Friday, November 30, 2001

Device plans: room-temperature Meissner-shield Maglev

Nikola Tesla Page, Tesla Coils (Bill Beaty's Homepage)

Arbor Scientifid Catalog

Chapter 1: Magnetism

SCIENCE HOBBYIST: fun with neodymium supermagnets

Build this gigantic solar furnace

Kaleidoscope Heaven

Hand-drawn Holograms

OPTS - OPTICS

GREENSLEEVES

The Greensleeves Homepage

Seti Logs






DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/30/01333599.456%3400565184749
11/30/01332599.456%3400565184749

Seti@Home

CNN.com - CG idols mean no human is required - November 29, 2001

Russian linked to massive ATM fraud

Monday, November 26, 2001

nV News - A great source for NVIDIA related news...

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/25/01329799.450%33932511866611

Seti@Home

Virtual Astronomy: Now Anyone Can Make a Discovery

After `hot' start, Linux now is `realistic' about China inroads (11/24/2001)

Sunday, November 25, 2001

Seti Logs






DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/25/01329399.449%3391771186958
11/21/01325699.445%3384317187645

Seti@Home

Fermi's Paradox II: What's Blocking Galactic Civilization? Or Are We Just Blind To It?

Wednesday, November 21, 2001

Mythology of the Seven Sisters (Pleiads)

MACHO Project Home Page

AAVSO Discussion Mail Archives

RTMC -- History 98

Nixie Tubes








Counting & display tubes

Galaxy Neat page, does not do anything but looks beautifull.

Tuesday, November 20, 2001

OpenBeOS Project - News

Yahoo - Red Hat Proposes to Enhance Microsoft Settlement Offer By Providing Open Source Software to All U.S. School Districts

This is great




Red Hat Proposes to Enhance Microsoft Settlement Offer By Providing Open Source Software to All U.S. School Districts
Open Source leader proposes to provide software to every school district in the United States if Microsoft provides computing hardware for the 14,000 poorest school districts
RESEARCH TRIANGLE PARK, N.C.--(BUSINESS WIRE)--Nov. 20, 2001-- Red Hat, Inc. (Nasdaq:RHAT - news) today proposed an alternative to the settlement announced today of the class-action lawsuit against Microsoft. Red Hat offered to provide open-source software to every school district in the United States free of charge, encouraging Microsoft to redirect the money it would have spent on software into purchasing more hardware for the 14,000 poorest school districts. Under the Red Hat proposal, by removing Microsoft's higher-priced software from the settlement equation, Microsoft could provide the school districts with many more computers--greatly extending the benefits Microsoft seeks to provide school districts with their proposed settlement.

Microsoft had proposed that, in settlement of class-action claims of price-gouging, the company donate computer hardware, software and support to 14,000 poor school districts throughout the United States. Under the proposed settlement, a substantial part of the value provided to schools would be in the form of Microsoft software.

The Red Hat's alternative proposal includes the following:

Microsoft redirects the value of their proposed software donation to the purchase of additional hardware for the school districts. This would increase the number of computers available under the original proposal from 200,000 to more than one million, and would increase the number of systems per school from approximately 14 to at least 70.
Red Hat, Inc. will provide free of charge the open-source Red Hat Linux operating system, office applications and associated capabilities to any school system in the United States.
Red Hat will provide online support for the software through the Red Hat Network.
Unlike the Microsoft proposal, which has a five-year time limit at which point schools would have to pay Microsoft to renew their licenses and upgrade the software, the Red Hat proposal has no time limit. Red Hat will provide software upgrades through the Red Hat Network online distribution channel.
A Win-Win Approach

The Red Hat proposal achieves two important goals: improving the quality and accessibility of computing education in the nation's less-privileged schools, and preventing the extension of Microsoft's monopoly to the most-vulnerable users.

