Sunday, September 25, 2005
Thursday, September 22, 2005
purple prose
william watkin's blog: "your hopes are brittle detritus that has corrupted to mutate on the serengeti of inadequacies barely felt they shave your soul and gossamer can be annoying in early evening as it catches on your face and hair"
Friday, September 16, 2005
NELSON'S FUNERAL RE-ENACTMENT ON THE THAMES FROM THE DE VERE CAVENDISH, ST JAMES'S HOTEL
NELSON'S FUNERAL RE-ENACTMENT ON THE THAMES FROM THE DE VERE CAVENDISH, ST JAMES'S HOTEL: "A delicious hot fork buffet luncheon will be served later in the cruise and you will finally return to Tower Pier for another bridge lift,"
Thursday, September 15, 2005
A consumer's obituary
Chatting over coffee with a Goat:
"Mr Thomas Crabtree
In an ashen jug,
Took the back off tele,
Forgot about the plug.
The manufacturer told Tom,
Make sure that you are able,
Warning: High Voltage
He'd put upon the label.
Why, fifty thousand people
Had understood with ease,
The words upon that label -
All in Japanese."
nice site
Chatting over coffee with a Goat
Luton:
"They 'ave peculiar bowels in Luton,
That's where ev'ryone sleeps on a futon.
Aye, they all live off soup,
So when they go for a poop,
All they can pass is a crouton"
"Mr Thomas Crabtree
In an ashen jug,
Took the back off tele,
Forgot about the plug.
The manufacturer told Tom,
Make sure that you are able,
Warning: High Voltage
He'd put upon the label.
Why, fifty thousand people
Had understood with ease,
The words upon that label -
All in Japanese."
nice site
Chatting over coffee with a Goat
Luton:
"They 'ave peculiar bowels in Luton,
That's where ev'ryone sleeps on a futon.
Aye, they all live off soup,
So when they go for a poop,
All they can pass is a crouton"
Monday, September 12, 2005
Oxford English Dictionary
Oxford English Dictionary
Revision of the entries in the September 2005 OED Online update has revealed an earlier origin than previously known for many words, including:
paunched (antedated to 1528 from 1649)
perceptiveness (1823 from 1852)
peremptorily (1435 from 1513)
pawner (1611 from 1745)
pawnshop (1759 from 1849)
peach bloom (1652 from 1856)
pearlescent (1938 from 1949)
peculative (1779 from 1909)
pedalo (1941 from 1959)
pedicure (1839 from 1842)
Appeals - September 2005 newsletter - Oxford English Dictionary: "Words or phrases which appear on the Appeals List are those currently being drafted or revised for the OED for which the documentary evidence is incomplete. Often these are slang or colloquial items which cannot be researched in specialist texts and are most likely to be found by a general reader in non-specialized or popular literature. "
Quotable quotes - September 2005 newsletter - Oxford English Dictionary: "1762 W. Dodd Poems, 'Tis..a point of great prudence in the governors of colleges, that the she bed-makers should be bothe aged and uninviting."
Revision of the entries in the September 2005 OED Online update has revealed an earlier origin than previously known for many words, including:
paunched (antedated to 1528 from 1649)
perceptiveness (1823 from 1852)
peremptorily (1435 from 1513)
pawner (1611 from 1745)
pawnshop (1759 from 1849)
peach bloom (1652 from 1856)
pearlescent (1938 from 1949)
peculative (1779 from 1909)
pedalo (1941 from 1959)
pedicure (1839 from 1842)
Appeals - September 2005 newsletter - Oxford English Dictionary: "Words or phrases which appear on the Appeals List are those currently being drafted or revised for the OED for which the documentary evidence is incomplete. Often these are slang or colloquial items which cannot be researched in specialist texts and are most likely to be found by a general reader in non-specialized or popular literature. "
Quotable quotes - September 2005 newsletter - Oxford English Dictionary: "1762 W. Dodd Poems, 'Tis..a point of great prudence in the governors of colleges, that the she bed-makers should be bothe aged and uninviting."
Thursday, September 08, 2005
Greynet
New word in my email in this week's issue of IT Security Bulletin:
Spyware-Guide.com :: Term :: Greynet: "Greynets are network enabled applications that are installed on an end user's system without permission from IT and are frequently evasive at the network level, using techniques like port agility and encryption to avoid being detected and blocked. Greynets pose a myriad of network and information security risks including potential vectors for malware, client-side code vulnerabilities, intellectual property loss, identity theft and more. While some greynets, especially IM, have legitimate business uses, others are not so business-friendly. Even legitimate greynet applications can pose grave network and information security risks."
