Blog Archive: May 2012
pagein
I've updated the pagein tool to compile with a recent valgrind version. The tarball also contains a .spec file. I had to work around a bug in valgrind in Fedora 16 and 17.The tarball
Thai Poutine
No, thats not a typo. Ive always seen Poutine as the Great Québec Mistake, a culinary misadventure which for some reason has become sort of hip in our nations downtowns. Basically its fries and gravy and cheese. Except when its in a Thai restaurant. Here we have deep-fried taro root with a lemongrass-chili sauce over tofu and hot peppers. I tried it. It wasnt terrible. It wasnt poutine either, which correlates. This is at one of our local joints, named Bob Likes Thai Food; on the long walls are aggressively-modern paintings of a fork on one side, a spoon on the other; labeled Bobs Fork and Bobs Spoon.
Tax Return Identity Theft
I wrote about this sort of thing in 2006 in the UK, but it's even bigger business here: The criminals, some of them former drug dealers, outwit the Internal Revenue Service by filing a return before the legitimate taxpayer files. Then the criminals receive the refund, sometimes by check but more often though a convenient but hard-to-trace prepaid debit card....
Bar Code Switching
A particularly clever form of retail theft -- especially when salesclerks are working fast and don't know the products -- is to switch bar codes. This particular thief stole Lego sets. If you know Lego, you know there's a vast price difference between the small sets and the large ones. He was caught by in-store surveillance....
Finally a use for tablets
When taking photos like today's comparative photos, it's good to have the original at hand to compare. In the past I've done things like printing out a hard copy or dragging a laptop around with me, but both are clumsy. Recently it occurred to me that my GPS navigator is really an adapted tablet, and it does have software to display photos (as long as you truncate the names), so today I copied the photos to the navigator and carried that around with me for the comparisons. Did it work better? Marginally. I can put the navigator in my pocket, but clearly not a laptop.
Backing up the Friend' computers
While in town, also to the Friends of the Ballarat Botanical Gardens to back up their computer. To my surprise, everything Just Worked: on plugging in the disk, I was offered a number of choices of what to do with it. Possibly out of embarrassment the option of using it as a backup disk was hidden beyond the end of the too-short selection window, but once I found it it was relatively trivial to set it up and start a backup. Next time I'm there I'll take a look at what it did.
The Psychology of Immoral (and Illegal) Behavior
When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much narrower than it could be. Leveraging moral, repetitional, and institutional pressures are likely to be much more effective in motivating cooperative behavior. This story illustrates the point. It's about the psychology of...
The Problem of False Alarms
The context is tornado warnings: The basic problem, Smith says, it that sirens are sounded too often in most places. Sometimes they sound in an entire county for a warning that covers just a sliver of it; sometimes for other thunderstorm phenomena like large hail and/or strong straight-line winds; and sometimes for false alarm warnings warnings for tornadoes that...
More panorama fun
Into the office this morning with a firm resolve to do something else than play with panorama viewers. I failed. With a bit of comparison, it didn't take me too long to debug my scripts, and I even found a way to find the error in the configuration file. firefox complained about it: And after fixing that, Emacs indeed agreed that the data was well-formed. Gradually worked out other strangenesses, notably the tricks necessary to get Hugin to create correct equirectangular images: in the Stitcher tab you need to set the field of view to 360×180, and to set the crop to the complete image.
Backdoor Found in Chinese-Made Military Silicon Chips
We all knew this was possible, but researchers have found the exploit in the wild: Claims were made by the intelligence agencies around the world, from MI5, NSA and IARPA, that silicon chips could be infected. We developed breakthrough silicon chip scanning technology to investigate these claims. We chose an American military chip that is highly secure with sophisticated encryption...
Interview with a Safecracker
The legal kind. It's interesting: Q: How realistic are movies that show people breaking into vaults? A: Not very! In the movies it takes five minutes of razzle-dazzle; in real life it's usually at least a couple of hours of precision work for an easy, lost combination lockout. [...] Q: Have you ever met a lock you couldn't pick? A:...
Updating Microsoft
While I was at it with Microsoft, finally paid attention to the warnings that kept showing up: Your computer is in danger. Automatic updates are turned off. I've always been afraid of automatic updates, but maybe they have a point. So I turned them on again and got 97 updates for braindeath and 111 for smart, the VM box. And after braindeath came back, I had no net connectivity. Given that I use rdesktop to access it, that's serious. Turned the KVM to the monitor output and saw a message saying Malware removed. Click here for more information, which disappeared before I could get the mouse there.
Cracking the Salado
My experience with SaladoConverter yesterday wasn't the best, but the promise of the rewards kept me going todayall day long. Clearly the problem I had with braindeath had less to do with Salado or Java than it did with the messed-up configuration on the box. I have another couple of Microsofts, including one in a VM, where I'm less concerned about messing things up. So I installed Java on it, and how about that! It worked! There are still a number of loose ends with the conversions. The SaladoConverter documentation states that I need an equirectangular projection, and that's easy enough to make with Hugin.
Two Sessions: C++ Concurrency and Parallelism 2012 State of the Art (and Standard)
Its time for, not one, but two brand-new, up-to-date talks on the state of the art of concurrency and parallelism in C++. Im going to put them together especially and only for C++ and Beyond 2012, and Ill be giving them nowhere else this year: C++ Concurrency 2012 State of the Art (and Standard) [...]
Temprature Management in Data Centers
Cooling is the largest single non-IT (overhead) load in a modern datacenter. There are many innovative solutions to addressing the power losses in cooling systems. Many of these mechanical system innovations work well and others have great potential but none are as powerful as simply increasing the server inlet temperatures. Obviously less cooling is cheaper than more. And, the higher the target inlet temperatures, the higher percentage of time that a facility can spend running on outside air (air-side economization) without process-based cooling. The downsides of higher temperatures are 1) high semiconductor leakage losses, 2) higher server fan speed which increases the losses to air moving, and 3) higher server mortality rates.