``While we applaud Microsoft for raising the idea of helping poorer schools as part of the penalty phase of their conviction for monopolistic practices, we do not think that the remedy should be a mechanism by which Microsoft can further extend its monopoly,'' said Matthew Szulik, CEO of Red Hat. ``Through this proposal all of the states and all of the schools can win, and Microsoft will achieve even greater success for its stated goal of helping schools. By providing schools with a software choice, Red Hat will enable Microsoft to provide many more computers to these schools. At the same time, the schools can accept this offer secure in the knowledge that they have not rewarded a monopolist by extending the monopoly. It's now up to Microsoft to demonstrate that they are truly serious about helping our schools.''

General information about Red Hat's support for education is available at www.redhat.com/opensourcenow/.

About Red Hat, Inc.

Red Hat is the leader in developing, deploying and managing solutions built on the benefits of an open source platform. The open source platform includes the Red Hat Linux operating system for mainframes, servers, workstations and embedded devices, GNUPro tools for developers, database, e-Commerce, secure Web server, high availability server and run-time solutions like eCos and RedBoot. For this platform, Red Hat provides end-to-end professional services including Professional Consulting, Engineering services, Technical Support services, and Global Learning services. Red Hat Network is the premier Internet based service that simplifies and integrates the deployment and management of these offers. More information about Red Hat is available at www.redhat.com. Red Hat is headquartered in Research Triangle Park, N.C. and has offices worldwide. For investor inquiries, contact Gabriel Szulik at Red Hat, (919) 547-0012, x439.

LINUX is a trademark of Linus Torvalds. RED HAT is a registered trademark of Red Hat, Inc. All other names and trademarks are the property of their respective owners.

FORWARD-LOOKING STATEMENTS

Forward-looking statements in this press release are made pursuant to the safe harbor provisions of Section 21E of the Securities Exchange Act of 1934. Investors are cautioned that statements in this press release that are not strictly historical statements, including, without limitation, management's plans and objectives for future operations, and management's assessment of market factors, constitute forward-looking statements which involve risks and uncertainties. These risks and uncertainties include, without limitation, reliance upon strategic relationships, management of growth, the possibility of undetected software errors, the risks of economic downturns generally, and in Red Hat's industry specifically, the risks associated with competition and competitive pricing pressures, the viability of the Internet, and other risks detailed in Red Hat's filings with the Securities and Exchange Commission, copies of which may be accessed through the SEC's Web site at http://www.sec.gov.


--------------------------------------------------------------------------------
Contact:

Red Hat, Inc. Schwartz Communications
Melissa London Maribel Lopez/Josh Slobin
(919) 547-0012 (781) 684-0770
melissa@redhat.com redhat@schwartz-pr.com

Sunday, November 18, 2001

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/18/01322599.438%3379088189709

Seti@Home

Saturday, November 17, 2001

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/17/01321599.441%33764071884519

Seti@Home

Friday, November 16, 2001

HotHardware - The Leadtek GeForce 3 Ti500 TD

CNN.com - Volunteers needed for Mars expedition - November 14, 2001

Aquarius Rising: a conventional approach

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/16/01320299.438%3374246189539

Seti@Home

It's a memory card; it's a camera; it's a cell phone!
By Nancy Lang
(11/15/01)

Eyeball Chat 2.0 - Downloads - CNET.com


Description
Eyeball Chat allows you to communicate face-to-face over the Internet for free. All you need is an Internet connection and a Webcam to connect with friends and family worldwide. The Contact List allows you to see which of your contacts are online at anytime, so you can instantly engage in live video chat.
This release features support for AIM, MSN, and Yahoo messengers, support for integrated chat rooms with improved privacy, the ability to record and send video messages, file transfer, SSL encryption, and more. Please make sure that you have Windows 98, ME, or 2000. Eyeball Chat does not support Windows 95 or NT.

Thursday, November 15, 2001

Wednesday, November 14, 2001

Iwill XP333 Motherboard Review @ t-break

Sustainable Energy delivers turnkey small-scale wind solutions. Recent installations include a 20kW turbine to provide electricity for a business located in Swansea Enterprise Park. Sustainable Energy also has experience in financing and managing wind turbine installations.