My thanks to http://www.ebulletins.co.uk/
Trilogy Technologies, a leading integrator of Enterprise Security and
Systems Management solutions, bring to you information on "greynets".
A 'greynet' represents a network enabled computer application that is
downloaded and installed on an end user's system without express
permission from IT administrators, such as IM, P2P file sharing, web
conferencing, SKYPE, web mail and adware/spyware. Greynets are
frequently evasive to existing network security defences, using
techniques like port agility and encryption to avoid being detected
and blocked.
There are multiple reasons for the evasive behaviour which will be
discussed in this paper from FaceTime... this paper will also address
the growing security threats that accompany the adoption of greynet
applications in the enterprise environment.
Learn more. RapidRequest this white paper in 2 clicks
Spyware-Guide.com :: Terms & Definitions
Adware or Ad-Ware
Anti-spy software
anti-virus software
BackDoor Santa
BHO (Browser Helper Object)
Blended Threat
Cache
Chat Rooms
Cookie
Credit Monitoring
Dialers or 900 dialer or dialerz
Disposable email address
Drive-by downloads
Email obfuscator
EULA (End User License Agreement)
Firewall
Greynet
Hoax
Honeypot
How to: Safely set your Active X Controls
Spyware-Guide.com :: Term :: Greynet: "Greynets are network enabled applications that are installed on an end user's system without permission from IT and are frequently evasive at the network level, using techniques like port agility and encryption to avoid being detected and blocked. Greynets pose a myriad of network and information security risks including potential vectors for malware, client-side code vulnerabilities, intellectual property loss, identity theft and more. While some greynets, especially IM, have legitimate business uses, others are not so business-friendly. Even legitimate greynet applications can pose grave network and information security risks."
My thanks to http://www.ebulletins.co.uk/
Trilogy Technologies, a leading integrator of Enterprise Security and
Systems Management solutions, bring to you information on "greynets".
A 'greynet' represents a network enabled computer application that is
downloaded and installed on an end user's system without express
permission from IT administrators, such as IM, P2P file sharing, web
conferencing, SKYPE, web mail and adware/spyware. Greynets are
frequently evasive to existing network security defences, using
techniques like port agility and encryption to avoid being detected
and blocked.
There are multiple reasons for the evasive behaviour which will be
discussed in this paper from FaceTime... this paper will also address
the growing security threats that accompany the adoption of greynet
applications in the enterprise environment.
Learn more. RapidRequest this white paper in 2 clicks
Spyware-Guide.com :: Terms & Definitions
Adware or Ad-Ware
Anti-spy software
anti-virus software
BackDoor Santa
BHO (Browser Helper Object)
Blended Threat
Cache
Chat Rooms
Cookie
Credit Monitoring
Dialers or 900 dialer or dialerz
Disposable email address
Drive-by downloads
Email obfuscator
EULA (End User License Agreement)
Firewall
Greynet
Hoax
Honeypot
How to: Safely set your Active X Controls
Tuesday, September 06, 2005
mad about wind instruments
yes I am wild about the winds
I used to play at teach all of them except the bagpipes and the pipe organ
modern instruments from the piccolo to the tuba, and the recorder
But this one is new to me:-
"Fort Delaware's Museum has a newly discovered artifact that was purchased by the Delaware Division of Parks and Recreation: an "over the shoulder" cornet.
"This cornet had belonged to Fort Delaware's head musician, Sergeant Thomas M. Todd, who was from Pittsburgh's Independent Battery G. Todd and his Fort Delaware Cornet Band played concerts in Delaware, New Jersey, and Pennsylvania.
" They even played at the memorial service held for President Abraham Lincoln in Harrisburg, Pennsylvania.
"The Fort Delaware Cornet Band is mentioned in accounts from both garrison members and prisoners.
On March 27, 1864, Washington George Nugent, a surgeon at Fort Delaware, wrote to his wife, "My friend Turner handed me yesterday the song 'Wait love until the war is over' and I will send it to you. A member of the band here, 'Todd,' the leader in fact composed the music or rather set the song to music.
He is a very clever fellow, a schollar (sic) and a gentlemen, well educated, was a private in a battery here but he with several others out of the company compose our band and it is a very good one indeed."