Which is it?
Razr, Razer, Razor -- which is it?
31 posts • joined 29 Feb 2008
"the wreath uses Manzanita, a potent proprietary herb"
Manzanita is a bush/small tree that has branches that are probably being used to make the base of the wreath. The wood is hard, but the branches are flexible before drying out - once formed into a wreath shape, it would be perfect for holding the other stuff.
-- California guy
I don't know about y'all, but I find that there are people who can (and do) hold annoying, loud conversation with or without a cell phone. I find Pai's arrogance extremely disconcerting. If he were to announce these decisions as coming from the FCC, not from him directly (using the first person), it might be more palatable.
This is more regulation from the govt; I was under the impression that Republicans wanted minimal interference.
Is it a rule that folks in Britain and Europe MUST find fault in everything American?
You must have one hell of a 'back', cause unless the receptacle is 60 years old (like in my house) and only has two prongs (like in my house), they DON'T fall out easily.
Yes they are technically upside down according to code, but do you really think they are less secure with the ground pin on the bottom rather than the top?
Actually, I feel the same about European plugs - I don't have a lot of experience with them, but they scare me. They usually stand really far out from the receptacle, and I've always been afraid I was going to touch the conductors when I pull them out. And the ones I've used seem prone to slipping out of the receptacle - they are just smooth round pins, with no tension.
Granted, my experience is limited to European to U.S. adapter plugs, so maybe that makes it worse.
The article is talking about internet, not cable TV shows. Or at least that's the way I read it. Am I living in the past? Although I do use internet for some streaming, I mostly use it for browsing activities.
And my wired internet is much cheaper and more reliable than the 3G/4G mobile links. I don't understand how anybody would be satisfied with mobile only.
The article talks about replacing locals with H-1B workers at lower salaries, but another trend is to replace the local jobs with jobs overseas at MUCH lower costs. The logistical nightmares that can occur are often ignored because the cost savings are so great, and the (local) executive staff get their bonuses and raises because they have increased the profit for the shareholders. What's gonna happen when all the lower positions are overseas and they still need to increase profits?
"Also, there's got to be a better way to store configuration data than using raw binary. JSON, YAML, or (dare I say it) XML are pretty cool instead."
Yes, let's used bloated, overwrought file formats instead of compact, efficient storage, and open it up so that anyone with a text editor can manipulate it.
"That 9” black and white screen is part of the pleasure of using it"
You're not one of them there mass-o-christs, are you? I stayed away from the original Mac because it just looked like a toy, and even in my 20's the screen was too small to read for very long or to take seriously as a programming tool. Now, the Mac II was a different thing.
“We've made very clear to the Chinese that there are certain practices that they’re engaging in that we know are emanating from China..."
The phrase "emanating from" may sound like distancing from accusing them directly, but the phrase "they're engaging in" sounds like a pretty direct accusation.
The first thing I thought of was 'how long does the charge last?' I can understand the information not being in a press release from the company (because it probably is not great), but I think the author did not do his job by not even mentioning charge life.
The heat thing would not be a problem if the charge life is only an hour.
I'm sure I'm missing something here, but if these agencies no the precentage of spam from each botnet, they must be able to identify the botnet that sent each e-mail. If you can identify it, why can't you block it. I know they're detecting at an endpoint, but if they can identify the source, why can't the ISPs?
Biting the hand that feeds IT © 1998–2021