The Woo-Woo Credo

The Register


Do-it-yourself Internet anonymity
By Thomas C Greene in Washington
Posted: 14/11/2001 at 12:46 GMT


Along with the recent government hysteria over terrorists, we've seen legislative measures and 'emergency powers' inviting law-enforcement agencies worldwide to conduct Internet surveillance on an unprecedented scale. But because the state-of-the-art of electronic dragnets makes it difficult if not impossible to exclude the comings and goings of innocent citizens, we thought this a good time to run down the basic techniques for ordinary, law-abiding folk to come and go anonymously on the Net, and keep their private business private.

How do you make a truly anonymous post to a newsgroup or a BBS? How do you keep the Web sites you visit a secret? How do you send e-mail and ensure that its contents can't be read by someone who intercepts it? How do you chat anonymously?

We'll invoke our foil, Windows addict Harry Homeowner, and lay it out in terms the average user can profit from, though with hopes that even you power users might learn a thing or two in the process.

Proxies
These are your first line of defense, so let's start with them. Proxies provide a useful layer of mediation between your machine and the Internet. There are several types, but Web proxies and Socks proxies are the two most relevant to our purposes.

Grossly oversimplified, a proxy is a remote machine which you connect through to the Net, which forwards your IP traffic, and which you then appear to be originating from. When you contact a Web site via an anonymous proxy, it's the proxy's IP which shows in their logs.

You can use either Web or Socks proxies with your browser, and Socks proxies with other Net clients to obscure your IP from prying eyes. But you do have to choose them with care.

Socks proxies are the best, general-purpose proxies. This is so because Socks are non-caching, which means, for example, that there won't be a record of the Web pages you fetched while connecting through one, except on your own machine -- and this you can fix rather easily (more on that in 'Browser Settings'). It also means they're slow, but if you want anonymity, you shouldn't quibble.

But Internet Explorer doesn't support Socks. What to do? It's not brain surgery. You can simply download an application called SocksCap, and use it to 'socksify' any IP client you use. It will work with browsers, e-mail clients, telnet, SSH, chat clients, even your l4me e-mail bomber. Test it; socksify your e-mail client and send a message from one of your accounts to another. Check the header. Is the originating IP your proxy? If so, your e-mail now appears to originate from the proxy's IP. This can be extremely useful, as we'll see below.

Useful but not foolproof. Of course the proxy machine's admin can easily learn that you connected to it after perusing his logs, so a proxy doesn't actually conceal you; it just adds a layer between you and whatever you're contacting on the Net. This layer can be thick or thin, depending on where the proxy machine is physically located. If your proxy is located in a country unlikely to cooperate with requests for their logs from foreign officials, or a country where your mother tongue is rarely spoken, it can be, in practical terms if not theoretical terms, quite an effective layer of protection.

It's easy to determine a proxy's country of origin with the $20.00 Patrick Project DNS utility, which will resolve IPs to addresses and vice versa, and a good deal more to boot. You cheapskates out there can go to SamSpade.org and do it all for free.

Now you know how to determine your proxy's location. The more exotic the better: Korea is better than Japan; Thailand is better than Korea; Indonesia is better than Thailand; Papua New Guinea is pure gold. Kenya is better than Morocco; Ghana is better than Kenya; Guinea is better than Ghana; Burkina Faso is pure gold. You get the picture.

Now you need to test the proxy for anonymity. Some of them can leak appalling amounts of information, like your true IP, for example. There are several environmental variables checkers on line which will tell you just what information your proxy is leaking to the world, and a nice links page to a heap of them is located at Proxys4all.com.

And what do env checkers tell you? The chief variables you need to know about are:

REMOTE_ADDR: Your apparent IP, which should be the proxy. If not, use another proxy.
REMOTE_HOST: Your apparent address, which should resolve to the proxy IP. or better yet not be resolvable at all. If it resolves to you, use another proxy.
HTTP_X_FORWARDED_FOR: Sometimes your true IP is revealed -- get another proxy.
HTTP_USER_AGENT: Your browser type -- unimportant.
FORWARDED: Reveals the fact that you're using a proxy; not fatal, but better if blank.
VIA: Reveals the fact that you're using a proxy; not fatal, but better if blank.
CLIENT_IP: Sometimes your IP is revealed -- use another proxy.
HTTP_FROM: Sometimes your IP is revealed -- use another proxy.

