Queen Elizabeth II specifically asked to be in a James Bond skit with Daniel Craig for the Olympics, breaking royal protocol. When asked if she would like to say something she said, "Of course I must say something. After all, he is coming to rescue me." olympics.nbcsports.com/20…
A false surrender is a war crime under Protocol I of the Geneva Convention. en.wikipedia.org/wiki/Per…
In 1981 lawyer Roger Fisher came up with a nuclear arms protocol (Fisher Protocol) where the code to fire nuclear weapons would be inside a small capsule implanted near the heart of a willing volunteer who would have to carry a butcher knife with him. independent.ie/world-news…
During a show for the Royalty of Great Britain the Spice Girls breached royal protocol when two of the group's members planted kisses on Prince Charles' cheeks and pinched his bottom. en.wikipedia.org/wiki/Spi…
ALOHAnet was the first computer network in the world to use randomized packet access to a shared medium and heavily influenced the development of modern protocols such as ethernet spectrum.ieee.org/the-ins…
In a scene of Jojo Rabbit (2019), β€œHeil Hitler” is said 31 times in one minute! According to writer/director Taika Waititi, he wanted a funny moment, but also wanted to illustrate how ridiculous Nazi protocols were. idropeit.com/in-this-scen…
The Stroke symptoms and protocol are, "F.A.S.T". F= Face drooping/numbness,A= Arm numbness, S= Speech inability/ slurred, T= To call medical help. stroke.org/en/about-strok…
Today I learned that there exists a formal, research-based protocol for assessing the degree of danger a woman faces of being murdered by her male spouse/boyfriend/partner/ex dangerassessment.org/DA.a…
In April 2001 a parody internet protocol was implemented IRL via pigeons! en.wikipedia.org/wiki/IP_…
Anthony Daniels (as C-3PO, a humanoid protocol droid in the service of General Leia Organa) is the only actor to have appeared in all the episodic films in the Star Wars series. vulture.com/2015/12/antho…
Today I learned of Canadian Air Marshal Charles Roy Slemon, who saved the world from possible nuclear annihilation by breaking protocol, when on October 5th 1960, the BMEWS site in Thule, Greenland falsely detected a level 5 ICBM attack due to the rising moon. en.wikipedia.org/wiki/Roy…
Count Juan Raphael Dante, a director of the US Karate Association until 1962, didn't like the focus on ceremony, tradition, and protocol, over "effectiveness", so he created the "Dance of Death" system, taught in a mail-order booklet, World's Deadliest Fighting Secrets, advertised in comic books en.wikipedia.org/wiki/Cou…
Today I learned of the Kudirka Incident: a Soviet sailor swam from his ship and attempted to defect with the American Coast Guard. Not knowing the protocol for granting asylum, the Coast Guard eventually allowed the Soviets onto their vessel, where they arrested him and sentenced him to 10 years in prison. en.wikipedia.org/wiki/His…
Prince William breaks royal protocol by flying with his children on the same plane. As direct heirs to the throne, his children should fly on a separate plane in case it crashes. uk.businessinsider.com/pr…
Nasa developed a internet protocol that could connect our entire solar system called DTN (Disruption Tolerant Networking) nasa.gov/content/dtn
The Nazis did use chemical weapons in combat on several occasions along the Black Sea, notably in Sevastopol, where they used toxic smoke to force Russian resistance fighters out of caverns below the city, in violation of the 1925 Geneva Protocol en.wikipedia.org/wiki/Che…
Today I learned of the Fisher Protocol, an idea where nuclear launch code would be implanted in a volunteer. If the President really want to launch a nuclear strike, he had to kill the volunteer. en.wikipedia.org/wiki/Rog…
On 12th September 2001, the day after 9/11, The Queen ordered her Royal Guards to break protocol and play the USA's National Anthem for stranded Americans in London telegraph.co.uk/news/worl…
