Comment Re:Best guess on "throaty" (Score 1) 56
"Damn you autocorrect!"
"Damn you autocorrect!"
Motormouthing?
Verbiage?
In any case, 'some strange usage of the word "throaty" that I wasn't previously aware of'.
What joke? bloodhawk is correct: geekoid didn't put a snarkmark at the end of his comment therefore he was serious.~
[spit-take]
Ouache. Kosse-ça, stie. Du crisse de sirop de poteau?
Shouldn't we pushing photons over glass by now. Fibre infrastructure has existed for decades now, isn't it time it was scaled down to individual computers and appliances?
I remember both Apple ][ and Commodore floppies would seek past the end of the rail to recalibrate track 0. The apple made a noise on power up but 1541s made a scary noise whenever formatting a new disk or trying to recover a read error.
After a while the rattle actually threw the head out of alignment as the pulley was slipping on the axle. I connected the read head to the microphone input of a tape recorder to listen to the signal strength as I adjusted the stepper motor alignment.
After a while the screw threads were worn and I had to tap&die them. Then I got tired of realigning the heads and drilled in a cotter pin to stop the pulley from slipping.
Good times.
The newest camera / smartphones have GPS chips to geotag pictures so they can be overlaid on maps. For GPS-less cameras:
Have a GPS device turned on and logging tracks, take pictures, use the tools to add geotags to pictures.
Isn't there a law that mandates all official government written communications should be recorded?
And by introducing self-destructing plastic currency we won't have a choice...
http://business.financialpost.com/2012/07/12/new-plastic-bills-reportedly-melting-in-summer-heat/
Nope. Contact-less is a US thing. Europe uses chip and PIN.
I had an idea like this once for responding to phishing e-mails. A phishing URL would be submitted and a fake identity would be created using a database of first names, last names, street names, cities, states, zip codes, etc. A phoney (but real looking) SNN and date of birth would be created as well as any other information. The form would be submitted and the fake identity would be stored in the phisher's database. Repeat this a few thousand times and the database's value would drop. Get enough people using this program and submitting phishing URLs and phishing in general would get harder to do successfully.
Sadly, I never implemented this idea so it can't be claimed as prior art.
AA419 had similar programs (Muguito, Lad Vampire) to "flash mob" scam sites and DDOS them into exceeding their bandwidth quotas. There was also some tools to fake-fill web forms as you mentioned above.
There are two ways to write error-free programs; only the third one works.