The kernel version numbers should just be the unixtime of their release. Or the number of days since the the first release.
They are using ZX81s to run their webserver
Who cares about that rogue Edison. Joseph Swan was the inventor of the light bulb and what he thought about it would be more interesting. http://en.wikipedia.org/wiki/Joseph_Swan
The British museum mostly things from foreign cultures, like blocks of stone written in three very exciting ancient languages! The V & A is much more interesting.. http://www.vam.ac.uk/
The Siemens Gigaset SL78H does most of the things you say. You can sync to your PC, have a text message sent to your mobile whenever someone leaves you a voice message, sync the address book to other handsets or to your mobile via bluetooth. http://gigaset.com/
Voice over pots is not modulated, so is BASEBAND (having the bottom 12Khz of a phone line.) Broadband is anything that is not baseband. (eg: ADSL freqs starting from 12KHz upwards.) It has nothing to do with speed for anyone except beaurocrats and politicians.
tygerstripes writes: The Register has a story about the discovery of a flaw in part of the IPv6 specification which has experts scrambling to have the feature removed, or at least disabled by default. From the article:
Paul Vixie, president of the Internet Systems Consortium, described the fault bluntly. "It can be exploited by any greedy Estonian teenager with a $300 Linux machine."The specification, known as the Type 0 Routing Header (RH0), allows computers to tell IPv6 routers to send data by a specific route. Originally envisioned as a way to let mobile users to retain a single IP for their devices... RH0 support allows attackers to amplify denial-of-service attacks on IPv6 infrastructure by a factor of at least 80.
Davis Freeberg writes: "TiVo has always been know for thinking outside of the box, but this week they were awarded an unusual patent related to locking down content on their hard drives. According to the patent, they've invented a way to create password security that is so tough, it would take you longer than the life of a hard drive, in order to figure out. They could be using this technology to prevent the sharing of content or it could be related to their advertising or guide data, but if their decryption technology is really that good, it's an interesting solution for solving the problem of securing networks."