Michael Oher, who was portraited in the movie "The Blind Side", after get drafted by the Ravens, proceed to win the Super Bowl in 2013, then get a concussion in a game in 2016, remained in NFL concussion protocol for a year, later getting released in 2017 for "failed physical". en.wikipedia.org/wiki/Mic…
The Montreal Protocol is the first treaty to be universally adopted by all countries in the world, and as such the Montreal Protocol’s Scientific Assessment Panel believes the Ozone layer will be nearly fully recovered the middle of the century. state.gov/key-topics-offi…
Code-name "Operation London Bridge" is a protocol that happens days after Queen Elizabeth II's death. ITV and Sky News have long rehearsed the death coverage, but substituting the Queen's name with Mrs. Robinson. en.wikipedia.org/wiki/Ope…
Homing pigeons can carry Internet Protocol traffic en.wikipedia.org/wiki/IP_…
After 9/11, the Queen of England authorized the Coldstream Guards to break protocol and play the US national anthem during the Changing of the Guard, giving some comfort to Americans stranded in London due to airport closures. huffingtonpost.com/2014/0…
If an astronaut "loses it" in space, part of the protocol is to restrain them with duck tape. cbsnews.com/news/nasa-has…
NASA does not have an official protocol for what to do with an astronaut's body if one were to die in space. businessinsider.com/what-…
During the Cold War, Communist leaders would often kiss each other on the lips as a formal part of diplomatic protocol. en.wikipedia.org/wiki/Soc…
The hole in the ozone layer is expected to be completely healed by 2050 thanks to the Montreal Protocol signed in 1987, limiting the use of CFC's smithsonianmag.com/scienc…
At most 127 USB devices can be successfully connected to a computer due to protocol limitations usbmadesimple.co.uk/ums_1…
Internet Protocol over Carrier Pigeons is a thing and in fact can be faster at transferring data than the actual internet due to digital storage having grown 3 times as fast as internet bandwidth en.wikipedia.org/wiki/IP_…
Today I learned of Decimatio - a disciplinary protocol of the Roman military - in which β€œa cohort selected for punishment by decimation was divided into groups of ten; each group cast lots and the soldier on whom the lot fell was executed.... often by stoning or clubbing” academia.edu/6423891/The_…
Today I learned of IPoAC (IP over Avian Carriers), an April fool's joke that suggested sending Internet Protocol data using homing pidgeons instead of a wired connection. It was officially implemented. en.wikipedia.org/wiki/IP_…
When the Queen of England dies, Operation London Bridge will commence. It is an originally secret protocol meant to handle the news and organize the country's 12-day mourn. Several news channel rehearse this even every year, replacing her name with "Mrs. Robinson". en.wikipedia.org/wiki/Ope…
Under UN protocol, the President of the United States is to be addressed as "His Excellency." en.wikipedia.org/wiki/Pre…
There's very specific protocol for handing out business cards in Japan. You should make sure your business cards are translated into Japanese on one side. Use both hands to pass them out with the Japanese side facing up, and accept others’ cards with both hands. blog.simplywritten.com/in…
Code adam, a safety protocol for missing children created by Walmart in 1994 was so successful, it was passed as law en.wikipedia.org/wiki/Cod…
The world almost came to an end in 1983 when a malfunctioning Soviet satellite falsely reported multiple launches of American ICBMs to a Russian bunker. Citing a "funny feeling in my gut," the bunker commander directly disobeyed military protocol by not ordering retaliatory strikes theatlantic.com/internati…
On 9/11 the Boston Air Traffic Center bypassed the "hijacking protocol" and called directly NORAD's North Eastern Air Defense Sector (NEADS). NEADS and First Air Force decided to "get permission later" and scramble jets. Boston Center was NEADS' only source of information throughout the attack. rutgerslawreview.com/2011…
