We own our stratus 768 SST so they cant repo it but I'm thinking I wouldn't be able to get support, material, or trays if they didn't like whatever we were doing with it. I'm looking at replacing it with a Fortus 400 or a Projet 5000. I think our lawyers will probably have to write up a contact if we go with the Fortus.
jamlam writes "The Android developers blog has a comment from their dev team on the recent 'rooting' of their Nexus S phones. It contains a call from Google to handset manufacturers to open up their phones to give users choice. But will this ever happen in a market dominated by lock-'em-down cellular networks?"
I'm surprised those were that hard, most were over 4 characters.
With all the recent hacktivism in the news, Anonymous has decided to take on a new and powerful enemy: snow. On Sunday the group announced that it will "do everything in its power to shut snow down by attacking the Weather Channel and North Face websites, boycotting outerwear, and voting for the sun as Time’s 2010 Person Of The Year." I'm sure there are a lot of people in Minneapolis right now that would wish them luck.
An anonymous reader writes "This article has a very interesting description of the algorithms behind the ghosts in Pac-Man. I had no idea about most of this information, but that's probably because it's difficult to study the ghosts when I die every 30 seconds. Quoting: 'The ghosts are always in one of three possible modes: Chase, Scatter, or Frightened. The "normal" mode with the ghosts pursuing Pac-Man is Chase, and this is the one that they spend most of their time in. While in Chase mode, all of the ghosts use Pac-Man's position as a factor in selecting their target tile, though it is more significant to some ghosts than others. In Scatter mode, each ghost has a fixed target tile, each of which is located just outside a different corner of the maze. This causes the four ghosts to disperse to the corners whenever they are in this mode. Frightened mode is unique because the ghosts do not have a specific target tile while in this mode. Instead, they pseudorandomly decide which turns to make at every intersection.'"
If they were worried about privacy they wouldn't register porn sites to their home address http://whois.domaintools.com/virtualbabes.com
Translation Error writes "Two and a half years ago, the Borings sued Google for invading their privacy by driving onto their private driveway and taking pictures of their house to display on Google Street View. Now, the case has finally come to a close with the judge ruling in favor of the Borings and awarding them the princely sum of $1. While the judge found the Borings to be in the right, she awarded them only nominal damages, as the fact that they had already made images of their home available on a real estate site and didn't bother to seal the lawsuit to minimize publicity indicated the Borings neither valued their privacy nor had it been affected in any great way by Google's actions."
Hugh Pickens writes "A shipment of radioactive rods used in medical equipment has vanished while being sent by FedEx from North Dakota to Tennessee. Based on tracking information, FedEx is focusing its search in the Tennessee area, but as a normal precaution the company alerted all of its stations 'in the event that it got waylaid and went to another station by accident.' Dr. Marc Siegel says if someone opens the container it could pose some serious health risks. 'I don't believe it has the degree of radiation that, if it were opened, your skin would suddenly slough off. But the concern would be, if this got opened inadvertently and someone didn't know what it was and then was repeatedly exposed to it over several days, it could cause a problem with radiation poisoning,' says Siegel. 'The people that use this equipment in a hospital use protective shielding with it.' The lesson is that active medical material must always be transported in a way that ensures the general public cannot get access to it. 'Medical devices should not be FedExed. They should be sent under a special service,' adds Siegel."
itwbennett writes "The Senate Judiciary Committee has voted 19-0 in favor of a bill that would allow the Department of Justice to seek court orders to shut down websites offering materials believed to infringe copyright. 'Rogue websites are essentially digital stores selling illegal and sometimes dangerous products,' Senator Patrick Leahy, the main sponsor of the bill, said in a statement. 'If they existed in the physical world, the store would be shuttered immediately and the proprietors would be arrested. We cannot excuse the behavior because it happens online and the owners operate overseas. The Internet needs to be free — not lawless.' However, the internet will likely remain 'lawless' for a while longer, as there are only a few working days left in the congressional session and the bill is unlikely to pass through the House of Representatives in that short amount of time."
gambit3 writes "The US government may require cars to include scrambling tech that would disable mobile-phone use by drivers, and perhaps passengers. 'I think it will be done,' US Secretary of Transportation Ray LaHood said on Wednesday morning. 'I think the technology is there and I think you're going to see the technology become adaptable in automobiles to disable these cell phones.' LaHood is on a self-described 'rampage' against distracted driving, and if making it impossible to use a mobile phone while in a car can save lives, he's all for it."
theodp writes "Thanks to the inventors at Amazon.com, you needn't fear Aunt Martha any longer. On Tuesday, Amazon CEO Jeff Bezos received a patent for a bad gift defense system that intercepts gifts you don't want and instead sends you something that you actually do want. For example, Amazon explains that its 'System and Method for Converting Gifts' would allow you to set up a rule like 'Convert all gifts from Aunt Mildred,' which would automatically convert any online gift orders from your well-meaning-but-tasteless Auntie into a gift certificate. Other examples of how the system might be used: You could convert bad gifts to something off your wish list; block specific products ('Not another XYZ comic strip calendar'); or ensure that any clothing gifts match your exact size ('Check clothes sizes first')."
statesman writes "The Associated Press reports that teens who text frequently are three and a half times more likely to have sex. A survey of 4,200 public high school students in the Cleveland area found that one in five students sent more than 120 text messages a day or spent more than 3 hours a day on Facebook. Students in this group were much more likely to have sex. Alcohol and drug use also correlate with frequent texting and heavy Facebook use."
An anonymous reader writes "In this article, security researcher Nitesh Dhanjani shows how iOS insecurely launches third-party apps via registered URL handlers. Malicious websites can abuse this to launch arbitrary applications, such as getting the Skype.app to make arbitrary phone calls without asking the user. Dhanjani 'contacted Apple's security team to discuss this behavior, and their stance is that the onus is on the third-party applications (such as Skype in this case) to ask the user for authorization before performing the transaction.' He also discusses what developers of iOS apps can do to design their software securely and what Apple can do to help out."
Amorymeltzer writes "RNA molecules aren't always faithful reproductions of the genetic instructions contained within DNA, a new study shows (abstract). The finding seems to violate a tenet of genetics so fundamental that scientists call it the central dogma: DNA letters encode information, and RNA is made in DNA's likeness. The RNA then serves as a template to build proteins. But a study of RNA in white blood cells from 27 different people shows that, on average, each person has nearly 4,000 genes in which the RNA copies contain misspellings not found in DNA."
angry tapir writes "The US Federal Communications Commission should allow for an open Internet separate from specialized services that may prioritize IP traffic, a group of Internet and technology pioneers has recommended. The document, filed in response to an FCC request for public comments on proposed network neutrality rules, steers clear of recommending what rules should apply to the open Internet. Among the tech experts signing the document are Steve Wozniak, co-founder of Apple; Bruce Perens, founder of the open-source software movement; Clay Shirky, an author and lecturer at New York University's Interactive Telecommunications Program; and David Reed, a contributor to the development of TCP/IP and an adjunct professor at the Massachusetts Institute of Technology Media Lab."