Maps and commentary on "the paleogeography of North America over the last 550 million years of geologic history." (BLDGBLOG)
« March 2006 | Main | May 2006 »
Maps and commentary on "the paleogeography of North America over the last 550 million years of geologic history." (BLDGBLOG)
April 26, 2006 | Permalink | Comments (0) | TrackBack (0)
"During World War I, the British and Americans faced a serious threat from German U-boats, which were sinking allied shipping at a dangerous rate. All attempts to camouflage ships at sea had failed, as the appearance of the sea and sky are always changing. Any color scheme that was concealing in one situation was conspicuous in others. A British artist and naval officer, Norman Wilkinson, promoted a new camouflage scheme that was derived from the artistic fashions of the time, particularly cubism. Instead of trying to conceal the ship, it simply broke up its lines and made it more difficult for the U-boat captain to determine the ship's course. The British called this camouflage scheme "Dazzle Painting." The Americans called it "Razzle Dazzle."
U-boats did not aim their torpedos directly at a ship to sink it. Because the target was moving, it was necessary to aim ahead of its path in order for the torpedo to arrive in the correct spot at the same time as the ship. If the torpedo is too early or too late, it will miss. The primary goal of dazzle painting was to confuse the U-boat commander who was trying to observe the course and speed of his target."
April 25, 2006 | Permalink | Comments (0) | TrackBack (0)
"Apple will offer in OS X 10.5 the ability to run native Windows XP applications with no copy of XP installed on the machine at all. This will be accomplished not by using compatibility middleware like Wine, but rather by Apple implementing the Windows API directly in OS X 10.5.
Huh?
Wine is great, but it is also a moving target subject to Microsoft meddling. If Wine gets too good, Microsoft can "accidentally" break it at will. But Microsoft can't afford to do that with its own Windows API. The courts will no longer allow checking for a different underlying OS as Redmond did back in the days of DR-DOS. Besides, unless we are strictly talking about Microsoft apps, there isn't even much code involved here that Microsoft CAN meddle in. The wonder is, of course, that Apple could even dare to do such a thing?
Oh they can dare. Not only that, this is one dare Apple can probably get away with.
Remember Steve Jobs' first days back at Apple in 1997 as Interim-CEO-for-Life? Trying to save the company, Steve got Bill Gates to invest $150 million in Apple and promise to keep Mac Office going for a few more years in exchange for a five-year patent cross-licensing agreement? The idea in everyone's mind, of course, was that Microsoft would grab lots of Apple technology, which they probably did, and it quite specifically ended an Apple patent infringement suit against Microsoft. But I'm told that the exchange wasn't totally one-way, that Apple, in turn, got some legal right to the Windows API.
That agreement ran for five years, from August, 1997 to August 2002. Even though it has since expired, the rights it conferred at the time still lie with the respective companies. Whatever Microsoft grabbed from Apple they can still use, they just aren't able to grab anything developed since August 2002. Same for Apple using Microsoft technology like that in Office X. But Windows XP shipped October 25, 2001: 10 months before the agreement expired.
I'm told Apple has long had this running in the Cupertino lab -- Intel Macs running OS X while mixing Apple and XP applications. This is not a guess or a rumor, this something that has been demonstrated and observed by people who have since reported to me.
Think of the implications. A souped-up OS X kernel with native Windows API support and the prospect of mixing and matching Windows and Mac applications would be, for many users, the best of both worlds. There would be no copy of Windows XP to buy, no large overhead of emulation or compatibility middleware, no chance for Microsoft to accidentally screw things up, substantially better security, and no need to even take a chance on Windows Vista."
April 24, 2006 | Permalink | Comments (0) | TrackBack (0)
"Apple will at least offer the option for users to run a virtualized version of Windows Vista atop OS X, which brings with it two HUGE advantages. First, the bad guys and script kiddies will have to get through OS X security before they even have a chance at cracking Vista security. Second, by running a virtual version of Windows Vista loaded from a read-only partition, Microsoft's recommended method of dealing with malware (periodically wipe the OS and application from your disk and load them anew) can be done in seconds instead of hours and can be done daily instead of monthly or quarterly or yearly.
By running Windows Vista this way, Apple can offer the most secure version of Vista available with the lowest Total Cost of Ownership, which could lead to a leadership change in business computing. Down with Dell and HP and up with Apple.
