473,396 Members | 2,099 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

attention computer hackers......... new opertaing system os new news at rec.climbing

Black Ball Magazine. The first one. new news at rec.climbing until web
domain setup.

I posted the following message at the end of the message.

Playboy%49/%51Netscape is coming out with the new compiler os.

Website is coming out for Black Ball Magazine. New news about this
google groups alt.freemasonry, rec.climbing (reason gyms are freemason
lodges)

I am joining Freemasonry.......

Leaving Black Watch just in Shadow Watch (CIA). Never to talk about it.
Last thing, the five stars on the hat in Star Gate are 4 shadows of 4
stars on one star. They talk bout this on the black board.

Jon Riley grew up in Toronto, (bracket not in address, p18l8g48jon
....... p1 is galaxy, l in planet, g4 is cpu jon is email address
divided by 8 not dots because errors in computer triggers.) attended
Lakehead University BA, 2nd year Electrical Engineering George Brown
University, Java Sun School, Oracle Forms & Reports 6i, VB Self,
Microlink2 create, Faxnet whole ½, Kirchoff's Voltage Law create,
CIA serve. Recruited from writing at alt.freemasonry and Igloo Hostel
summer of 2003. Serve RCMP. Jon Riley not remember.

Today's Post

Kirchoff's Voltage Law/Donut at University of Ottawa

D V
S t S t(breaks/resistors on a clock)

Another way

3xy-6xyb _=z
over
2xy

The donut is 3rd dementional. What it looks like. Xy graph is 2nd
dement. To place an apple on the xy graph the xy with z grid must be in
a sphere. 3rd dement another skin of the cat, 3xy -6xy over 2xyb
total equals z. b = 5.04 more digits big mack divided by onions cut
dobbled. Visit class today in Ottawa p18l8ottawa Ottawa and thought
some of the questions on test were wrong phaed out teacher thought new
material.

(Ken was in my head for this) Use a c++ compiller as an operating
system on top of ms dos. All files
made in the compiller such as (dot).cdd files like netscape, word,
excel are the exe files we use today. Once you have the compiller up
and running on msdos, pass around games, netscape, word etc and run
them in the compiller (also known as testing the file before you make
it a exe file).

jon riley
y020181@yahoo
shadowatch
ottawa, canada

Jul 22 '05 #1
1 1006
On Mon, 06 Dec 2004 11:14:32 -0800, black ball magazine wrote:
[crap, crap, and crap]
Someone experimenting with Markov chains again ?

http://en.wikipedia.org/wiki/Mark_V_Shaney

Jul 22 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: beliavsky | last post by:
Paul Graham's recent book "Hackers & Painters" may be interesting readers for Python programmers. He likes flexible languages like Python, although Lisp is his favorite. Here is a quote from his...
4
by: Jim Scheffler | last post by:
I'm new to VB.NET programming and would like some help on a little project I've got going. How would I go about getting computer information on my local computer, i.e. serial number, hard drive...
5
by: Kenneth P | last post by:
Hi, I have an old project I've been working with on an old computer, bought a new fast computer, created a new empty project and started to include all old files into the project. When I want to...
19
by: Martin | last post by:
Hi all, We have an administrative application that we are considering to rewrite in aspx with vb2005. I think the marketing possibilities are enourmous. In our standard app, the user logs in...
669
by: Xah Lee | last post by:
in March, i posted a essay “What is Expressiveness in a Computer Languageâ€, archived at: http://xahlee.org/perl-python/what_is_expresiveness.html I was informed then that there is a academic...
0
by: candra | last post by:
Learn What Hackers Know? -General Hacking Information -Password Security -Scanning, Fingerprinting And Similar Techniques -How Hackers Attack Numerous Internet Services -How Hackers Attack Web...
40
by: navti | last post by:
I saw here http://java.sun.com/javase/6/docs/technotes/tools/share/jsdocs/index.html that javascript has built-in methods such as cp, dir, date etc how do i get these to run on the client...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.