Software Engineering Is a Dead-End Career, Says Bloomberg
Amateurs wrote Linux and many open source applications... Amateurs are committed to excellence in their practice. DO NOT EVER equate amateur with incompetence. Amateurs are driven by a passion to excel...
Incompetence is best named as it is ... incompetence. And Professionals deserve credit for their accomplishments.
Why Your Dad's 30-Year-Old Stereo Sounds Better Than Yours
Within its limits (40 watts per channel) my 1972 Dynakit stereo sounds better than most common systems. Given sources such as CDs and DVDs, the audio is great. Of course, the speakers/equipment are huge and portability is kind of lacking. On the other hand, FM radio has definitely benefited from improvements in the past decades and old FM receivers are rather deficient compared to even portable units nowadays.
Now, all of THAT said, a pair of Koss PRO-4AA headphones and a fraction of a watt of clean audio from a good audio card, MP3 player, CD player, or laptop is hard to beat and I cannot tell the difference between a good amplifier and a good portable device driving the headphones......
Netflix Deflects Rage Over Price Increase
Imagine if you, like I, have 18GB per month cap for satellite service. I had no use whatever for streaming but the DVDs are wonderful. The only complaint I have is that some new stuff is available streamed well before on DVDs, so that messes stuff up a bit. On the other hand, I have a local Family Video store so I can go there and rent a new movie once in a while for less than I had to pay for streaming I couldn't use. So, I am happy with the change. But I am so far from the Information Superhighway that sometimes the crickets cover up the road noise!
USPTO Plans Could Kill Small Business Innovation
How about extending Creative Commons concepts to the invention realm? Instead of simply being able to demonstrate freedom of the idea by publication or otherwise provable prior use, you could free the idea by wantonly releasing it into humanity's commons. Along the way, you could specify similar categories of use, like attribution, not for profit use, etc. and still make money from some applications of the technology. Unless it infringed existing (prior) patents somehow, the publication of the description would invalidate future attempts to patent the idea, thus protecting the inventor and humanity at large from a wasteful fight. Patents mean nothing for a sufficiently valuable invention with sufficiently powerful opposition, so why not just open it up and get away from all the litigation? Just consider the intermittent windshield wiper as an example. Already there is little cause to patent an idea because defending it becomes a serious problem for most mortals. Raising the cost and barriers to what was intended to be a protection for the little guy removes the last vestige of fairness from the law anyway. If one claims an invention by some commons method, it assures safe use unless it already infringes, and companies the world round could share in the wonders of American Innovation. Mr. Lessig, are you listening?
Gardening On Mars
"None of them will want to be the one to send Joe Sixpack into orbit."
You forget the ship loaded with Telephone Sanitizers, Beauticians, Managers, etc. from Douglas Adams' Hitchhiker series...
Not only that ... but ... Since we have no use for people able to produce really nutritious wholesome food on this planet, maybe we send them to another where their work is appreciated
Write Bits Directly Onto a Hard Drive Platter?
IDE drives do not allow you access to the physical data format. It is written on the disk when it is created and not changed. In the old days, hardware wore out soon enough that the physical format could become unreadable and need to be replaced with a new one. Fun, huh?
Actually you have to go back to the early 80s when BIOS had the low level init utility for hard drives and the drives themselves were simply bit writing and reading devices. At that time you could establish an arbitrary physical format on the drive before you wrote the OS format. In fact, I remember how you could take a 20 MB drive and make it a 30 MB drive with a different RLL (Run Length Limited) encoder that stashed bytes more compactly. That process exceeded the capacity of the processors of the time so was in hardware. So, I guess, just go back and get a 10 or 20MB drive with interface card and have at it.
Making It Hard For Extraterrestrials To Hear Us
Communication by entanglement always reminds me of an "urban legend" during the last part of the cold war. The legend goes as follows. In their attempt to investigate psychic phenomena, the obviously evil and unspeakably nasty Russians took two rabbits, litter-mates, and separated them. One went for a one-way ride on a submarine while the other had electrodes attached to his head for EEG measurements. Then, at a randomly selected time known only to the submariners, the baby rabbit was brutally murdered to make a brief but very strong impression on its psyche. It turns out that the brainwaves of the other rabbit responded at exactly the time of the murder. Obviously entanglement in its almost purest form. Strangely enough, successful replications of the study were never reported.