My Last Post About Ethnic Profiling at Airports
Remember my rebuttal of Sam Harris's essay advocating the profiling of Muslims at airports? That wasn't the end of it. Harris and I conducted a back-and-forth e-mail discussion, the results of which are here. At 14,000+ words, I only recommend it for the most stalwort of readers....
Java hell
Continued investigating my problems with SaladoConverter today. It looked as if I needed a CLASSPATH: === grog@dereel (/dev/pts/8) ~ 59 -> export CLASSPATH=/usr/local/jdk1.6.0/lib === grog@dereel (/dev/pts/8) ~ 60 -> java SaladoConverter.jar Exception in thread "main" java.lang.NoClassDefFoundError: SaladoConverter/jar ... At least part of it was just learning how to start it. It seems that the correct invocation was wrong. What I needed was: === grog@dereel (/dev/pts/8) ~ 67 -> java -jar SaladoConverter.jar === grog@dereel (/dev/pts/8) ~ 68 -> echo $? 0 The only problem was, it didn't do anything.
Z/1 Unaweep
So, I bought this new pair of sandals and theyre just so great I had to pass the word along. No, this is not going to become a product-placement blog (and who here hasnt wondered how much it costs to get talked up on Dooce?) No shoe company is paying for this. (Well, theres an Amazon affiliate link; Ill be rich, I tell you, rich!) I hate shoes, except for certain hiking gear. No shoe Ive ever worn hasnt made my feet sweaty and uncomfortable. So as soon as its warm enough, the shoes go in the cupboard and stay there till autumn.
Animating panoramas
One of the things that Cartola suggested months ago was that I should use some kind of browser plugin to animate my panoramas. One of the more promising looking ones was SaladoPlayer, which I tried some months ago and with which I ran into documentation problems. Tried again today and got as far as being able to install and display the demonstration panoramas, but to run my own I had to convert the format, which involved the use of SaladoConverter, a Java application. I have Java installed, but don't use it, and the first attempts to run it were less than encouraging: === grog@dereel (/dev/pts/8) ~ 29 -> java SaladoConverter.jar Exception in thread "main" java.lang.NoClassDefFoundError: SaladoConverter/jar Caused by: java.lang.ClassNotFoundException: SaladoConverter.jar at java.net.URLClassLoader$1.run(URLClassLoader.java:200) at java.security.AccessController.doPrivileged(Native Method) at java.net.URLClassLoader.findClass(URLClassLoader.java:188) at java.lang.ClassLoader.loadClass(ClassLoader.java:306) ...
On Being the New Boss
Theres been a lot of linkage this week to David Lowerys Meet The New Boss, Worse Than The Old Boss? Lowery is a music-biz insider, and says hes also a geek; and he really, really hates people like me. He makes some really interesting points; unfortunately, he comes across as a jerk. Tl;dr Which for those who dont know is Net-jargon for Too long; didnt read; it can be used both as a comment, and to tag a summary that precedes anything longish. Lets do both here. First off, Lowerys piece could have been condensed to a third of its length by a good editor.
Friday Squid Blogging: Squid Ink from the Jurassic
Seems that squid ink hasn't changed much in 160 million years. From this, researchers argue that the security mechanism of spraying ink into the water and escaping is also that old. Simon and his colleagues used a combination of direct, high-resolution chemical techniques to determine that the melanin had been preserved. The researchers also compared the chemical composition of the...
Re: My question for LOPSA board candidates
[Note: This is a first draft and needs a lot of editing but I know I'm not really going to come back and edit it so I might as well post it today.] LOPSA had their first "meet the candidates" a few weeks ago. I had blogged ahead of time the question I was planning to ask. The question: "I'd like to know about your experience with community-based projects. Please tell us about a project that you took responsibility for seeing through to completion. Please, only projects that are "done" or have reached a self-sustaining mode only. One or two sentences is fine.
The Explosive from the Latest Foiled Al Qaeda Underwear Bomb Plot
Interesting: Although the plot was disrupted before a particular airline was targeted and tickets were purchased, al Qaeda's continued attempts to attack the U.S. speak to the organization's persistence and willingness to refine specific approaches to killing. Unlike Abdulmutallab's bomb, the new device contained lead azide, an explosive often used as a detonator. If the new underwear bomb had been...
Stipend competition to attend 2012 USENIX Women in Advanced Computing Summit
Quoting from email I received: LOPSA is pleased that USENIX shares our goal of bringing attention to the various issues facing women in our industry by hosting the Women in Advanced Computing Summit. This summit is part of their Federated Conferences week, which also includes the ATC conference and others. LOPSA would like to show our support in this area and provide something concrete toward the topic. Matt (from the LOPSA Board) came up with a great idea to provide a stipend to assist someone in attending the conference. We will award based on submission of an essay, but I'll leave those details to the posting about it.
Retouching panoramas revisited
Interesting message about Hugin in the mail today: how to fill in untidy pieces of the panorama. Just what I need for the panoramas of the Botanical Gardens I took two weeks ago, and which I tried to retouch with very limited success last week. Bruno Postle posted a link to a tutorial. The trick is to include additional images (in this case copies of existing images) without control points, but it left a few questions open. After a lot of experimentation, found a way to do it. The rest of this entry will form the basis of a tutorial. First align the base images: Clearly the hands in the sky need to go away.
Diablo III
Im really not much of a gamer; but I did the Diablo dance back in the day, and have enjoyed revisiting the franchise. Herewith remarks on that thing thats been responsible for so many red-rimmed eyes at early meetings this last couple of weeks. D3 isnt just flawed fun, its interesting in a serious way, I think. I just finished taking a Demon Hunter (now L31) through Normal mode, playing only an hour and a bit in the late evenings. It was fun. In D2 I was an Amazon guy, and enough of the old reflexes still worked that I usually didnt feel like a complete idiot.
