco.
Our inspection of Chief Kroeker's refuse reveals that he is a scrupulous recycler. He is also a health nut. We find a staggering profusion of health-food containers: fat-free milk cartons, fat-free cereal boxes, cans of milk chocolate weight-loss shakes, cans of Swanson chicken broth ("99% fat free!"), water bottles, a cardboard box of protein bars, tubs of low-fat cottage cheese, a paper packet of oatmeal, and an article on "How to Live a Long Healthy Life."...Link Discuss (via Plastic)
We uncrumple a holiday flier from the Hinson Memorial Baptist Church, which contains a handwritten note: "Mark. Just want you to know one Latin from Manhattan Loves You."
Invasion of privacy? This is a frontal assault, a D-Day, a Norman Conquest of privacy. We know the chief's credit-card number; we know where he buys his groceries; we know how much toilet tissue he goes through. We know whose Christmas cards he has pitched, whose wedding he skipped, whose photo he threw away. We know what newsletters he gets and how much he's socked away in the stock market. We even know he's thinking about a new car--and which models he's considering.
Wednesday's showing, from 9 a.m. to 11 a.m., boasted 284,012 viewing households, a 26 percent boost in viewership compared with last year, WPIX Channel 11 said. It smoked the 1 p.m. airing of the 1951 classic film version of Charles Dickens' "A Christmas Carol," starring Alistair Sim as Ebenezer Scrooge, by 29,000 households. For its triumphant return, the Yule Log tape was digitally remastered, but the soundtrack, including "Joy to the World" and "Winter Wonderland," was left unchanged.See the Yule Log here. Discuss
# Lawrence PitLink Discuss (via JWZ's LiveJournal)
# (C) 2002 BlueSorcerer
#example that prints Hello World!
Ook. Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook? Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook? Ook! Ook! Ook? Ook! Ook? Ook. Ook! Ook. Ook. Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook? Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook? Ook! Ook! Ook? Ook! Ook? Ook. Ook. Ook. Ook! Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook. Ook! Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook. Ook. Ook? Ook. Ook? Ook. Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook? Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook? Ook! Ook! Ook? Ook! Ook? Ook. Ook! Ook. Ook. Ook? Ook. Ook? Ook. Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook? Ook? Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook? Ook! Ook! Ook? Ook! Ook? Ook. Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook. Ook? Ook. Ook? Ook. Ook? Ook. Ook? Ook. Ook! Ook. Ook. Ook. Ook. Ook. Ook. Ook. Ook! Ook. Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook. Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook! Ook. Ook. Ook? Ook. Ook? Ook. Ook. Ook! Ook.
* Investigators have completed their time-consuming project to track down assets and property the Nazis looted from Holocaust victims.Link Discuss (Thanks, John!)
* OSI has quick access to government records and commercial databases and can compare names, including variations of possible spellings in English.
* Investigators are able to pore over the archives of the former Soviet bloc countries, developing leads.
WHAT WERE THE MONSTERS?Link Discuss (Thanks, Gene!)
[Ants (Large) | Babies (Big, Orange) | Clowns (Freaky) | Cybermen | Daleks | Dinosaurs | Insects | Kittens | Looked a bit rude | Maggots (Giant) | Man in a Mask | Plants (Killer) | Rats (Huge) | Reptiles | Robots | Scary bloke (One Eyed) | Snakes | Spiders (Big) | Stones (Blood-sucking) | Sweeties (Big) | Vampires | Wearing String Vests | Worms]
[Dr Who died | Dr Who's friend died | The Daleks turn up | The Cybermen turn up | The Master is in it]
A machine scans the index finger, matching the customer's unique fingerprint with the individual's account. The company avoids the term "fingerprinting" because of its law enforcement connotation -- the same reason the technology is applied to the index finger, rather than the thumb.Link Discuss
Customers can register for the voluntary program by presenting a drivers license, an index finger and a method of payment -- either credit card, debit card or electronic check.
This year's bitter El Nino winds have expanded the sand area by half. Mr Hull, who is now past 60, says: "The problem is just getting beyond me."Link Discuss (Thanks, Gnat!)
The Waiuku farmer's nightmare is an example of this country's rapidly vanishing coastline. His land is being buried under sand.
The ever resourceful publisher O'Reilly even has a new book out on the issue called 802.11 Security, which underscores my point by arguing that most WiFi networks -- which use the 802.11 transmission protocol specified by the Institute of Electrical and Electronics Engineers – are wide open to attack.I have to quibble with this. Connecting to a WiFi network is not "attacking" it. A successful attack against a network should do some damage to it, or at least reduce its availablity to the detriment of its operator. Most home WiFi networks don't even have a computer on them much of the time (since WiFi net operators either take their machines with them or shut them down -- don't believe me? Take nstat with you on your next warstumble! Most of the nets I connect to don't have any hosts on them!). So connecting to the network doesn't constitute any kind of attack per se.
Now, there are a couple of actual "attacks" imaginable: one is a DoS attack on the network itself, putting so much traffic on the net that you shut it down. This one is much bandied, but I've never actually seen it take place. The 802.11b spec takes pretty good care to enforce good neighborship on connected hosts. It's like DoSing a hub -- theoretically possible, but not very likely, since hubs are, by nature, built to manage multiple hosts sending and receiving traffic.
Another attack is intrusion: either on the router or on another host. Router intrusion is surprisingly easy, since many operators don't change the default router password. Any time you associate with a network called "linksys", try pointing your browser at: http://:firstname.lastname@example.org -- if you get a configuration screen, congrats, you 0wn that AP. But this certainly isn't an attack that's made simpler by flaws in WEP; rather, it's a UI failure in the configurator, which should force a password change on setup. Indeed, this attack is not specific to WiFi nets -- routers connected to cablemodems are just as vulnerable.
Intrusion into systems is a much graver case. In the case of MacOS X/9 machines, this is not much of a risk, since neither of these machines have default-on IP-addressable services, and activating such services generally requires some savvy that would, one hopes, also include enough smarts to set up a decent password (maybe a poor assumption). Win* machines are much more vulnerable -- this is a well-understood phenomenon, of course, and it has to do with major failings in MSFT's security engineering. The incremental vulnerability of a Win* machine on a WiFi net is high, but only because Win* and orthodox security engineering make the fallacious firewall assumption, that hosts inside your network are trusted and hosts outside your network are not. In truth, your security perimeter should be drawn around each host, not around the network, since hosts on the network can go rogue (0wned via a trojan, say), and hosts outside of the network can be highly trusted, as when you carry your laptop to some other place and need to connect to machines back home.
Now, there is a real-live attack possible due to the failings of WEP: packet-sniffing. In the cases where you are sending sensitive info (i.e. passwords, mail, http-auth session keys) in the clear, having untrusted parties on your broadcast network is a genuine risk. But this is not a situation that's unique to, or distinctive of, WiFi. Rather, it is the case any time you're sending data in the clear on any network connection that isn't under your control, such as net-connections in airports, hotels, conference centers, classrooms, boardrooms, cable-modems, etc. This is a major flaw in the assumptions that many Internet services make (any ISP that expects you to transmit your POP info in the clear, for example).