You can use a free application called ProxyHunter to scan ranges of IPs and find your own proxies. These you can evaluate, determining location and anonymity according to the guidelines above.

Socks proxies are located on port 1080, so always use that in your search with ProxyHunter. HTTP proxies on ports 80, 3128 and 8080 are useful, and can be loaded directly into your browser, but they're not quite as secure.

You can load a good Socks in your chat clients like IRC and ICQ; and with SocksCap you can run your telnet and e-mail clients and browser through one as well.

For even more anonymous surfing, you can give yourself an added measure of security by connecting to a Web proxy like SafeWeb or Anonymizer through a Socks (or even a decent HTTP proxy). Feel free to e-mail me if you can't figure all this stuff out -- but please, I beg you, give it a fair go on your own first. I'm a humble news reporter, not a help desk.

When you find a Socks proxy with ProxyHunter, or by perusing the many public Web sites where they're listed, and you get satisfactory results from the env check, and your proxy is located on some God-forsaken corner of the Earth, then you've acquired a decent layer of protection. Congratulations. But that's far from the whole shebang.

Anonymous dialups
Whenever you dial in to an Internet connection, your ISP can determine your phone number with caller ID. This information is recorded, and can be turned over to nosy Feds on request with an administrative subpoena, which doesn't require a judge's approval.

If you've got a regular ISP account billed to a credit card, your ISP knows perfectly well who and where you are, so concealing your phone number from them is hardly an obstacle to associating you with your Net activity.

However, there are free ISPs like NetZero on which you can register with totally fictitious personal information, and to which you can connect with caller ID disabled. This isn't a solution in itself, but combined with the judicious use of good proxies, it can add a second, thick layer of anonymity to your comings and goings.

These ISPs don't allow you much free surfing time -- usually something like ten hours a month; and they feed adverts to you and they're slow (made slower still by proxy use); but they can be a superb means of connecting when you need to be even more anonymous than usual, such as when you make a controversial post to a newsgroup or BBS, or send a sensitive e-mail.

Get your ducks in a row: first, go to an Internet cafe or a library. If they require identification, go elsewhere. When you find a public place where you can surf anonymously, set up an account with NetZero using fictitious personal information. Even better, go through a Web proxy while you're at it.

Record your login, password, and a dialup number convenient for your home location. Now go home, and disable caller ID (contact your phone company for instructions), and dial in to your new fictitious account. And always dial in with caller ID disabled.

Finally, use an anonymous Socks proxy with your e-mail client for newsgroups, and a Socks along with a Web proxy for BBS posts. Theoretically, you can still be traced because the phone company knows what you're up to; but unless you're under active surveillance by the Feds, you can safely gamble that no one from NetZero is ever going to peg you.

You're getting very close to true anonymity, and you still haven't gone beyond what our friend Harry Homeowner can handle.

There are other things you can do with this caller-ID-off+Netzero+Socks+Web-proxy setup. You can, for example, open a Web-based e-mail account with fictitious personal information and send and receive anonymously, so long as you set up your NetZero account properly, and always connect to it with caller ID disabled, always use a Socks with your browser, and/or always use a Web proxy.

You've got ten hours a month. Spend them wisely, and you can surf almost anywhere or post almost anything on line with no repercussions.

But what if your e-mail is intercepted by something hideous like the FBI's packet sniffer Carnivore? Unless you stupidly identify yourself in your mail, you're almost certain not to be identified -- but you still may not want the contents read by anyone but the intended recipient. You don't have to be a criminal to desire privacy, much as the Feds like to pretend otherwise.

Crypto
Now this is funny. If you use a nice, free crypto program like PGP, you can easily encrypt your e-mail. Just follow the instructions -- there's really nothing to it.

The problem here is that the Feds, if they happen to be watching, can gather that you sent an encrypted message to Recipient X, a fact which you may not wish them to know.

If you follow the scheme above, you can send a message anonymously via a Web-based account. But unless I'm missing something, you can't use PGP to encrypt Web-based e-mail messages.