The Ubiquity of Cyber-Fears
A new study concludes that more people are worried about cyber threats than terrorism. ...the three highest priorities for Americans when it comes to security issues in the presidential campaign are: Protecting government computer systems against hackers and criminals (74 percent) Protecting our electric power grid, water utilities and transportation systems against computer or terrorist attacks (73 percent) Homeland security...
The Banality of Surveillance Photos
Interesting essay on a trove on surveillance photos from Cold War-era Prague. Cops, even secret cops, are for the most part ordinary people. Working stiffs concerned with holding down jobs and earning a living. Even those who thought it was important to find enemies recognized the absurdity of their task. I take photos all the time and these empty blurry...
Don't trust The Complete FreeBSD
One of the reasons I wrote The Complete FreeBSD was to force myself to learn the things that I needed to document. And so, although it's coming on 10 years since the last edition, I frequently refer to it. Today I had the task of setting up access control for the private pages on the Friends of the Ballarat Botanical Gardens web site. Simple: it's on page 498 of the online version. Set up a .htaccess file, create a password with dbmmanage, and you're away. And that's how I did it in the past. Problem is, it doesn't work any more. I got messages like: [Wed May 23 04:58:40 2012] [error] [client 59.167.11.50] user grog not found: /mypages/ That's not a password mismatch: the server just couldn't find the user.
Florian
Theres this blog called FOSS PATENTS written by a Florian Mueller, and when a software-patent-related issue heats up, reporters often seek out his comments for their stories. Im not sure this is a good idea, and Id like to offer some evidence; articles he wrote on a currently-hot story back in October 2010 and November 2010. This is a small but representative sample of his (many) offerings on the subject. Im not mad at Florian, who has every right to publish his opinions.
Lessons in Trust from Web Hoaxes
Interesting discussion of trust in this article on web hoaxes. Kelly's students, like all good con artists, built their stories out of small, compelling details to give them a veneer of veracity. Ultimately, though, they aimed to succeed less by assembling convincing stories than by exploiting the trust of their marks, inducing them to lower their guard. Most of us...
Urs Holzle @ Open Networking Summit 2012
Untitled 1 p.MsoNormal {margin-bottom:.0001pt; font-size:11.0pt; font-family:"Calibri","sans-serif"; margin-left: 0in; margin-right: 0in; margin-top: 0in; } a:link {color:blue; text-decoration:underline; text-underline:single; } p.MsoListParagraph {margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; font-size:11.0pt; font-family:"Calibri","sans-serif"; } Urs Holzle did the keynote talk at the 2012 Open Networking Summit where he focused on Software Defined Networking in Wide Area Networking. Urs leads the Technical Infrastructure group at Google where he is Senior VP and Technical Fellow. Software defined networking (SDN) is the central management of networking routing decisions rather than depending upon distributed routing algorithms running semi-autonomously on each router. Essentially what is playing out in the networking world is a replay of what we have seen in the server world across many dimensions.
Privacy Concerns Around "Social Reading"
Interesting paper: "The Perils of Social Reading," by Neil M. Richards, from the Georgetown Law Journal. Abstract: Our law currently treats records of our reading habits under two contradictory rules rules mandating confidentiality, and rules permitting disclosure. Recently, the rise of the social Internet has created more of these records and more pressures on when and how they should...
Close that tcpdump!
While looking around the server for the PHP problem, found this: USER PID %CPU %MEM VSZ RSS TT STAT STARTED TIME COMMAND root 90550 0.0 20.4 135716 50768 p3- S 26Dec10 109:52.79 tcpdump icmp 19 months! Fortunately it was probably writing to the controlling terminal, which had gone away. I should keep a better eye on this box, though.
PHP: can't find preg_match
I've been dragging my heels on getting the membership lists for the Friends of the Ballarat Botanical Gardens online. It's a non-trivial amount of work, and I took the easy way out and used phpMyEdit to do the work. Put that up on the server and found: Fatal error: Call to undefined function preg_match() in /usr/local/www/data/pedit/phpMyEdit.class.php on line 2787 Huh? preg_match() is part of the base PHP installation, and has been for ever (well, since 4.2.0). Went and checked: my server is deliberately not up to date (that would require rebooting and destroying the current uptime of 1332 days), but it's not that old.
Racism as a Vestigal Remnant of a Security Mechanism
"Roots of Racism," by Elizabeth Culotta in Science: Our attitudes toward outgroups are part of a threat-detection system that allows us to rapidly determine friend from foe, says psychologist Steven Neuberg of ASU Tempe. The problem, he says, is that like smoke detectors, the system is designed to give many false alarms rather than miss a true threat. So outgroup...
Security Incentives and Advertising Fraud
Details are in the article, but here's the general idea: Let's follow the flow of the users: Scammer buys user traffic from PornoXo.com and sends it to HQTubeVideos. HQTubeVideos loads, in invisible iframes, some parked domains with innocent-sounding names (relaxhealth.com, etc). In the parked domains, ad networks serve display and PPC ads. The click-fraud sites click on the ads that...
Uncrippling Tablets
David Weinberger points out in Will tablets always make us non-social consumers? that tablets imply a less-interactive lean-back relationship with the Internet and thus the world. Its possible we can fix this by just uncrippling the keyboard; I cant really have a conversation with the world if I cant jam text in fast, interrupting bursts of high-word-flow with flurries of local edits. I sure dont want to live in a lean-back world.