Those other companies could do much the same thing, not using OS X, but possibly Linux or some other Unix variant. But it won't be the same, at least not at first. Apple, as a company that has made operating systems longer than Microsoft has, brings to this fight a huge technical advantage."
April 24, 2006 | Permalink | Comments (0) | TrackBack (0)
"When you use the Internet, it often feels placeless and virtual, but it's not. It runs on real wires that cut through real geographical boundaries. There are three main fiber-optic pipelines in China, giant underground cables that provide Internet access for the public and connect China to the rest of the Internet outside its borders. The Chinese government requires the private-sector companies that run these fiber-optic networks to specially configure "router" switches at the edge of the network, where signals cross into foreign countries. These routers — some of which are made by Cisco Systems, an American firm — serve as China's new censors...
American Internet firms typically arrive in China expecting the government to hand them an official blacklist of sites and words they must censor. They quickly discover that no master list exists. Instead, the government simply insists the firms interpret the vague regulations themselves. The companies must do a sort of political mind reading and intuit in advance what the government won't like. Last year, a list circulated online purporting to be a blacklist of words the government gives to Chinese blogging firms, including "democracy" and "human rights." In reality, the list had been cobbled together by a young executive at a Chinese blog company. Every time he received a request to take down a posting, he noted which phrase the government had objected to, and after a while he developed his own list simply to help his company avoid future hassles...
The penalty for noncompliance with censorship regulations can be serious. An American public-relations consultant who recently worked for a major domestic Chinese portal recalled an afternoon when Chinese police officers burst into the company's offices, dragged the C.E.O. into a conference room and berated him for failing to block illicit content. "He was pale with fear afterward," she said. "You have to understand, these people are terrified, just terrified. They're seriously worried about slipping up and going to jail. They think about it every day they go into the office."
As a result, Internet executives in China most likely censor far more material than they need to. The Chinese system relies on a classic psychological truth: self-censorship is always far more comprehensive than formal censorship. By having each private company assume responsibility for its corner of the Internet, the government effectively outsources the otherwise unmanageable task of monitoring the billions of e-mail messages, news stories and chat postings that circulate every day in China. The government's preferred method seems to be to leave the companies guessing, then to call up occasionally with angry demands that a Web page be taken down in 24 hours. "It's the panopticon," says James Mulvenon, a China specialist who is the head of a Washington policy group called the Center for Intelligence Research and Analysis. "There's a randomness to their enforcement, and that creates a sense that they're looking at everything..."
"If you talk every day online and criticize the government, they don't care," he said. "Because it's just talk. But if you organize — even if it's just three or four people — that's what they crack down on. It's not speech; it's organizing. People say I'm brave, but I'm not." The Internet brought Zhao a certain amount of political influence, yet he seemed less excited about the way his blog might transform the government and more excited about the way it had transformed his sense of himself. Several young Chinese told me the same thing. If the Internet is bringing a revolution to China, it is experienced mostly as one of self-actualization: empowerment in a thousand tiny, everyday ways...
Brin and his team decided that if they were going to be forced to censor the results for a search for "Tiananmen Square," then they would put a disclaimer at the top of the search results on google.cn explaining that information had been removed in accordance with Chinese law. When Chinese users search for forbidden terms, Brin said, "they can notice what's missing, or at least notice the local control." It is precisely the solution you'd expect from a computer scientist: the absence of information is a type of information. (Google displays similar disclaimers in France and Germany, where they strip out links to pro-Nazi Web sites.)
Brin's team had one more challenge to confront: how to determine which sites to block? The Chinese government wouldn't give them a list. So Google's engineers hit on a high-tech solution. They set up a computer inside China and programmed it to try to access Web sites outside the country, one after another. If a site was blocked by the firewall, it meant the government regarded it as illicit — so it became part of Google's blacklist...
I expected Zhao to be much angrier with the American Internet companies than he was. He was surprisingly philosophical. He ranked the companies in order of ethics, ticking them off with his fingers. Google, he said, was at the top of the pile. It was genuinely improving the quality of Chinese information and trying to do its best within a bad system. Microsoft came next; Zhao was obviously unhappy with its decision, but he said that it had produced such an easy-to-use blogging tool that, on balance, Microsoft was helping Chinese people to speak publicly. Yahoo came last, and Zhao had nothing but venom for the company.