This story served two purposes. By that time, people were beginning to suspect that Russians were just folks, maybe even like us. One purpose was to keep the people in line by showing just how nasty the adversary was. The second was to pollute their minds with pseudoscience to keep them from ever thinking in a rational, even skeptical manner. Otherwise, they would not be quite so easy to manipulate. Does that sound familiar? Things never change.
Encryption Cracked On NIST-Certified Flash Drives
They just discovered a back door for the convenience of the IT folks.
"The reason current FIPS standards don't defend against the vulnerability is because in a corporate environment, being able to unlock and manage hundreds of USB flash drives with a single administrative password is useful, Jevans noted, "which is effectively what this vulnerability is."
The device password, which is unlocked by a user password, is built into the software that resides on all of the USB drives."
One password to unlock them all. Better be sure to make it a real strong one :-)
Why Coder Pay Isn't Proportional To Productivity
My favorite programmer metric is deceptively simple. Called "Delivered Testable Requirements" it simply counts the testable requirements delivered in the module, modification, etc. Of course, the "deceptively" part is that two things are typically missing from software development ... One is formal testing and the other is requirements so, Never Mind!
Bomb-Proof Wallpaper Developed
Unfortunately the wall paper will provide little protection in tornado alley because:
1. Ballistic 2 by 4's will still fly through your windows -- depending on your luck yours or the neighbor's flying glass will make all outside rooms uninhabitable if the tornado hits just right.
2. The vacuum outside your house will still lift the roof off and then dump some of it into the house
3. If it is more violent, the vacuum will still tear walls off the structure
So ... when you look for a house be sure that you end up in one with:
1. a windowless bathroom because small rooms in the center of the house are structurally much sounder than big ones and safer -- a walk-in closet in the middle of the house is OK too but the extra framing in most bathrooms makes them very sturdy. A bathroom in a basement may be optimum.
2. a tub to provide even more protection for a child or two or a wife or other vulnerable human
3. a basement that will permit you to build a a simple but sturdy shelter to keep falling debris and flying objects out
4. a weather radio operating 24/7 in alarm mode to give you the extra seconds you need to take shelter
5. failing all but 4, above, the place you live has a public shelter within easy reach when your alarm says scramble.
Then, even though you want the fame of being a great videographer, don't pause on the way to the shelter to take pictures of the tornado you see advancing. That one is but a distraction to help the one that is dropping out of the sky just above you wipe you out.
How Vulnerable Is Our Power Grid?
Power plants frequently have extensive networks connecting data collectors and Man Machine Interfaces (MMIs) in control rooms and elsewhere. The MMIs are often Windows based and have drivers for Programmable Logic Controllers (PLCs) and other devices. Recognizing that the systems are vulnerable, enlightened engineers keep the plant systems off the Internet except for a few cases... One is the case in which control or supervision has to be remote and the second is when updating software. A third, which I hate to contemplate but it is probably happening somewhere, is that there is a hidden connection for convenience and nobody in authority knows about it.
The bad news is that people have a habit of bringing in their own laptops, connecting them to the Internet at home or even at work, and ultimately connecting them to the network. Immediately, trojans of all sorts can be transferred to the plant assets and, if they are connected to the Internet for remote supervision/operation, a cracker owns them a few hours later. Security is seldom taken seriously enough, and in the press to get work done, shortcuts are inevitable. As a result, our power grid can probably be taken by anybody who has the patience to target the assets with specific attacks. Phishing at power companies and contractors, finding techies on the Internet and attacking their home machines, penetrating the MMI software vendor sites, and various forms of social engineering can all be used.
Probably the only saving grace is that many sites are never connected to the Internet, many sites have well enforced security regulations, and focused attacks to crack into sites are a lot of work without a lot of revenue. It is probably much more profitable to spam some phishing attack than to try to penetrate power plants. When somebody with the skills dislikes us enough, the grid will go down. period.
Now, solar storms can also take down the grid and we have done nothing to protect our power distribution system from major magnetic storms. Protection is simple and fairly straightforward but it costs money and requires coordination. Basically we need the ability to take down the grid in an orderly fashion, place bypasses/shorting bars on the critical transformers and wait for the storm to arrive. After it passes, just bring the grid back up. With 24-96 hours of notice from our solar observation satellites, it is eminently practical to achieve this. While crackers can take down a plant or two, a magnetic storm can destroy major transformers for which there are no replacements. Power will be down for months and maybe a year or more. A major magnetic storm is a virtual certainty but we will cruise on the ragged edge of fate until it hits.