The problem with nerd politics
Here's a podcast of my last Guardian column, The problem with nerd politics: Since the earliest days of the information wars, people who care about freedom and technology have struggled with two ideological traps: nerd determinism and nerd fatalism. Both are dangerously attractive to people who love technology. In "nerd determinism," technologists dismiss dangerous and … [Read more]
More hugin strangenesses
While playing around with hugin exposure blending, managed somehow to create a completely nonsensical stitching pattern: These were the same images as I had been processing all the time, and they lined up well. And this was just after reading in the .pto project file that had already lined them up correctly. What was wrong? After a bit of checking, discovered that during my EXIF copying experiments, I had accidentally copied the EXIF data from a panorama to one of its components.
avidemux2: the inflexibility of Microsoft under X
Yvonne wanted to upload a video to YouTube today, but it was too long, so she asked me to cut it into manageable pieces for her. Not a problem: I've been there before with avidemux2. So I fired it up, processed, saved it and... couldn't find the result. On further examination, I found: === grog@defake (/dev/pts/0) /Photos/yvonne/20120425 13 -> avidemux2_gtk Maureen-on-Morena-1 ************************* Avidemux v2.5.6 ************************* (hundreds of lines of debug output omitted) So the cwd was /Photos/yvonne/20120425. But there was nothing there. Tried again and looked at the save page and found: This horrible program has completely ...
More panorama experiments
Last week I did experiments with multiple alternate exposures from the same position and aligned together, but stitching only one version. That allowed me to make several panoramas with different appearance, and was particularly useful in the case of the garden SE panorama that includes the shade area and the sky. Today I looked at two other panoramas. One of the problems with the verandah panorama is the lighting in the back corner, so today I put a remote-controlled studio flash in the room next to it and let it fire on that area: On the whole, that didn't look particularly good.
Laugh at an Eagle
Theyre serious, fierce-looking birds; except when theyre not. These two were hanging out next to our cabin, so I settled down with the big lens on the camera, hoping to get a dramatic shot of one or both taking wing. One somehow snuck off while I wasnt looking, and then the other decided it needed to clean up. This went on for a remarkably long time. I can report that the process works great; that was a fine-looking eagle when it finally flew away. I missed that shot too.
USB problems software, not hardware?
For a long time I've had continual problems with a number of different USB devices on a number of different computers. About the only thing in commonmost of the time, anywayis the operating system: FreeBSD. Is there some problem there? Or are most USB devices just flaky? It's not as if I haven't had USB problems with other operating systems, after all, and the fact that it happens less often might just be due to the fact that I don't use them as often. Today I had a number of disk errors while backing up my photos. It could be the disk, of course, but there was something funny about them.
Friday Squid Blogging: Squid Scalp Massager
Cheap! As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Kip Hawley Reviews Liars and Outliers
In his blog: I think the most important security issues going forward center around identity and trust. Before knowing I would soon encounter Bruce again in the media, I bought and read his new book Liars & Outliers and it is a must-read book for people looking forward into our security future and thinking about where this all leads. For...
Backing up the Friends's computers
The real reason for my attendance was to complete some of the jobs I had with the Friends' computers: a new CRT monitor for one with a damaged LCD monitor, setting up an account for non-privileged users on their new laptop, and installing the new backup disk. The latter proved more difficult than I thought. Yes, it's trivial to install a USB disk, but the box said it contained backup software. So it did, too, an extended trial, after which you have to buy it. Somehow that's not my style, so I gave up. I'll have to investigate what we can use instead.
Cybersecurity at the Doctor's Office
I like this essay because it nicely illustrates the security mindset....
VC++ and Win8 Metro apps: May 18, livestream and on-demand
Reblogged from Sutters Mill: Want to know how to write cool tablet apps using Visual C++? On May 18, Microsoft is hosting a one-day free technical event for developers who want to write Metro apps for Windows 8 using Visual C++. Im giving the opening talk, and the rest of the day is full of [...]
Git
Even by our fields dizzying rate of progress I wouldnt expect to revisit the subject of version control just six years after I first wrote about it in this column ( Version Control Systems . Software , 22(5):108109, September/October 2005). Yet here we are. The new kid on the block is git, a distributed revision control system available on all mainstream development platforms through a Free Software license. Git, a brainchild of Linus Torvalds, began its life in 2005 as the revision management system used for coordinating the development of the Linux kernel. Over the years its functionality, portability, efficiency, and third-party adoption have evolved by leaps and bounds to make it its categorys leader.
Rules for Radicals
It was written in 1971, but this still seems like a cool book: For an elementary illustration of tactics, take parts of your face as the point of reference; your eyes, your ears, and your nose. First the eyes: if you have organized a vast, mass-based people's organization, you can parade it visibly before the enemy and openly show your...
HTML mail revisited
While at the Friends, Genevieve asked me how to incorporate the FBBG banner in outgoing emails. Aaargh! HTML mail with gratuitous images! The horror! That's been my standpoint since HTML mail first came out, but I'm beginning to wonder how tenable it is. HTML is still an issue for email, and certainly I'd hate to see us send out messages only in HTML, but in some cases it makes sense. Is this one of them? Maybe. The typical Friend is probably used to it, and getting a message only in monospace text would probably appear unprofessional.
Backing up the Friends
While in the area, dropped in at the Ballarat Botanical Gardens to visit Genevieve Lowe at the Friends. It seems they have a new computer for the accounts, and there's no backup. Coincidentally Liz Gilfillan, the president, walked in, and I got authorization from her to buy a 1 TB USB disk for backups. Down to Officeworks, where the prices for external disks blew me awayup to $279 for a 2 TB unit, and the cheapest was $127. That's a big difference from last June, when the cheapest 2 TB unit was $98. Is that still the effect of the Thai floods last year?
USB Drives and Wax Seals
Need some pre-industrial security for your USB drive? How about a wax seal? Neat, but I recommend combining it with encryption for even more security!...
Security Vulnerabilities in Airport Full-Body Scanners
According to a report from the DHS Office of Inspector General: Federal investigators "identified vulnerabilities in the screening process" at domestic airports using so-called "full body scanners," according to a classified internal Department of Homeland Security report. EPIC obtained an unclassified version of the report in a FOIA response. Here's the summary....
Blood pressure monitors
While taking things apart, also took a look at my old blood pressure monitor. I'm pretty sure the inaccuracy is due to the too-fast release of pressure, and I suspected that it might be possible to adjust it. Found the release valve under the circuit board (on the right in the second image, connected by the blue cables): Unfortunately there's nothing there to adjust.