"Google has struck a compromise," he said, and compromises are sometimes necessary. Yahoo's behavior, he added, put it in a different category: "Yahoo is a sellout. Chinese people hate Yahoo." The difference, Zhao said, was that Yahoo had put individual dissidents in serious danger and done so apparently without thinking much about the human damage. (Yahoo did not respond to requests for comment.) Google, by contrast, had avoided introducing any service that could get someone jailed. It was censoring information, but Zhao considered that a sin of omission, rather than of commission...
Given how flexible computer code is, there are plenty of ways to distort the universe — to make its omissions more or less visible. At one point while developing google.cn, Google considered blocking all sites that refer to controversial topics. A search for Falun Gong in China would produce no sites in favor of it, but no sites opposing it either. What sort of effect would that have had? Remember too that when Google introduced its censored google.cn engine, it also left its original google.com Chinese-language engine online. Which means that any Chinese citizen can sit in a Net cafe, plug "Tiananmen Square" into each version of the search engine and then compare the different results — a trick that makes the blacklist somewhat visible. Critics have suggested that Google should go even further and actually publish its blacklist online in the United States, making its act of censorship entirely transparent."
(Google's China Problem (and China's Google Problem) - New York Times)
April 23, 2006 | Permalink | Comments (0) | TrackBack (0)
"Today, Mr. [Geoff] Goodfellow's invention and its fate are a curious but significant footnote to the bitter patent battle between NTP, whose only assets are the Campana patents, and Research in Motion, which has come to dominate the market for wireless electronic mail handsets." (In Silicon Valley, a Man Without a Patent - New York Times)
April 20, 2006 | Permalink | Comments (0) | TrackBack (0)
"America is an amazing natural experiment -- a continent populated largely by self-selected immigrants. All these people had the get-up-and-go to pull up stakes and come here, a temperament that made them different from their friends and relatives who stayed home. Immigrants are the original venture capitalists, risking their human capital -- their lives -- on a dangerous and arduous voyage into the unknown.
Not surprisingly, given this entrepreneurial spirit, immigrants are self-employed at much higher rates than native-born people, regardless of what nation they emigrate to or from. And the rate of entrepreneurial activity in a nation is correlated with the number of immigrants it absorbs. According to a cross-national study, "The Global Entrepreneurship Monitor," conducted jointly by Babson College and the London School of Economics, the four nations with the highest per capita creation of new companies are the United States, Canada, Israel and Australia -- all nations of immigrants. New company creation per capita is a strong predictor of gross domestic product, and so the conclusion is simple: Immigrants equal national wealth.
...The Scottish, Irish, Italians, Japanese and Eastern Europeans were last century's Mexicans -- unwashed hordes, thought to be good only for cheap labor."
(A Nation Built on Immigrant Genes via Digital Rules By Rich Karlgaard)
April 14, 2006 | Permalink | Comments (0) | TrackBack (0)
"The room contains a few dozen living human bodies, each one a big sack of guts and fluids so highly compressed that it will squirt for a few yards when pierced. Each one is built around an armature of 206 bones connected to each other by notoriously fault-prone joints that are given to obnoxious creaking, grinding, and popping noises when they are in other than pristine condition. This structure is draped with throbbing steak, inflated with clenching air sacks, and pierced by a Gordian sewer filled with burbling acid and compressed gas and asquirt with vile enzymes and solvents produced by the many dark, gamy nuggets of genetically programmed meat strung along its length. Slugs of dissolving food are forced down this sloppy labyrinth by serialized convulsions, decaying into gas, liquid, and solid matter which must all be regularly vented to the outside world lest the owner go toxic and drop dead. Spherical, gel-packed cameras swivel in mucus-greased ball joints. Infinite phalanxes of cilia beat back invading particles, encapsulate them in goo for later disposal. In each body a centrally located muscle flails away at an eternal, circulating torrent of pressurized gravy. And yet, despite all of this, not one of these bodies makes a single sound at any time during the sultan’s speech. It is a marvel that can only be explained by the power of brain over body, and, in turn, by the power of cultural conditioning over the brain." (Neal Stephenson - Cryptonomicon)
April 10, 2006 | Permalink | Comments (0) | TrackBack (0)
"Apple today introduced Boot Camp, public beta software that enables Intel-based Macs to run Windows XP. Available as a download beginning today, Boot Camp allows users with a Microsoft Windows XP installation disc to install Windows XP on an Intel-based Mac, and once installation is complete, users can restart their computer to run either Mac OS X or Windows XP." (Apple Introduces Boot Camp)
April 05, 2006 | Permalink | Comments (0) | TrackBack (0)