On Mon, May 10, 2010 at 11:05:52AM +0200, Iljitsch van Beijnum wrote:
On 10 mei 2010, at 5:01, ty...@mit.edu wrote:
I talked to a cab driver in Boston, and he's not very happy with
credit cards, because he was forced to use a new system for credit
cards, and it takes what he considered an
On Sun, May 09, 2010 at 06:31:14PM -0700, Dan Harkins wrote:
I have had cab drivers in the US try to force me to pay cash
in similar situations. Saying they don't accept credit cards and
then, when I say that's all I have, telling me how much longer
it will take to get me out of their cab
On Tue, Mar 16, 2010 at 05:05:13PM -0700, David Morris wrote:
On Tue, 16 Mar 2010, Marshall Eubanks wrote:
I'd love to see you trapped in a basement after an earthquake with
only a stick trying to remember how to tap S-O-S.
That's easy. Three shorts and three longs, repeat until the
On Tue, Mar 16, 2010 at 07:58:17PM -0700, Bill McQuillan wrote:
I am haunted by the reports I've heard of NASA plaintively requesting
*anybody* to provide them with a 7-track tape machine to allow them to read
old data tapes from the 1960's and 1970's.
Not so much 1000 years as 40 years!
I'm not a lawyer, and neither is Bruce Schneier who is quoted in the
article below, but I suspect he's studied the ECC patent situation
more than I have (and I looked it quite a bit back when I was chairing
ipsec).
http://en.wikipedia.org/wiki/ECC_patents
If it were up to me, I'm not
On Thu, Nov 19, 2009 at 10:51:16AM -0800, Stephan Wenger wrote:
The mechanisms to challenge the validity of a patent depend on the
legislation. In the US, one example is a request for re-examination. A
good foundation for such a request would be the presence of Prior Art not
considered
On Thu, Nov 19, 2009 at 07:38:26PM -0500, Michael Montemurro wrote:
Dear all,
I understand the community’s concerns regarding the timeliness of the
disclosure. As I’m sure everyone can understand, as employees of
companies we are bound by confidentiality obligations and, in
addition,
".
o By 6pm on Wednesday, you will be able to fetch complete key ring
from the following URL with all of the keys that were submitted:
http://web.mit.edu/tytso/www/ietf.pgp
o At 10:30pm, come prepared with the PGP Key fingerprint of your PGP
public key; we will have handouts
From: Mark Allman [EMAIL PROTECTED]
Date: Wed, 07 Feb 2001 16:12:52 -0500
I am fairly unconvinced in the arguments made by Mr. Gao. However,
maybe a TCPng is the wrong way to look at things. A better model,
it seems to me, is the one followed by SCTP. In other words, let's
By 6pm on Wednesday, you will be able to fetch complete key ring
from the following URL with all of the keys that were submitted:
http://web.mit.edu/tytso/www/ietf.pgp
o At 10:30pm, come prepared with the PGP Key fingerprint of your PGP
public key; we will have handouts with all of
Date: Wed, 8 Nov 2000 17:53:45 -0800 (PST)
From: Andreas Gustafsson [EMAIL PROTECTED]
Looks like the IETF49 Social Event and LAN Card Registration Page at
http://www2.eventreg.com/ietf_reg/ietf_reg.html will send your
credit card number over the net unencrypted. Could someone fix
".
o By 6pm on Wednesday, you will be able to fetch complete key ring
from the following URL with all of the keys that were submitted:
http://web.mit.edu/tytso/www/ietf.pgp
o At 10:30pm, come prepared with the PGP Key fingerprint of your PGP
public key; we will have handouts
The current theory is that the wavelan access points are configred not
to fall back to 2mbps operation. Matt Blaze reported that he had a 2
mbps Silver card that didn't work.According to Angelos, if there is
a single 2 mbps card in the radio network, the entire network falls back
to 2 mbps,
Date: Tue, 30 Nov 1999 23:40:06 -0800 (PST)
From: Brian Lloyd [EMAIL PROTECTED]
Pardon me but, horse hocky! We are not talking about objecting to the
laws but rather how the FBI reacted to a report of a crime. Even tho'
they were pretty sure that they had been handed a red
available at these URL's:
http://web.mit.edu/tytso/www/ietf2.pgp
http://web.mit.edu/tytso/www/ietf5.pgp
(For PGP 2.x and PGP 5.x, respectively; the PGP 5.x keyring will
be a superset of the PGP 2.x keyring.)
o At 10:30pm, come prepared with the PGP Key fingerprint of your PG
15 matches
Mail list logo