U.S. Exports Terrorism Fears
To New Zealand: United States Secretary of Homeland Security Janet Napolitano has warned the New Zealand Government about the latest terrorist threat known as "body bombers." [...] "Do we have specific credible evidence of a [body bomb] threat today? I would not say that we do, however, the importance is that we all lean forward." Why the headline of this...
Electric collar: useless!
It's been nearly a month since we got a new remote control electric collar for Nemo. This one workedonce. The contacts to the skin look dubious, but the real problem seemed to be battery consumption. Since there were no instructions, and there appeared to be no way to turn the receiver off, I removed the battery after every use. Despite that, the battery was flat within an hour or two of use. So we bought a new one$7.50, a significant proportion of the $28 we paid for the collar. And it was drained in a similar time. So we ordered a pack of 8 from China (also about $7.50 for the lot), and they arrived today.
Advance praise for Pirate Cinema
My next YA novel is Pirate Cinema, which hits stands on Oct 2. The book has been complete for a long time, and now is the part in its lifecycle where it is in ballistic flight, having been launched from my device with all the skill and concentration that I can muster, with nothing else … [Read more]
Nerd fatalism, nerd determinism: the problem with nerd politics
My latest Guardian column is "The problem with nerd politics," and it discusses the twin evils of "nerd determinism" and "nerd fatalism" -- both convenient excuses for people who care about technology policy to avoid politics. In "nerd determinism," technologists dismiss dangerous and stupid political, legal and regulatory proposals on the grounds that they are … [Read more]
Why the death of DRM would be good news for readers, writers and publishers
Here's a podcast of my last Guardian column, Why the death of DRM would be good news for readers, writers and publishers: At the end of April, Tor Books, the world's largest science fiction publisher, and its UK sister company, Tor UK, announced that they would be eliminating digital rights management (DRM) from all of … [Read more]
The Trouble with Airport Profiling
Why do otherwise rational people think it's a good idea to profile people at airports? Recently, neuroscientist and best-selling author Sam Harris related a story of an elderly couple being given the twice-over by the TSA, pointed out how these two were obviously not a threat, and recommended that the TSA focus on the actual threat: "Muslims, or anyone who...
Im Still Alive&
I can’t believe I haven’t had time to write a single post so far this year. Here’s what I have been up to: Blogging up a storm on The AWS Blog. Taping episodes of my video podcast, The AWS Report: … Continue reading →
Dynamic Content Support in Amazon CloudFront
In the past three and a half years, Amazon CloudFront has changed the content delivery landscape. It has demonstrated that a CDN does not have to be complex to use with expensive contracts, minimum commits, or upfront fees, such that you are forcibly locked into a single vendor for a long time. CloudFront is simple, fast and reliable with the usual pay-as-you-go model. With just one click you can enable content to be distributed to the customer with low latency and high-reliability. Today Amazon CloudFront has taken another major step forward in ease of use. It now supports delivery of entire websites containing both static objects and dynamic content.
Date Arithmetic
When I set an alarm, my clock, now running on the computer in my pocket, is smart enough to tell me how much time will pass until the alarm is scheduled to sound. This has eliminated the old problem of sleeping past meetings before being surprised by an alarm precisely half a day after I had originally planned to wake. The price has been having to know exactly how little I will sleep: a usually depressing fact that had previously been obscured by my difficulty doing time arithmetic in my most somnolent moments.
Diamond Clarity
I3I2I1SI2SI1VS2VS1VVS2VVS1IFFL The GIA diamond clarity scale, shown above, is rather opaque.
Dynamic Content Support in Amazon CloudFront
In the past three and a half years, Amazon CloudFront has changed the content delivery landscape. It has demonstrated that a CDN does not have to be complex to use with expensive contracts, minimum commits, or upfront fees, such that you are forcibly locked into a single vendor for a long time.
Red
Particularly intense botanical red; it remains the Achilles heel of the sensor in many (all?) digicams. I often see things in my garden that I just cant get close to with the combination of camera and screen; hm, perhaps the problem is computer screens not camera sensors? Here we have some Japanese maple leaves against blue sky. The leaves were actually redder than this, but at least the sensor, while losing some of the intensity, managed to get close to the tint.
More photo experiments
It's mid-autumn, and it shows: I still have issues getting good shadow detail in my images. In the image above I went back to the HDR techniques I've been using earlier, but in general that doesn't seem to be the best choice. One of the main issues is that when taking panoramas, the canonical instructions are to give each component image the same exposure. That gives rise to images like this from the north view sequence (in this case without any further processing): Clearly that's completely underexposed (3 EV, in fact), but another image to the left is correctly exposed (for the highlights): ...
Friday Squid Blogging: New Book on Squid
Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid. And a review. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Smart Phone Privacy App
MobileScope looks like a great tool for monitoring and controlling what information third parties get from your smart phone apps: We built MobileScope as a proof-of-concept tool that automates much of what we were doing manually; monitoring mobile devices for surprising traffic and highlighting potentially privacy-revealing flows [...] Unlike PCs, we have little control over the underlying privacy and security...
Seattle library hides 1,000 books around town for young people to find
The Seattle Public Library system's annual Summer Reading Program is called Century 22: Read the Future, and is tied in with the 50th anniversary of the Seattle World's Fair. Young people are encouraged to scour the city's landmarks for 1,000 books hidden throughout town, and then to re-hide them for other kids to find. Among … [Read more]
Tom @ LOPSA PICC 2012, New Brunswick, NJ, May 11-12, 2012
I'll be there any I hope you will be there too!
Panel Discussion on Open Source Testing Tools
A few days ago, I participated in a panel discussion on using open source tools for testing at the QUEST conference with the two founders of Selenium: Jason Huggins of Sauce Labs and Simon Stewart of Google. Before the panel … Continue reading →
Panel Discussion on Open Source Testing Tools
A few days ago, I participated in a panel discussion on open source tools for testing at the QUEST conference with the two founders of Selenium: Jason Huggins of Sauce Labs and Simon Stewart of Google. Before the panel started we chatted a bit with the moderator. We couldn’t come up with any contentious issues, so [...]
