waterloocanuk
Waterloo Canuk
waterloocanuk

Yeah, ‘metadata’. Well, they they leaving out the part that another agency collects ALL the contents of all messages but not not metadata - only just enough identifiers to link the two datasets afterwards. It is literally all archived and searchable. If the law is not extended a secret law will be. That is what

Vertical axis turbines are not self starting. They are very noisy because the torque is produced four times per revolution. With a tip speed six times the wind speed they require special materials. The gearboxes suffer terribly from the pulsing.

The thin blade indicates that the tip speed is very high. The single blade allows for the maximum blade thickness which requires a certain width to have an efficient performance. Compare the area of the blade to the swept area. Very small. That indicates a high rotational speed (RPM). The reason to do this is to

Very large disk brake.

Not sure about all the comments but the number of blades and the guess in the article are off. The speed of rotation is selected first which is based on the load (which is geared up). Then the blade density or % coverage of the swept area is determined for that speed. The more blades, the narrower they must be to

Dylan, many people found read ‘in bible times’. Normally children went to school from the age of seven to learn to read. A lot of the unfounded assumptions about illiteracy in those days is based on the general illiteracy in Europe in the Dark and Middle ages. There is a book called ‘Ordinary Life in Bible Days’

Correct!

Tortoise: They are not asking for the password to be cracked or removed. They are asking that the auto-wipe function that will erase the device unretrievably be bypassed, with software they are trying to compel Apple to write (assuming such software doesn’t already exist, which is a stretch). The article repeatedly

Spot on Grizzly99. They did not ask for the device password. They want everyone to get the impression that the contents of all traffic on all devices is not captured automatically and stored. That would have been revealed behind the scenes. Now, they have to have a plausible explanation for how they got the

The DOJ can ask the NSA for a copy of everything that passed through that device, and exactly where the phone was at the time of each communication within 10 feet, and the user device at the other end. Maybe they don't have the clearance to receive it.

There Wolf: The DOJ is not asking for access to ‘everything’ in the sense of Apple handing back an opened device. They are asking Apple to write software that disables the auto-erase function if they try too many password fails. They will not be given the password, or the data inside, just disabling the auto-erasure