So how do you have your cake and eat it too? It's quite simple: you create an encrypted text file and attach it to your Web-based anonymous e-mail. In the body of the message and in the From: field you give away nothing about yourself. In the encrypted attachment you spill your guts.

Now all the Feds can determine is that Recipient X got an e-mail message with an encrypted attachment from Monica_Lewinski666@hotmail.com or whatever.

Easy peasy, even for our Harry.

Browser settings
Proxy or not, your browser can leak ghastly amounts of information about you. Fortunately, tightening it up is easy when you know what to do.

Since our Harry almost certainly uses MS Internet Explorer, we'll deal with that, though Netscape users should find this information easy to apply to their own setups.

Get into Tools/Internet Options/Security. Go to 'Custom Level' and disable 'Download unsigned ActiveX Controls' and 'Initialize and script ActiveX Controls not marked safe for scripting'; set 'Java permissions' to 'High Safety'; disable 'Meta Refresh'; disable 'Launching programs and files in an IFRAME'; set 'Software Channel permissions' to 'High Safety', disable 'Userdata persistence'; disable 'Active scripting', 'Allow paste operations via script', and 'scripting of Java applets'.

Accept session cookies but not stored cookies. Never use in-line auto-complete, and never allow Windows to save any of your passwords.

Now go to Tools/Internet Options/Advanced and clear 'Enable Profile Assistant', select 'Do not save encrypted pages to disk', clear 'Enable page hit counting', and select 'Empty Temporary Internet Files folder when browser is closed'.

That should about do it.

While you're about it, pop over to Control Panel/Network and ensure that File and Printer sharing are disabled.

Spyware
While you're on the job, never do anything with your company's computer that you wouldn't want your Grandmother to know about. Spyware is ubiquitous in the work place. Don't even mess with a company-issued laptop, which may well contain 'remote administration' features which will enable a company admin to connect to it. If you want to be anonymous, use your own equipment. If you're using anyone else's hardware, assume that anonymity is impossible.

You can get a fab program for detecting Trojans called The Cleaner for $30.00 from Moosoft. A number of Trojans fail to be detected by the fine products of the popular anti-virus companies, in spite of their powerful suggestions to the contrary. Moosoft picks up most of them.

Most software firewalls are notoriously bad at stopping, or even notifying you, when a malicious program sends data out from your machine. An application like The Cleaner can go a long way towards assuring you that no such contaminant exists on your box.

PC Hygiene
There's a crucial difference between deleting a file and wiping it. A deletion leaves a file's entire contents on your disk, until the space it occupied happens to be overwritten by a subsequent file. In the mean time, the data can be recovered with forensic techniques. A proper wipe, on the other hand, overwrites that space immediately so the file's contents can't be recovered. Utilities capable of this include BCWipe, Norton Wipeinfo, Evidence Eraser, and PGP.

The only certain way to keep your machine free of incriminating files and alien malware is to wipe your HDD periodically and clean-install your OS from original media while preserving those files and progies you can't do without. If you're serious about anonymity and file preservation, then you'll cough up the $200.00 or so needed to maintain two HDDs, because nothing beats a spare, non-removable magnetic storage device; and nothing beats a true file wipe, which is the only insurance against forensic probing.

This is how I do it -- and I do it frequently: I have two HDDs in my Windows box. When I get ready to wipe my primary, I've already done an fdisk and format /u and a thorough 'government wipe' on the secondary using Norton Wipeinfo. I simply copy all the files and progies I wish to preserve onto that thoroughly-wiped secondary disk. I then switch the primary and secondary, and install Windows from original media onto the wiped disk, from which I'll boot. I install Norton Utilities, naturally.

I then fdisk and format /u the former primary and do a thorough 'government wipe' using Norton Wipeinfo. Thus it's ready, and spotless, whenever I need it. I tend to do this every two or three months, depending on what I've been up to.

As soon as I get a sense that my current primary contains material I'd rather not preserve for posterity, I repeat the process. With two HDDs, it all takes about forty-five minutes. With this method you wipe not only your files, but your registry and swap file too. Forensics, as it's normally practiced, becomes futile.