Panel Discussion on Open Source Testing Tools
A few days ago, I participated in a panel discussion on open source tools for testing at the QUEST conference with the two founders of Selenium: Jason Huggins of Sauce Labs and Simon Stewart of Google. Before the panel started we chatted a bit with the moderator. We couldn’t come up with any contentious issues, so [...]
Keyboards: end of an era?
My new Sun keyboard arrived today (left). Not quite what they advertised (right): In particular, the Return key is completely different, and that was one of the aspects I looked at before ordering it. I'll have to see whether I can come to terms with it or not. In addition, it has British key caps (£ over the 3 key, for example), and there's at least one extra key to the left of the Z key, marked \ and |, but in the default map it produces < and >.
AWS re: Invent
Hundreds of thousands of businesses in over 190 countries are relying on AWS to support some or all of their business and IT needs. From SAP and Oracle production installations to risk management HPC, from Internet banking to protein folding, from social gaming to mobile collaboration tools, from video distribution to hotel reservations systems, supply chain management and medical archiving, the list of what our customers achieve using the AWS cloud is fascinating. Many of our customers will tell you that although the cost savings that AWS brings them are important, more important is that they are able to be more agile, that they are able to move faster in a world with murderous competition and highly compressed time-to-markets.
CL XVII: Faraways
Its May so Cottage Life is recurring. On the island, many of the things one sees and wishes to photograph are far away thus must be captured through fairly specialized lenses which tend to impose their perceptions, particularly when the lenses are elderly and actually not that elite. Here are three of those. The lens in question is my Tokina f5.6 400mm, which has a story attached. I processed these in Lightroom. It has a superb noise-reduction module, which on this occasion I wished had negative settings to crank up the vintage-telephoto grainy dreaminess. Which would probably betray truth-before-beauty.
AWS re: Invent
Invention comes in many forms and at many scales. The most radical and transformative of inventions are often those that empower others to unleash their creativity ? to pursue their dreams. We are creating powerful self-service platforms that allow thousands of people to boldly experiment and accomplish things that would otherwise be impossible or impractical.
RuggedCom Inserts Backdoor into Its Products
All RuggedCom equipment comes with a built-in backdoor: The backdoor, which cannot be disabled, is found in all versions of the Rugged Operating System made by RuggedCom, according to independent researcher Justin W. Clarke, who works in the energy sector. The login credentials for the backdoor include a static username, "factory," that was assigned by the vendor and can't be...
Geekdad on Great Big Beautiful Tomorrow
Erik Wecks has a thoughtful and smart analysis of my little book The Great Big Beautiful Tomorrow in Wired's GeekDad today (spoilers ahoy!)
Computer crash
dereel, my main machine, crashed (or rather, hung) this afternoon. Nothing in the log files, which is normal enough. That's why I log remotely to another machine, in this case cojones, the machine that is connecting me to the Internet until the NBN radiation tower is finally complete. But something went wrong there: syslogd hung itself up a month ago and I didn't notice, so there's no evidence of what caused the hang. On the bright side, this happens so seldom that it's worth mentioning here.
NBN tower: the lunatic fringe continues
Bad news from Amy Boyd of the Golden Plains Shire Council: somebody (not yet known who, but we can guess) has put in an objection to the erection of the NBN tower. That means it goes to the VCAT to waste our time and their money. Now it's unlikely that it will be operational before Christmas.
Expanding the Cloud for Windows Developers
The software that powers todays world of Internet services has become incredibly diverse. Todays announcement of Amazon RDS for Microsoft SQL Server and .NET support for AWS Elastic Beanstalk marks another important step in our commitment to increase the flexibility for AWS customers to use the choice of operating system, programming language, development tools and database software that meet their application requirements. Using the AWS Toolkit for Visual Studio, you can now deploy your .NET applications to AWS Elastic Beanstalk directly from your Visual Studio environment without changing any code. You can then off load the management and scaling of your database and application stack to Amazon RDS and AWS Elastic Beanstalk, and focus on adding value to your customers.
Sensplore
Ive been working on some ideas for clean-screen apps; instead of controlling them with the touch screen, you wave your device around or tap it or shake it. To do this, Ive been learning about the output of the sensors you find on Android devices. Ive found that the documentation, while complete, contains some scary-looking math and assumes you know more about quaternions and rotation vectors than the average developer. Well, more than I do. So I created a little app called Sensplore which captures sensor data, dresses it up in CSV (spreadsheet) format, and emails it to you. Its Apache2-licensed on Google code; for those who just want to run it, go hit Google Play Apps.
A Foiled Terrorist Plot
We don't know much, but here are my predictions: There's a lot more hyperbole to this story than reality. The explosive would have either 1) been caught by pre-9/11 security, or 2) not been caught by post-9/11 security. Nonetheless, it will be used to justify more invasive airport security....
Expanding the Cloud for Windows Developers
The software that powers today?s world of Internet services has become incredibly diverse. Today?s announcement of Amazon RDS for Microsoft SQL Server and .NET support for AWS Elastic Beanstalk marks another important step in our commitment to increase the flexibility for AWS customers to use the choice of operating system, programming language, development tools and database software that meet their application requirements.
Overreacting to Potential Bombs
This is a ridiculous overreaction: The police bomb squad was called to 2 World Financial Center in lower Manhattan at midday when a security guard reported a package that seemed suspicious. Brookfield Properties, which runs the property, ordered an evacuation as a precaution. That's the entire building, a 44-story, 2.5-million-square-foot office building. And why? The bomb squad determined the package...
Catching missing images
All this photo reprocessing brings a danger, of course: I could rename or remove an image to which I have referred on a web page. I already have a 404 document that sends me email if a page on my site refers to a non-existent page, and that has greatly improved things. But you don't get a 404 for a missing image. On the other hand, nearly all my images are generated by a PHP function, so it's (relatively) easy to check whether the image exists or not. The difficulty is mapping the URL to the local path name. I got that done, and I was still having it claim that the images didn't exist.
