Borges wrote about to decipher the code of the coat of a tiger. Could we decipher the code of the shell of a tortoise?
Regina Pinto Ruth Catlow <ruth.catlow at furtherfield.org <http://www.netbehaviour.org/mailman/listinfo/netbehaviour>> wrote: *Legitimate Transfer Protocols **Legitimate Transfer Protocols for use by the **Galapagos Tortoise **Messaging Network are categorised as follows:- ** **a) those authorised by the head of state, b) those **referred to in myth **and legend, c) those recommended by W3C ** http://www.w3.org/, d) **breastfeeding, e) telepathy, f) fabulous ones, g) **those employing **trained or wild animals, h) those that are included **in this **classification, i) those accompanied by a quickness **of breath, j) those **that transmit in an instant to an infinite number of **recipients, k) **those that can be described in diagrams created **using computer **software, l) others, m) those that have just sent **unsolicited **advertisements to a huge database of individuals n) **those that are so **slow that the recipient assumes them to be faulty. ** *
_______________________________________________ NetBehaviour mailing list [email protected] http://www.netbehaviour.org/mailman/listinfo/netbehaviour