The tech behind the WiFi and Cellular networks are based on a protocol developed at UH Manoa called ALOHAnet en.wikipedia.org/wiki/ALO…
A UN protocol prohibits the use of "Blinding Laser Weapons" - weapons designed to cause permanent damage to an enemy combatant's eyesight. en.wikipedia.org/wiki/Pro…
When Queen Elizabeth visited Bloomingdales in New York City in 1976 that all traffic on Lexington Avenue was redirected so she could exit on the right side as per royal protocol boweryboyshistory.com/201…
The tradition of "women and children first" protocol is a legacy from the Birkenhead, a ship that ran into a dangerous reef, and whose soldiers famously stood firm allowing the women and children to board the boats safely as there were not enough serviceable lifeboats for all the passengers. en.wikipedia.org/wiki/HMS…
One of the steps of the poop disposal protocol when in the outdoors is to smear the poop thinly on a rock that receives direct sunlight so that the UV rays cook the pathogens, dry out the dung and the wind blows it away trailspace.com/articles/b…
Despite being a major oil exporter, the UAE asks for a renewal of the Kyoto protocol and is a major investor in solar power environment.nationalgeogr…
Today I learned of Shirley Temple's time as a diplomat. She was appointed U.S. Ambassador to Ghana and Czechoslovakia, as well as the first female Chief of Protocol of the United States. britannica.com/biography/…
There is an official protocol for sending internet packets by carrier pigeon en.wikipedia.org/wiki/IP_…
The USSR built, and Russia still maintains, a doomsday device capable of bypassing all standard protocols to launch their entire nuclear arsenal. wired.com/politics/securi…
There have been 12 instances in the past where the president was incapacitated in some way, but an Acting President was never set because there was no formal protocol set en.wikipedia.org/wiki/Act…
A single Soviet officer prevented a nuclear war in 1983 when the Soviet Union's early warning system incorrectly detected the launch of an American attack. The official protocol was to retaliate with nuclear strikes immediately, but he ignored it to carry out further investigations. en.wikipedia.org/wiki/198…
In 1716, Shogun Yoshimune had two elephants brought to Japan. One was presented at the imperial court, but, as protocol dictated that no one could be granted an audience with the Emperor without a title, the elephant had to be granted an official court rank before it could enter the palace. ncbi.nlm.nih.gov/pmc/arti…
NASA has no official protocol for if an astronaut dies in space. Astronauts instead hold 'death sims' during training, where they sit around and workshop what to do if one of them died. techinsider.io/what-if-so…
The internet started with the developments of electronic computers in 1950s.The Internet protocol suite (TCP/IP) was developed by Robert E. Kahn and Vint Cerf in the 1970s. en.wikipedia.org/wiki/His…
Nearly all WiFi routers and WiFi enabled devices are susceptible to a de-authentication attack, where a code is sent to the router preventing connected devices from staying logged in. Though there is a protocol which prevents the attack, most routers and electronics don't use it. en.wikipedia.org/wiki/Wi-…
The algorithm the ants use to discover how much food there is available is essentially the same as that Internet protocols use to discover how much bandwidth is available for transferring a file. news.stanford.edu/news/20…
In the 90s there existed an Internet Protocol called Gopher, developed by University of Minnesota, that was initially more popular than the World Wide Web, died out because University of Minnesota decided to charge fees to use the implementation of the Gopher server en.wikipedia.org/wiki/Gop…