Springies
Two wet rhodos and a tricolor carpet. First the carpet. This is the grass under the magnolia tree, which accounts for the pink and green; the blue comes from the Spanish Bluebells, which will probably dead by the time you read this, since theyre wildly invasive and have to be beaten back regularly. Now the rhododendron. I was having trouble figuring out which to run and decided, as on too many other occasions, that bits are pretty well free.
A Prose By Any Other Name
Here's a podcast of my last Locus column, A Prose By Any Other Name: Back in 2005, I did something weird. I decided that I would embark on a project to write short stories with the same (or similar) titles to famous science fiction books and stories. My initial motivation for this was Ray Bradbury … [Read more]
VC++ and Win8 Metro apps: May 18, livestream and on-demand
Want to know how to write cool tablet apps using Visual C++? On May 18, Microsoft is hosting a one-day free technical event for developers who want to write Metro apps for Windows 8 using Visual C++. Im giving the opening talk, and the rest of the day is full of useful technical information on [...]
Makers, the Masters thesis
Noah Brewer just successfully defended his MA English thesis Re-Makers: The Novel in Digital Collaborative Space at the University of Georgia. As the title implies, the piece is about my novel Makers. It's a smart piece of work, and I'm both tickled and honored.
Naval Drones
With all the talk about airborne drones like the Predator, it's easy to forget that drones can be in the water as well. Meet the Common Unmanned Surface Vessel (CUSV): The boat -- painted in Navy gray and with a striking resemblance to a PT boat -- is 39 feet long and can reach a top speed of 28 knots....
Spammers in glass houses
Recently I have been inundated with spam with subject lines like Employment you've been searching! and New job vacancy - see details. Much of it came from people I know, notably in the FreeBSD project, but even more came from me myself. The messages clearly come from combinations of user and ISP that can be broken in to, and about the only thing they have in common is a line matching the regexp please reply to .*@employmenteu.com,with, notably with a missing space after the comma. So, is somebody trying to discredit employmenteu.com? Looking at the whois data, it seems not: Domain Name: EMPLOYMENTEU.COM Updated Date: 04-may-2012 Creation Date: 04-may-2012 Registrant Contact: Jordan R.
101 uses for a dead computer
Once upon a time a computer was something expensive. Now we're throwing out computers that could still run rings round a CDC 7600, the supercomputer of my youth. Talking with Chris Yeardley after dinner and discovered that I had at least 20 computers, not counting motherboards, in and around my office, most of them functional and a number belong to Chris. Chris suggested that we should write an article 101 uses for a dead computer, so I brought out a handful of laptops and we started playing around: ...
Finally, a new keyboard
It's been three months since I started looking for a new keyboard. Surprisingly, my current one, now pushing 23 years old, has recovered somewhat and now no longer bounces as much as it did. In the meantime I've been looking for a cheap Sun Type 7 keyboard, which looks relatively similar and has a USB connector: In particular, there are 10 keys in 2 columns to the left of the main keyboard. Yes, I know, they have special functions under Solaris, but in the end they only generate scan codes, so I can modify a key map to get them to generate F1 to F10.
Forwarding and maintaining headers
Yesterday I had to admit I was wrong: most MUAs discard most headers when forwarding email, even mutt. Well, maybe. The real issue is what is meant by forwarding. There are three different approaches: Simply forward a message the way an MTA would do, putting in a Resent-From: header to show what has happened. In this case, of course, the headers are intact. Create a message containing the quoted text of the old message.
Another network hang
Into the office this morning to find us off the Net again, since nearly 9 hours. The ppp process was running, signal strength was normal, no messages in /var/log/ppp.log. But a ping gave me ping: sendto: No buffer space available. Restarted PPP, and things worked again. Somehow there are too many things that can cause link interruptions. When I started keeping records, it was to monitor ADSL line quality, and I had good metrics from the modem to help me. Now the problems can be this horrible flaky Huawei 1762 USB toy, the link itself, or the Optus network behind it. Once it gets to Internode, I have not (yet) had any further problems.
Looking for compiler engineers
Are you a compiler engineer or know one, and looking for interesting work on a top-notch team? Were hiring. (That particular link says two openings, but there are more.) Filed under: C++, Microsoft
Friday Squid Blogging: Squid Bicycle Parking Sculpture
Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Ghost Fluff
Actually, the title is The Ghost Writer; I first noticed it in a movie my neighbor on a plane was watching and thought the visuals were pretty good. Which is relevant because the book turns out to be more or less perfect airline fluff: High velocity, a powerful hook into the real world, and very competent writing. The premise is that a recently-exited British Prime Minister who looks and smells and sounds like Tony Blair gets in a bunch of trouble for having facilitated torture in the War-on-Terror context, just as his autobiographys ghost writer turns up dead. The point-of-view is the replacement ghosts, and while theres no actual violence, the sense of offscreen menace is satisfyingly high.
Tampon-Shaped USB Drive
This vendor is selling a tampon-shaped USB drive. Although it's less secure now that there are blog posts about it....
Facial Recognition of Avatars
I suppose this sort of thing might be useful someday. In Second Life, avatars are easily identified by their username, meaning police can just ask San Francisco-based Linden Labs, which runs the virtual world, to look up a particular user. But what happens when virtual worlds start running on peer-to-peer networks, leaving no central authority to appeal to? Then there...