Film Studios May Block DVD Rentals For One Month
When I hear about a new movie, I immediately (before I forget!!!) go to Netflix and add it to my queue. Then, I know, just like planting tulip bulbs in the fall, that some day in the future I will have a pleasant surprise when the movie shows up as available. Add a month, take away a month ... who cares ... only if the movie were really exceptional would I actually buy tickets and go see it in a theater. Not that it is impossible, I went to a movie in the past year ... but it better be really good and it better benefit from the big screen, big speakers, and big popcorn .... or I will wait patiently for Netflix.
Sky Watchers Want Recognized a Newly Described Type of Cloud
When I was in Southern Illinois Mammatus clouds were evident now and again. Usually they were associated with very unstable air and sometimes preceded severe storms by a while. Once you see them, they are pretty distinctive. They really do look like angel breasts.
Wireless Network Modded To See Through Walls
Aluminum oxide is a dielectric with breakdown around 16kV/mm and dielectric constant of 9. That puts the material in a class similar to glass. As such it would be among the most ineffective Faraday cages since the walls of such a cage must be conductive, and to be truly effective, VERY Conductive. In fact, at high RF ranges light weight cages and shielding have to be made of silver, gold, etc. to keep the skin effect thickness of the material down to manageable values. What is interesting about the aluminum oxide dielectric is its apparent very lossy nature to some RF frequencies, while being "transparent" to others. That is sort of similar to the behavior of pure water, which, if absolutely pure, is a dielectric, but as a polar dielectric it absorbs high frequencies in your microwave oven or in the atmosphere between me and my geosynchronous internet satellite.
The usefulness of aluminum oxide as a dielectric has been known a long time and electrolytic capacitors used as power supply filters, among other things, use its characteristics to make large capacitances in small volumes.
Using a House's Concrete Foundation To Cool a PC
Even if you were to cool a good sized server farm I would think that a good sized automotive radiator in the basement and a pump to circulate the water. I would bet that the radiator wouldn't get warmer than 10F over ambient and no complexity of broken lines in the concrete. A small fan or two to move air through the radiator would increase capacity and lower the temperature rise but I seriously doubt you would need them.
By the way, poured concrete seems to crack at corners of basement windows so be sure you don't bury pipes that cross a potentially notched section of concrete.
Study Links Personal Music Players To Hearing Loss
The real problem is to determine whether you are playing the music too loudly for your safety. Here is how to get a good idea of the harm you are doing ...
1. Find something like a watch or other device that makes a very quiet sound. Find a distance where you can just make out the sound.
2. Listen to your music source at your customary level for 15 to 30 minutes or longer if that is your habit.
3. Set up the conditions in (1) above and see if you can still hear the sound. If you can, you are probably not harming your hearing ... If not, then you have a temporary threshold shift and you have already done some small amount of damage to your hearing. The greater the shift, the greater the damage.
4. More likely, if you listen to loud music or listen in inherently noisy places, you will notice the threshold shift in daily life. background noises disappear, which is like 40-50dB SPL, and definitely a problem.
These hearing conservation links explain a lot Mp3 players are not the only culprit, driving with wind noise in your left (or your passenger's right) ear, circular saws and construction tools, and other sources of noise are damaging. Music is different in that it can not be blocked but can be controlled.
If you don't protect your hearing from loud sound, sooner or later a notch will start to form in your ear's frequency response curve. The notch will be centered around 4000 Hz, right where high frequencies get really high, and useful too. That notch widens above and below until it impacts 2KHz or even lower. Somewhere along the way, the detectors in the ear will get so damaged that they start detecting sound non-linearly and harmonic and intermodulation distortion arise. Finally, when they get injured some more, they start to fire "all or none" and even moderately loud sounds can be painful. That is called recruitment and is really damaging to hearing and sanity.
I hope this information is useful to readers. I hate to see people lose hearing when it is so unnecessary in most cases.
If you think your hearing is going bad, see an audiologist or ear doctor or both, soon. Most processes can be stopped, and believe me, you will be glad you at least stopped the damage.
I am pushing 60 years old, have used threshold shift changes to remind me to protect my hearing, and still have no noise notch in my good ear. My other ear was damaged by childhood infections and is mostly useless so I guess having only one ear made me more careful.