That, to show the need for proper protocol in fMRI scanning, scientists successfully measured brain activity in a subject shown emotional photos of people. The subject was a salmon. And it was dead. blogs.discovermagazine.co…
RFC 2616 (specification of the HTTP 1.1 protocol, 1999) specifies error code 402 as "Payment Required" and has reserved it for "future use." ietf.org/rfc/rfc2616.txt
The hole in the ozone layer has begun shrinking since CFCs were banned after several nations signed the Montreal Protocol in the 80s. newsweek.com/nasa-hole-ea…
Henry Ford attempted to mainstream "The Protocols of the Elders of Zion" in the United States in the 1920s. The work, a known literary hoax that vilified Jews as a people with sinister plans of worldwide domination, would go on to be used as justification for the Holocaust. en.wikipedia.org/wiki/The…
The first multiplayer first person shooter used a music protocol (MIDI) for networking guinnessworldrecords.com/…
Even though the U.S. declined commitment to reduce methane emissions via the Kyoto Protocol, it has met the requirement approximately 2 years ago. wattsupwiththat.com/2013/…
As a joke, an internet protocol called IoAC (Internet over Avian Carriers) has been officially created and tested. It uses homing pigeons to transport data packets, with huge latency but great throughput. cnet.com/news/pigeon-powe…
There's a theory of the brace position used in safety protocol for airlines in case of the plane crashing, that states the position is designed to kill you because of how much money victims receive if they survive but was tested by MythBusters to be false. discovery.com/tv-shows/my…
In 1957 Great Britians Windscale nuclear power plants core caught fire. The operators noticed the increased temperatures and activated the cooling fans per protocol thus feeding the fire and exacerbating the situation. en.m.wikipedia.org/wiki/W…
After Princess Diana's death Prince Charles overruled palace protocol and held a Royal Funeral for Diana despite her not being part of the royal family at the time. en.wikipedia.org/wiki/Cha…
Gibson Guitar and 3COM developed an audio-over-ethernet protocol called MaGIC in 1999 that features 32-bit/192 kHz sampling rates (most audio interfaces today are only capable of 24-bit/96 kHz at most.) en.wikipedia.org/wiki/Gib…
7 people have survived late-stage Rabies using the Milwaukee Protocol. en.wikipedia.org/wiki/Mil…
Today I learned of RFC 2324, the Hyper Text Coffee Pot Control Protocol. It was included by the IETF as an easter egg in 1998 and contains error 418: I'm a teapot, which is returned when a user requests coffee from a teapot. tools.ietf.org/html/rfc23…
The Internet Protocol (IP) specifies IPoAC, packet transportation by homing pigeons. It has been sucessfully implemented with a ping of 3.2 Million ms and 56% packet loss en.wikipedia.org/wiki/IP_…
Richard Nixon had a protocol for the unlikely event that the Apollo 11 crew were stranded on the moon, titled "In Event of Moon Disaster" lettersofnote.com/2010/11…
NASA has no set protocol and does no training for fatal injuries in space. youtube.com/watch?v=OS-td…
Irish President de Valera formally offered his condolences to the German Minister in Dublin on the death of Adolf Hitler in 1945, in accordance with diplomatic protocol. en.m.wikipedia.org/wiki/É…
Today I learned about The Protocol

You call a friend. You go through a tunnel, somebody's bluetooth cuts off, the call is dropped. The friend calls you back, but you're already calling him back. No answer, voice mail, whatever, the result is a little bit of rigamarole until you get connected again. The solution is The Protocol. Whoever made the first call is the one who calls back. Simple as that. No confusion, no fuss. Tell your friends. Already doing this? Then please post a derisive comment about how you've been doing this since you were three, how it's obvious to anyone but an absolute moron, and how you're too goddamned cool for school.

