WiFi is much better than it was. 802.11g is commonplace now, and it is so much better than 802.11b.
We now return to our usual programming ...
... In the 1970s and 1980s employment in quintessentially middle-skilled, middle-income occupations—salespeople, bank clerks, secretaries, machine operators and factory supervisors—grew faster than that in lower-skilled jobs. But around the early 1990s, something changed. Labour markets across the rich countries shifted from a world where people’s job and wage prospects were directly related to their skill levels. Instead, with only a few exceptions, employment in middle-class jobs began to decline as a share of the total while the share of both low- and high-skilled jobs rose (see chart)...
The development of information technology (IT) is the leading candidate. Computers do not directly compete with the abstract, analytical tasks that many high-skilled workers do, but aid their productivity by speeding up the more routine bits of their jobs. But they do directly affect the need for people like assembly-line workers or those doing certain clerical tasks..
... the economists find that industries that adopted IT at faster rates (as measured by their IT spending, as well as their spending on research and development) also saw the fastest growth in demand for the most educated workers, and the sharpest declines in demand for people with intermediate levels of education...In recent writings, however, DeLong and Krugman tell us today's unemployment is not primarily structural (see also). The patterns of widespread unemployment (no labor mismatch) and concomitant deflation don't fit the structural story.
... Is it possible that there has been some rise in structural unemployment that’s swamped by a much larger rise in cyclical unemployment? Yes, conceivably...Aha! Trust me on this -- I run Krugman in an internal simulation. I know what he's thinking. Krugman secretly believes that we do have a serious structural unemployment problem, but atop that we also have a cyclical unemployment problem. (FWIW, My DeLong simulation holds the same secret suspicion.)
John Gordon is not of my tribe. My God says all who are not of my tribe should be enslaved. John Gordon must serve me.
Step Right Up for Pest Control at Bedbug Meeting - NYTimes.com
.... Nearly everyone said they had done as much when they arrived at the host hotel, and the maids may find more than a few headboards askew from their search. Many people said they started out by putting luggage on the bathroom floor, the better to see any scurrying, before investigating hiding spots in the rest of the room. One man put his luggage inside a bedbug-proof bag and kept all his clothes on a non-fabric chair throughout his stay, though his initial survey found nothing...Sounds like the process is:
I: You want it? Take it.
II: I'd rather you didn't.
III: Help!! Help!!
IV: I'll fight you for it.
V: Kreegah bundolo! Kill!!We need a master account with Category V security. The One Ring account has two factor authentication and a robust reset procedure that might involving banks and other identity authentication services. It may be tied to a strong identity as well, but that's another post. You only enter these Category V credentials on a secure machine and an encrypted connection. The Master Account can be used to override and change the passwords on lesser accounts.
Visual 6502 FAQ
.... There are many excellent emulators available, but emulation is approximation. It can be extremely difficult to create an accurate emulator, because the typical approach to writing an emulator is to glean information from chip specification documents or more rarely from any chip schematics that happen to be available. This information is always incomplete and even the original chip logic schematics (also Verilog and VHDL code) can differ from what was actually built in silicon (see ECO). A disciplined emulator will capture and use traces of actual chip behavior, but it's near impossible to capture the billions of sequences of bits that a real chip gives rise to. Instead, we build a virtual chip by modeling and simulating the actual microscopic parts of a physical chip. We're interested in accurately preserving historic designs. It's archaeology for microchips.
While a multitude of people understand the instruction set for the 6502, almost no one, apart from the original designers, understands how the physical chip achieves this instruction set. The design is as elegant and sophisticated as any program written for the 6502. As digital archaeologists, we invite the current generation of hardware and software engineers to appreciate the work of the small number of designers who created the basis of everything we do today...
Apple Answers the FCC’s Questions
Contrary to published reports, Apple has not rejected the Google Voice application, and continues to study it....
The following applications also fall into this category.
Name: GVDialer / GVDialer Lite...
Name: VoiceCentral..
Name: GV Mobile / GV Mobile Free...