What Ive learned by writing stories with the same titles as famous books
My latest Locus column, "A Prose By Any Other Name," is a state-of-the-project report on my longrunning habit of writing science fiction stories with the same titles as famous books, and the interesting things I've discovered about creativity and my subconscious along the way. The more I thought about writing stories with borrowed titles, the … [Read more]
Email, gmail and other strangenesses
More playing around with the Friends of the Ballarat Botanical Gardens email today. Further investigation of the issue of headers in forwarded mail messages show that I was just plain wrong, and Sean is right: just about no MUA, not even mutt, preserves headers in forwarded messages. I was really thinking of bouncing, not forwarding, and that's something that Microsoft-space MUAs don't seem to understand. In the process, discovered things about gmail that were less than pleasant: apart from an inability to configure many things (like date formats, for example), I can't find any way to edit outgoing messages. Yes, it opens up a form on the web browser, but unlike most forms, I can't redirect this one to a real editor.
Unable to start X
Into the office this morning to discover my mouse limping. It moved relatively smoothly over the root window, but it kept sticking when moving over other windows. I don't understand the details of the mouse processing in X in any detail, but at the very least it needs to send messages to the window, as a quick play with xev indicates: MotionNotify event, serial 27, synthetic NO, window 0x6a00004, root 0x501, subw 0x0, time 2584229172, (128,68), root:(133,89), state 0x0, is_hint 0, same_screen YES Looking at my X server, it had been running for a while, and had hit nearly a gigabyte of memory: USER PID %CPU %MEM VSZ RSS TT STAT STARTED TIME COMMAND root ...
Structured Speaking
I've found that a structure that gives obvious "book-ends" around each topic make it easier for the audience to follow. Most of my talks lately have been either 4-5 small case studies or a Top 10 List. Each case study is a repetition of "who are the players, what happened, what did we learn". The repetition gives the audience a clear understanding of "we're moving to the next topic now" because they see the pattern. In a Top 10 list there is the obvious "book end" of announcing the next number. I started doing this after seeing too many presentations where the presenter runs topic to topic smeared together with very little separation.
Reader Q&A: What about VC++ and C99?
I occasionally get asked about whether, or how well, Visual C++ supports C99. This week, I just posted two replies to this questions on UserVoice (merged below). Last fall, I also answered it in an interview with Dr. Dobbs (recommended for some rationale discussion). The short answer is that Visual C++s focus is to support [...]
Why the death of DRM would be good news for readers, writers and publishers
The Guardian
What dropping DRM across the industry would do for publishing
My latest Guardian column, "Why the death of DRM would be good news for readers, writers and publishers," looks at the wider consequences of Tor Books' dropping DRM on its ebooks, and what it would mean for writers and publishers if DRM was dropped across the industry: oat. Back when ebook sales began to kick … [Read more]
Criminal Intent Prescreening and the Base Rate Fallacy
I've often written about the base rate fallacy and how it makes tests for rare events -- like airplane terrorists -- useless because the false positives vastly outnumber the real positives. This essay uses that argument to demonstrate why the TSA's FAST program is useless: First, predictive software of this kind is undermined by a simple statistical problem known as...
Migrating from TransACT
Yesterday's experience made it clear that we should migrate email for the Friends of the Ballarat Botanical Gardens from TransACT to gmail as soon as possible. The first step, of course, is to forward the messages from TransACT until we can wean people from sending them there in the first placea problem not made any simpler by the fact that messages continue to be sent from that address without a Reply-To: header. But how? I couldn't find anything. So I tried calling TransACT technical support at 13 30 61. Optus regrets that the number you have dialled has been disconnected. Repeatedly.
Big in Japan!
I'm incredibly chuffed to learn that the Japanese edition of Little Brother is up for this year's Seiun award, along with Bacigalupi's Windup Girl, Mieville's The City & the City, Wilson's Chronoliths, Delany's Dhalgren and Ballad's Millennium People.
Browsers and Apps in 2012
Its like this: The browsers doomed, because apps are the future. Wait! Apps are doomed because HTML5 is the future. I see something almost every day saying one or the other. Only its mostly wrong. [If you dont want to read my opinions, hop to the end of this post for months & months worth of links to things I thought worth reading on the subject.] Apps Win If you want immersive/interactive polish, with ultra-fine control over your gradients and textures and how the things on the screen react to being touched, you need an app. If you want to capture what the phone can see, permute that images colors based on how hard you shake it, and vibrate in the users hand to say its time to stop shaking, you need an app.
Al Qaeda Steganography
The reports are still early, but it seems that a bunch of terrorist planning documents were found embedded in a digital file of a porn movie. Several weeks later, after laborious efforts to crack a password and software to make the file almost invisible, German investigators discovered encoded inside the actual video a treasure trove of intelligence -- more than...
Cybercrime as a Tragedy of the Commons
Two very interesting points in this essay on cybercrime. The first is that cybercrime isn't as big a problem as conventional wisdom makes it out to be. We have examined cybercrime from an economics standpoint and found a story at odds with the conventional wisdom. A few criminals do well, but cybercrime is a relentless, low-profit struggle for the majority....
Where does that malware come from?
After months of inactivity, the Friends of the Ballarat Botanical Gardens have come back to life. Today I got a number of mail messages from the mail address that I'm trying to close down: it's in the TransACT domain ncable.net.au, so not only does it not reflect our domain, but it also ties us to TransACT. The more I look at that, the less sense it makes. One of the messages looked very dubious: From [email protected] Tue May 1 11:28:06 2012 Received: from 203.208.114.27 (SquirrelMail authenticated user [email protected]) by webmail.ncable.net.au with HTTP; Tue, 1 May 2012 11:28:06 +1000 (EST) Message-ID: <[email protected]> Date: Tue, 1 May 2012 11:28:06 +1000 (EST) Subject: Email update request From: "Friends of Ballarat Botanic Gardens" <[email protected]> To: [email protected] User-Agent: SquirrelMail/1.4.9a ---------------------------- Original Message ---------------------------- Subject: e-mail verifications From: ...
When Investigation Fails to Prevent Terrorism
I've long advocated investigation, intelligence, and emergency response as the places where we can most usefully spend our counterterrorism dollars. Here's an example where that didn't work: Starting in April 1991, three FBI agents posed as members of an invented racist militia group called the Veterans Aryan Movement. According to their cover story, VAM members robbed armored cars, using the...