The Fukushima Nuclear Accident Independent Investigation Commission found the nuclear disaster was "manmade" and that its direct causes were all foreseeable, and all parties involved, TEPCO and government bureaucrats alike, were derelict in duty to meet the most basic safety protocols. en.wikipedia.org/wiki/Fuk…
Nitrogen trifluoride, a greenhouse gas not regulated by the Kyoto Protocol with a global warming potential 17 200 times greater than carbon dioxide, is released during the manufacturing of flat-panel screens. en.wikipedia.org/wiki/Nit…
An HTTP extension, the Hyper Text Coffee Pot Control Protocol (HTCPCP) for diagnosing and controlling coffee pots, was written as an April Fool's Day joke. It includes the error message "418: I'm a teapot." en.wikipedia.org/wiki/Hyp…
On this day, 1 January in 1983, NCP (Network Control Protocol) was switched to TCP/IP (Transmission Control Protocol/Internet Protocol). This was THE key transition that paved the way for today’s Internet. β€œOne small switch for man, one giant switch for mankind.com”. archive.wired.com/techbiz…
Scifi author John Scalzi may have inadvertently carried out the first http denial of service attack and his attempt at a web spider is responsible for the creation of the robots.txt protocol. antipope.org/charlie/blog…
Anti-piracy defence protocol, during boarding, includes playing loud music such as "...Baby One More Time" and "Oops!...i Did It Again" by Britney Spears through speakers and is actually shown to be effective. contactmusic.com/article/…
The inventor of the web regrets using the two slashes after the protocol bits.blogs.nytimes.com/20…
Internet relay chat (IRC) is one of the most widely used chat protocols for military command and control (C2). Software such as mIRC, a Windows-based chat client, or integrated systems in C2 equipment are used primarily in tactical conditionS publicintelligence.net/ta…
As HMS Birkenhead sank, the soldiers stood silently in rank, while the women and children were loaded into the lifeboats. They remained in rank as the ship slipped under and over 300 died. Their courage and chivalry gave rise to the "women and children first" protocol. en.wikipedia.org/wiki/HMS…
There is a protocol to be followed in case of Extraterrestrial/Alien Contact in which the UN plays the most important role. en.wikipedia.org/wiki/Pos…
Canada pulled out of the Kyoto Protocol in December 2011, along with Japan and Russia startribune.com/world/135…
In the 70s the University of Hawaii provided the first public demonstration of a wireless packet data network using a protocol they invented and named Aloha en.wikipedia.org/wiki/ALO…
There's a long tradition of "April Fools" internet standards proposals, including "Internet Protocol Over Avian Carrier" and "Scenic Routing for IPV6" en.wikipedia.org/wiki/Apr…
The Daylight Saving Time protocol is reversed in the southern hemisphere; the few parts of Australia, South America and Africa that do observe it spring *back* and fall *forward*. en.wikipedia.org/wiki/Day…
Henry Ford was an anti-semit and published the first english version of "The protocols of the Elders of Zion", probably the most important and influential anti-semitic document ever. en.wikipedia.org/wiki/The…
The internet protocol (IP) starts at version 4 because it was split from a previous protocol (of which 3 early versions were developed during the 1970s) that comprised both what are now TCP and IP, and which was called only TCP. After the split, number 4 was applied to both for consistency tcpipguide.com/free/t_IPH…
Details of an internet scan of North Korea's Internet Protocol Space, the country officially only has 1,024 Internet protocol addresses. By comparison, the United States has billions of addresses. nknetobserver.github.io/
There is a protocol to meeting an elephant. They will offer up their trunk, and expect you to blow in it. That way, they will remember your scent forever. You will never be strangers again. cbsnews.com/8301-18560_16…
A doctor in 1970 successfully transferred the head of one monkey to the body of another, and the monkey lived for 8 days. In 2013, another doctor published a protocol to accomplish this in humans. ncbi.nlm.nih.gov/pmc/arti…
The U.S.A has still not signed the 1977 amendment protocols of the Geneva conventions. Such protocols that outlaw "indiscriminate attacks on civilian populations". icrc.org/applic/ihl/ihl.n…
Physicist Richard Feynman, while working on the Manhattan Project, trolled the censorship protocols by challenging his loved ones to write him in codes without sending the key. youtu.be/uY-u1qyRM5w?t=13…
The protocol used by Tor anonymity network is invented by and patented by the US Government. en.wikipedia.org/wiki/Oni…
Microsoft designed a smartwatch protocol which used FM waves to transmit data. The service was in operation between 2004 and 2008 smartwatchnews.org/2004-m…
Between 1986 and 1990, at a time when the Canadian Red Cross was solely responsible for blood services in Canada, over 1100 people contracted HIV and over 20,000 contracted Hep C as a result of terrible testing protocols. en.wikipedia.org/wiki/Can…
The 'zombie apocalypse' CDC protocol was designed because the public didn't take 'disaster survival' kits seriously with practical warnings(hurricanes, etc) cdc.gov/phpr/zombies_nove…
Even though Marie Curie knew of the link between radiation and cancer she made no significant changes to the safety protocols in her lab. nytimes.com/2014/12/07/ma…

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.