If this seems too extreme, a utility called the Evidence Eliminator Eliminator (E3) by Radsoft (not to be confused with Robin Hood Software's lame 'Evidence Eliminator') will wipe a good many of your messes and excesses for a cool $80.00. It's considerably cheaper than a spare HDD, and pretty thorough. It doesn't merely delete files, it wipes them properly. To add to its effectiveness, you can use a proper file wipe utility like BCWipe or Norton Wipeinfo to eliminate your swap file, where a good deal of what you've been up to is stored. The file is in your C:\ directory and is named Win386.swp.

Follow these basic guidelines, and you'll be quite safe, though not perfectly safe. It's a bit like copulation -- there are quite effective birth control methods, but the only way to be absolutely certain you won't ever get pregnant is not to do the deed.

But that's no fun. And neither is never using a computer. So practice safe computing and stop fretting. As with the pill, the odds are immensely in your favor. So smile, relax, and enjoy. ®

Personal note
In an 18 October article entitled SafeWeb ain't all that I'd promised to post this follow-up in a week's time. Unfortunately a family emergency intervened, and subsequent news demanded my attention. My apologies to those who've been waiting. -- tcg

NoLogo: the book that became part of a movement

WTO | World Trade Organization: WTO / GATT Home page

Motherboards ASUS A7M266-D Double Performance with Dual Athlon Processors

Scientific American: Feature Article: The Electronic Paper Chase: November 2001

Seiko-Epson and CDT Develop Worldâs First Ink-Jet Printed Full Colour LEP Display

Science & Research

UA researchers develop new foldable monitors - Thursday April 12, 2001 - The Arizona Daily Wildcat

University of Arizona scientists are using a standard inkjet printer to produce light-emitting sheets of plastic that could soon be used as lights and signs

developerWorks: Linux | Open source projects : RunTime: Pipes in Linux, Windows 2000, and Windows XP

Honda 'Asimo' Robot Becomes More Human-Like

Friday, November 09, 2001

eMOTION! REPORTS.NET | The Path to Hypersonics : Scramjets are Go

e MOTION REPORTS.NET PRESENTS ...

FLUG REVUE Home Page Germany's leading aerospace magazine!

Sonic Cruiser


Jane's at Paris Airshow 2001- Sonic Cruiser details leak out

The key issue that Boeing really faces is how radical should it be in developing this new design. There are two programmes currently being assessed – a Mach 0.95/0.98 aircraft and a Mach 1.2 design.

Boeing: Sonic Cruiser

Chicago Tribune | Turbulence lifts Boeing Sonic Cruiser

Boeing has refused to confirm or deny widespread industry talk that the aircraft is being tested to go even faster, which would make it a supersonic rather than sonic cruiser.

eMOTION! REPORTS.NET | The Black Technology that Makes Sonic Cruiser a Real Possibility

McDonnell Douglas, Lockheed, and Boeing all feature strongly amongst the companies that have been involved in advanced aircraft studies for the USAF from the 1960s onwards. McDonnell Douglas in 1985, examined the possibility of a 305 passenger long-range aircraft, capable of speeds up to Mach 5, and powered by regenerative air turboramjet engines. The company has since been acquired by Boeing.

Boeing Mulls All Out War with Sonic Cruiser






Boeing's Sonic Cruiser Skirts The Edge Of The Sound Barrier

Boeing gambles on speed with Sonic Cruiser
Roundhill also confirmed reports that an unnamed engineer had come up with a breakthrough that helped make the jet possible. He wouldn't identify the breakthrough or even the engineer.

Howstuffworks "How Sonic Cruisers Will Work"

Europe Hits Out At Boeing's Sonic Cruiser

The European Commission has accused the Boeing Co of risking environmental damage with its planned 'sonic cruiser', raising transatlantic tensions over how to combat climate change.

Environment Commissioner Margot Wallstroem said Boeing vice-chairman Harry Stonecipher has 'nonchalantly' neglected environmental concerns, adding that a one-hour time saving on a transatlantic flight is not worth 'a significant increase in carbon dioxide emissions'.

