First I'm a CIA agent and then I get this:
To: Sean Conner
Date: Thu, 27 Jan 2000 18:20:37 -0800
Subject: It's Time to Submit Your Site to BridalGowns.com
Just a brief message to notify you that your site is currently not scheduled in the pending reviews for BridalGowns.com. Brides and grooms will not be able to see your site through our upcoming service unless you submit yo ur URL at http://www.bridalgowns.com It's FREE! Now's the time!
It's just so … odd that I just had to check it out. No default background color (whoever did it assumed white—little do they realize my default is still that hideous gray color that Mosaic popularized in the early 90s) so it looks like crap.
But from the name, I suppose it's a wedding related site. But I have to wonder … they probably got my email address from my web site, so why did they spam me to have me send the URL of my site back to them? Are they totally incompetent?
And why am I asking rhetorical questions?
I've done the Electric King James Bible and eventually, I'll get this journal electrified as well (and maybe improve the writing style to boot!).
But in the mean time the next fairly easy thing to work on (unlike my ideas for Shakespeare) is a dictionary. I have several to choose from, and it's more usuable for more people than the Bible (but the journal/web log module I want to write it going to be big).
It seems easy.
brings up the defintion for “organization,” while
Brings up all the definitions beginging with “o.”
But there's a problem. Say I want to do something like:
To bring up all the technical terms beginning with “ai.” Nice, only there there exists several entires starting with “ai,” including the very term “AI.” What if I just want “ai?” Or all terms starting with “ai?”
Not an easy problem then, is it?
I'm not about to get into the navigation schemes yet.
Create a new PC hardware architecture using a modified Transmeta Crusoe CPU at it's heart. The CPU is modified to contain an encryption/decryption engine and the code morphing software is updated to include the decryption of encrypted executable code. Code morphing is a general conversion process and there's nothing that says that the binary source has itself got to be executable on some existing CPU. As the results of code morphing appear only within an internal instruction cache it's very difficult to gain access to the unencrypted executable program code.
I get this dread feeling that the Crusoe CPU from Transmeta is going to be used as an end-run around Open Source software. Just when you thought we were getting away from proprietary systems …
My Celebrity Match is Shania Twain. Not a bad choice, even if I don't like country music all that much.