MEMORY PALACE

Monday, 2 November 2009

Check out this video: SWEET HONEY & STEP AFRIKA IN REHEARSAL M... - SWEET HONEY IN THE ROCK's MySpace Blog |

Check out this video: SWEET HONEY & STEP AFRIKA IN REHEARSAL M... - SWEET HONEY IN THE ROCK's MySpace Blog |
Posted by Joseph at Monday, November 02, 2009

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

AddThis

Bookmark and Share

Twitter Updates

Twitter Updates

    follow me on Twitter

    My Blog List

    • Ars Technica
      With Trump’s cutbacks, crew heads for ISS unsure of when they’ll come back - "We are looking at the potential to extend this current flight, Crew-11."
    • IPKat - news and fun for everyone!
      No change: The EPO's guidance to Examiners on how to apply G1/24 - PatKat has received a copy of an internal EPO communication sent to EPO Examiners on how they should apply G1/24 (kindly sent by an anonymous Katfriend). I...
    • CircleID
      Just Say What You Mean: Avoiding Deadlock on Enhanced Cooperation in the WSIS+20 Review - On 29 July 2025, the UN organized a WSIS+20 Informal Stakeholder Consultation at which a number of government and stakeholder representations made three-mi...
    • Freedom to Tinker
      Newly-Retired Andrew Appel Reflects on his Voting Machine Advocacy - by Yaakov Zinberg ‘23 During the first week of the 2009 spring semester, Andrew Appel ’81, Princeton’s Eugene Higgins Professor of Computer Science, made...
    • The Open Rights Group
      The Great British Firewall: Age Verification has Failed - From Friday 25 July 2025 UK Internet users have had to verify their age to use a range of apps and websites – from social media platforms such as X, Reddit...
    • TechnoLlama
      Revisiting copyright infringement in AI inputs and outputs - I’ve been busy in recent weeks writing my last project for the summer, a book chapter on AI and copyright for the next edition of Law, Policy and the Inter...
    • The Laboratorium
      The Unfortunate Traveller - Thomas Nashe’s 1594 novel The Unfortunate Traveller (Wikipedia, original text, modern-spelling text) is a strange and grisly piece of work, equal parts The...
    • Canadian Privacy Law Blog
      Bill C-2 "Strong Borders Act" - Supporting Authorized Access to Information Act (Part 15) - On June 3, the new Canadian government tabled Bill C-2 in Parliament, called “An Act respecting certain measures relating to the security of the border ...
    • Binary Law
      How not to treat your X - Reposted from the Internet for Lawyers Newsletter: In 2022, Twitter peaked at 368 million active users. It was the platform of choice for journalists, poli...
    • Legal Scholarship Blog
      Call for Proposals: Fall 2024 Symposium - Iowa Law Review is now accepting proposals for the Fall 2024 Symposium. Proposal Requirements: Proposals should be submitted via email to ilr@uiowa.edu. Pr...
    • Cato Unbound
      Of Groups, Intersections, and the People Who Inhabit Them - Jacob T. Levy The powerful norms and rules that structured life in the American South during slavery and Jim Crow not only prohibited sex between black me...
    • BCS Security Articles
      People, not just data - Sometimes, we can overlook the true impact of cybercrime on individuals. Mike Sheward, Director of Information Security at Accolade, explains how learning ...
    • Info/Law
      Prof. Michael Risch on “Paths or Fences” - Professor Michael Risch, of Villanova (congrats Wildcats, BTW!), has a review of “Paths or Fences: Patents, Copyrights, and the Constitution” up at Written...
    • CYB3RCRIM3
      Child Sex Trafficking and Bypassing Security on a Tablet Computer - This post examines a recent opinion from the U.S. Court of Appeals for the 11th Circuit: *U.S. v. Blake*, 868 F.3d 960 (2017). The court begins the opin...
    • stevenberlinjohnson.com
      Wonderland, the book (and podcast!) - I’m very excited to announce my next book — Wonderland: How Play Made The Modern World, to be published in November by my long-time publisher Riverhead Boo...
    • Blogzilla
      Consultation response to "Keeping Children Safe in Education: proposed changes" - *Profs. Ian Brown and Douwe Korff, February 2016* *Introduction* 1. We have only just learned of the consultation, for which we apologise. The...
    • panGloss
      Three myths that need nailed about the right to be forgotten (and one question) - *1 **Everyone thinks it’s a bad idea, so why hasn’t it gone yet, already.* No they don’t, actually. Just the people who get to write in mass medi...
    • Clay Shirky
      Pulling Punches While Covering Print: A Reply to Ryan Chittum - Background: Yesterday, I wrote something about how nostalgia blunted skeptical coverage of Aaron Kushner’s dumb — and now failing — plans to build a newspa...
    • CMLP International Blog
      Will E.U. Court's Privacy Ruling Break the Internet? - In 2012, a bevy of internet companies and web sites waged a successful campaign against bills in Congress -- the PROTECT IP Act and Stop Online Piracy Ac...
    • DP thinker
      Recommend blog posts - For researchers working on privacy developments, here are a few suggested links to keep abreast of the latest: 1) Hunton and Williams Privacy Law Blog - 2)...
    • Moral Panics and the Copyright Wars
      MusicNet, Pressplay and Lost Opportunities - On pages 8-9 of Moral Panics and the Copyright Wars I discuss the aftermath of the shutdown of Napster in 2001. This period is interesting because it prese...
    • EDRI - Digital Civil Rights in Europe
      -
    • The Volokh Conspiracy
      -
    • Center for Democracy and Technology
      -
    • The Technology Liberation Front
      -
    • Technology, Thoughts, and Trinkets
      -

    About Me

    Joseph
    View my complete profile

    Blog Archive

    Picture Window theme. Powered by Blogger.