April 17, 2015
BoingBoing posted this picture on Twitter:
And the response was ferocious.
How many SJWs does it take to change a light bulb?
Who are you calling "Kitty kitty kitty"?
April 16, 2015
Someone in the UK is under the impression that underboob blue ribbons are a new fashion trend in Japan.
Which of course is baloney. The only place it'll show up is Hestia cosplay.
It's interesting going through something like Yandere (NSFW) to see what characters have, and have not, caught on with fan artists. And based on what I saw just now, Hestia is a hit. Dunno about the show, but the artists love her.
UPDATE: Having said that, I'm sure the ribbon is part of the reason why Hestia is so popular so far, and it was a stroke of genius by the character designer.
UPDATE: Here are some others (without links):
Misaka Mikoto 738
Super Sonico 317
Sonsaku Hakufu 155
Rias Gremory 120
Millhiore F. Biscoti 128
Lucy Heartfilia 47
Sento Isuzu 218
Haramura Nodoka 185
Maka Albarn 131
Ishiki Akane 66
The popularity of Railgun is a bit of a surprise.
April 12, 2015
I wonder what would happen if someone attended a leftist demonstration carrying a sign that said, "Execute Mumia"?
(Which won't happen. The governor commuted his sentence from "death" to "life without parole". But we can still dream.)
March 25, 2015
It's beginning to look like the crash in the Alps was deliberate. One of the black boxes was recovered and it was the cockpit voice recorder. What they found when they played it back was that one of the pilots left the cockpit, and the door was locked after him. He tried to get back in and couldn't, beginning by knocking and ending by trying to break the door down.
The other black box hasn't been found yet, but we have records from air traffic control telling us that the jet went into a shallow dive which ended with lithobraking.
Some people are trying to say that the cockpit depressurized, leaving a dead or unconscious hand at the controls, but that doesn't explain why one guy left the cockpit, nor does it explain why the plane went into a dive.
As Ace says, "What was this pilot's name?"
For the time being, we don't know which one left the cockpit, but I can't see any reason for not releasing both names (unless they are still trying to reach family members with the news).
I know what ethnicity I'd put my wager on...
UPDATE: Looks like it was the copilot, who did it deliberately. But I was wrong about the ethnicity.
We may never know why he did it.
UPDATE: Oh, boy. There are rumors that the copilot recently converted to Islam.
March 24, 2015
If you rent and hate your landlord, this is not the way to get revenge.
I hate to think about how many felonies they committed. Start with Attempted Murder, Attempted Arson, 9 kinds of Conspiracy, and keep going from there. If they get caught (and I'm sure they will be) they're going away for a long, long time.
March 22, 2015
"True Fact: Liberals once believed people shouldn't be valued for the color of their skin." -- Jeff Jacoby
March 17, 2015
I used to work on cell phone design. But that was 15 years ago, and I was working on hardware drivers and never really spent any time on any of the high level protocols. What we were building back then would be by modern standards considered a "dumb phone". The display was dot matrix, and the keyboard was a standard phone keyboard. We didn't support things like SMS.
Since I left the industry things have changed a lot. Like really A Lot.
My phone, which is two and a half years old by now, still fills me with amazement. It's a "smartphone" (a Droid DNA, which is a proprietary Verizon version of the HTC Butterfly) and it has a touch screen over a 1920*1080 color display, among other astounding things. And, of course, it does all the modern stuff like send and receive messages.
I don't use that feature much. Actually, I don't use the phone much. I got it as a solution to the "I've fallen and I can't get up" problem after my stroke, and thankfully so far I haven't needed it. (I'm proud to say that I haven't lost my balance and fallen even once since my stroke. Not even a single time.)
But I do get text messages occasionally. Two or three times a year I get text message spam. I got one this afternoon.
They've been porn come-ons, naturally enough. But what I don't understand is why I'm not getting several of those a day, or at the very least a few per week.. Does Verizon have an extremely active and effective spam filter running, and what I've received is the extremely rare ones who slip past the filter?
It isn't any secret which banks of phone numbers belong to each of the wireless phone companies, after all, and it ain't that tough to send an SMS to every phone number in the block. If you can send one, you can send 10,000. (Can't you?)
I don't for a moment believe the spammers are practicing self control. (As if.) So I assume that they are sending millions of spam messages per year to Verizon, and that nearly all of those are going into the bit bucket. Is so?
March 16, 2015
Vlad Putin vanished from public sight for a week and a half, leading some to speculate that he was dead, or dying, or imprisoned by a pending coup, or visiting a woman in Switzerland, or...
Well, he's back again today, and the speculation is getting rampant. Here's my idea: The Russians downloaded his mind from his biological brain into a cybernetic brain in an android. The process takes about a week, and then the person takes a few days to get comfortable in their new body. In other words, Putin is now a robot.
March 15, 2015
Maybe, if both of them are using Yahoo for their mail host.
But as a general problem it runs into the same issue as everything else: What key do you use for encryption, and how does the receiver get it without anyone else getting it?
Approximate answer: everyone publishes a public key. If you want to send email to someone, you use his public key to encipher a session key, used to encrypt the email. The encrypted session key is included in the email message.
When he receives it, he uses his private key to decrypt the session key, then uses that to read the email message.
All well and good, except for one thing: How do you get his public key, and how can you be sure you got the right one? That's where this all breaks down. One way or another, no matter how you design this part of it, there's a low/no security transaction which can be snooped or faked by someone bad (or NSA).
End-to-end encryption works better if you exchange a lot of emails with one person and can manually and reliably set up the keys at the beginning of the relationship.
But for a general n-to-n system, to support hundreds of millions of people, and allow encryption of messages sent to abitrary receivers for the first time, there is no way to get there from here.
March 14, 2015
46 queries taking 0.0721 seconds, 122 records returned.
Powered by Minx 1.1.6c-pink.