"Can it be true that you have brushed aside environmental concerns around new aircraft so nonchalantly?" Ms Wallstroem said in a letter to Mr Stonecipher released last Friday by the EU. "I find it hard to believe that anyone today could afford himself the luxury of a 'let's-not-think-about-tomorrow' attitude which runs diametrically opposed to the aims of sustainable development."

The European Union has clashed with the US on climate change after President George Bush rejected the Kyoto global warming treaty. At a meeting with Mr Bush last week, EU leaders said they will ratify the treaty by 2002 even without his support.

Aircraft emissions contribute about 3.5 percent of man-made gases said to cause global warming, and are expected to double over the next 10 to 15 years, Ms Wallstroem said.

Mr Stonecipher said there is 'plenty of fuel still around' and talked about an 'environmental bandwagon' in an interview with the Times of London, according to Ms Wallstroem.

The 15-nation EU and the US have also accused each other of failing to adhere to agreements limiting government help for commercial plane development.

At a meeting this month, EU Trade Commissioner Pascal Lamy responded to US questions about funding for the planned Airbus A380 'superjumbo' by asking how much support Boeing got from the National Aeronautics and Space Administration to help develop the sonic cruiser.

Sonic Cruiser completes wind tunnel tests - 2001-09-17 - Puget Sound Business Journal (Seattle)







Sonic Cruiser

  • Speed - 0.95 Mach (703 mph/1131 kph)
  • Engines - Twin 777-class
  • Cruising Altitude - 40,000 feet (13,000 m)
  • Range - 9,000 nautical miles (16,668 km)
  • Seating - 100-300


Concorde


  • Mach 2 (1,350 mph/2,172 kph)
  • 4 Rolls Royce/Snecma Olympus 593 (18.7 tons/17 metric tons of thrust)
  • 60,000 feet (18,300 m)
  • 4,067 nautical miles (6,200 km)
  • 100


747-400


  • 0.84 Mach (560 mph/901 kph)
  • 4 Pratt & Whitney PW4062 (63,300 lbs/26,945 kg of thrust)
  • 35,000 feet (10,668 m)
  • 7,325 nautical miles (13,570 km)
  • 416-568





Turns of Phrase: Sonic cruiser

BBC News | SCI/TECH | Water off a beetle's back


see your world from 132,000 feet

U.S. Naval Academy Alumni Association

IBM to build smaller supercomputer

News: Terrorism fears aid Iridium relaunch

Downloads

Earthlink Sucks

Thursday, November 08, 2001

ATM links

ATM's Resource List

Why binoculars?

Telescope

PS - eyepieces p1

The Taipei Times Online: 2001-11-08The Taliban are slaughtering Hazara Afghans who try to flee the country, gunning them down in cold blood, claim refugees who have made it to Pakistan.

Defectors Cite Iraqi Training for Terrorism

Friday, November 02, 2001

Mount Olympus - Navigation

BBspot - Justice Department, Microsoft Near Deal



...
The deal places the software maker under supervision by the US government for the next five to seven years, but allows it to maintain its software products as is. In return, the government has agreed to establish Redmond as a new state, and has offered Microsoft a controlling interest in both the Senate and the House of Representatives for the next five to seven years. In addition, John Ashcroft will receive $2 billion in cash and stock in exchange for harassing Oracle, Sun and AOL-TW for the next 5 years.

Attorneys General for the states also prosecuting the case said that they would oppose any deal that didn't protect the rights of consumers, however, for $3 billion dollars they "may reconsider their priorities."

President Bush was pleased with the news. "America must move ahead with the task at hand. Our country faces a great danger and with the help of Windows XP we can have an army of flying soldiers to help with the war on terrorism," said Bush.

Attorney General John Ashcroft dismissed criticism that the government was selling out citizen's rights to corporate America. "That's ridiculous," said Ashcroft, "I'm a citizen. Look how good of a deal I'm getting."

A recent poll showed that Americans were evenly divided on the issue. When asked what they thought of the Microsoft settlement half of Americans didn't care and the other half were worried about anthrax.

Edward A. Villarreal. Powered by Blogger.

Labels

Total Pageviews