Two-thirds of millionaires left Britain to avoid 50p tax rate – Telegraph.
This has cost the UK GBP7 billion. They have repealed the laws, but the millionaires are not coming back much.
Two-thirds of millionaires left Britain to avoid 50p tax rate – Telegraph.
This has cost the UK GBP7 billion. They have repealed the laws, but the millionaires are not coming back much.
This article has links to how the US uses simulators and what their capabilities are. They talk about training for UAV’s, the network centric way in which they’re trying to link up simulators globally, how they’re used to train for large force employments, using them to practice 4 ship formations and of course, the limitations of the system in basic airmanship.
How far can simulations go versus live flying? – The DEW Line.
Exogenous variation comes from the unexpected shutdown of the popular file hosting platform Megaupload.com on January 19, 2012. The estimation strategy is based on a quasi difference-in-differences approach. We compare box office revenues before and after the shutdown to a matched control group of movies unaffected by the shutdown.
We find that the shutdown had a negative, yet insignificant effect on box office revenues
via Piracy and Movie Revenues: Evidence from Megaupload by Christian Peukert, Jörg Claussen :: SSRN.
Evidence has emerged showing the Department of Homeland Security served a search warrant on Mr Dotcom’s file-sharing company Megaupload in 2010 which he claims forced it to preserve pirated movies found in an unrelated piracy investigation.
The 39 files were identified during an investigation into the NinjaVideo website, which had used Megaupload’s cloud storage to store pirated movies.
When the FBI applied to seize the Megaupload site in 2012, it said the company had failed to delete pirated content and cited the earlier search warrant against the continued existence of 36 of the same 39 files.
Dotcom: We've hit the jackpot – National – NZ Herald News.
And all the experts were saying it would be years before they could do anything with it when it was delivered to the Navy on September 25th. It looks like the Chinese are serious about putting it in operation as soon as they possibly can.
China Lands First Jet on Its Aircraft Carrier | Military.com.
Deckard Sorenson has found a way to coat a surface with hydrophilic and hydrophobic coatings, and then uses a fan to pass air over the surface. The water condenses on the surface and, eventually, Sorenson has created a self-filling water bottle.
Scientist takes inspiration from natural world to create self-filling water bottle | PRI.ORG.
One of the problems DTN fixes is queueing transmissions, as transmitting to mars at the speed of light incurs an 8 second delay.
NASA fires-up experimental space Internet for robot control.
A customer trying to set up his Razer Naga 2012 mouse couldn’t because he had to register with Razer before he could change the settings. The Razer servers were down because of hurricane Sandy. Why on earth would he need to connect to Razer at all to set up his mouse?!
“Why the hell does this mouse need to connect to the Internet?” | Ars Technica.
Incredibly the US has managed to let Apple patent this shape. The prior art is allready there for tablets, but couldn’t someone have just shown the patent examiners a table top?
Apple is granted a patent on the rectangle. No, really • The Register.
The CIA is not in the habit of discussing its clandestine operations, but the agency’s purpose is clear enough. As then-chief James Woolsey said in a 1994 speech to former intelligence operatives: “What we really exist for is stealing secrets.” Indeed, the agency declined to comment for this article, but over the course of more than 80 interviews, 25 people—including more than a dozen former agency officers—described the workings of a secret CIA unit that employed Groat and specialized in stealing codes, the most guarded secrets of any nation.
The CIA Burglar Who Went Rogue | History & Archaeology | Smithsonian Magazine.
Homomorphic encryption is where one party (Alice) encrypts data and passes it to another (Bob) with an encrypted key. This means that Bob can’t read the data, but can perform computations on it, and pass the encrypted results (which Bob can’t read) to Alice, so that she can decrypt it with her key. This is especially useful in the age of cloud computing, webservices, SaaS and private records.
Alice and Bob in Cipherspace » American Scientist.