April 2008

Energy-efficient washing machines

From Is a Dishwasher a Green Machine?:

To really green up your automatic dishwashing, you should always use the air-drying function, avoid the profligate “rinse hold” setting, wash only full loads, and install the machine far away from your refrigerator.

Just promise that you’ll scrape your dishes instead of pre-rinsing, use the shortest wash cycles possible, and buy phosphate-free detergents – or, if you’re handy with a blender, make your own.

Energy-efficient washing machines Read More »

1/2 of all bots are in China

From “Report: China’s botnet problems grows” (SecurityFocus: 21 April 2008):

Computers infected by Trojan horse programs and bot software are the greatest threat to China’s portion of the Internet, with compromises growing more than 20-fold in the past year, the nation’s Computer Emergency Response Team (CN-CERT) stated in its 2007 annual report released last week.

The response organization found that the number of Chinese Internet addresses with one or more infected systems increased by a factor of 22 in 2007. The report, currently only published in Chinese, estimates that, of 6.23 million bot-infected computers on the Internet, about 3.62 million are in China’s address space.

1/2 of all bots are in China Read More »

How Google motivates employees

From Larry Page’s “How to Motivate Your Staff” (Business 2.0: December 2003: 90):

We wrote a program that asks every engineer what they did every week. It sends them e-mail on Monday, and concatenates the e-mails together in a document that everyone can read. And it then sends that out to everyone and shames those who did not answer by putting them on the top of the list. It has run reliably every week since we started, so for every week of our company’s history we have a record of what everyone did. It’s good for performance reviews, and if you’re joining a project team, in five minutes you can read what your team members did the last few weeks or months.

How Google motivates employees Read More »

Why brands are declining

From Brian Gibbs’ letter printed in Wired (January 2005):

The explanation that the decline of brands is due to competition, informed consumers, and constant innovation is insufficient. There’s another factor wreaking havoc. Over the years, brands have lost their meaning because advertising campaigns developed by creative types have been clever and witty, but often not relevant.

Once, brands defined the meaning and mode of civilization: fresher-smelling laundry, tastier tuna, et cetera. Tide used to “get dirt out.” Now it “works wonders,” a vacuous, unprovable claim. Do Tide customers think that getting their laundry clean is a miracle? Do they have an unmet psychological need to deify their detergent? Of course not. Creative-led marketing has wrought the empty brand.

Why brands are declining Read More »

After a stroke, he can write, but can’t read

From Oliver Sacks’ “The Case of Anna H.” (The New Yorker: 7 October 2002: 64):

I recently received a letter from Howard Engel, a Canadian novelist, who told me that he had a somewhat similar problem following a stroke: “The area affected,” he relates, “was my ability to read. I can write, but I can’t read what I’ve just written … So, I can write, but I can’t rewrite …”

After a stroke, he can write, but can’t read Read More »

Modern piracy on the high seas

From Charles Glass’ “The New Piracy: Charles Glass on the High Seas” (London Review of Books: 18 December 2003):

Ninety-five per cent of the world’s cargo travels by sea. Without the merchant marine, the free market would collapse and take Wall Street’s dream of a global economy with it. Yet no one, apart from ship owners, their crews and insurers, appears to notice that pirates are assaulting ships at a rate unprecedented since the glorious days when pirates were ‘privateers’ protected by their national governments. The 18th and 19th-century sponsors of piracy included England, Holland, France, Spain and the United States. In comparison, the famed Barbary corsairs of North Africa were an irritant. Raiding rivals’ merchant vessels went out of fashion after the Napoleonic Wars, and piracy was outlawed in the 1856 Declaration of Paris (never signed by the US). Since the end of the Cold War, it has been making a comeback. Various estimates are given of its cost to international trade. The figure quoted most often is the Asia Foundation’s $16 billion per annum lost in cargo, ships and rising insurance premiums.

The International Maritime Bureau (IMB), which collects statistics on piracy for ship owners, reports that five years ago pirates attacked 106 ships. Last year they attacked 370. This year looks worse still.

In waters where piracy flourished in the past, the tradition embodied in figures such as Captain Kidd has persisted: off the Ganges delta in Bangladesh, in the Java and South China Seas, off the Horn of Africa and in the Caribbean. Three conditions appear necessary: a tradition of piracy; political instability; and rich targets – Spanish galleons for Drake, oil tankers for his descendants. A fourth helps to explain the ease with which it happens: ‘The maritime environment,’ Gunaratna said, ‘is the least policed in the world today.’

The IMB has not been able to persuade the international community or the more powerful maritime states to take serious action. The Bureau’s director, Captain Pottengal Mukundan, believes there is nothing crews can do to protect themselves. National maritime laws are not enforced beyond national boundaries – which is to say, over more than half the earth’s surface. Beyond territorial waters, there are no laws, no police and no jurisdiction. Many countries lack the will or the resources to police even their own waters. The IMB advises all ships against putting in anywhere near states like Somalia, for instance, where there is a near certainty of attack. … Piracy is a high-profit, low-risk activity.

The IMB urges crews to take more precautions, but owners can’t afford every recommended improvement: satellite-tracking devices, closed circuit cameras, electric fencing and security officers on every ship. Owners and trade unions discourage the arming of merchant ships in the belief that firearms will put crews’ lives at greater risk. Only the Russians and the Israelis are known to keep weapons aboard. Competition in the shipping business forces owners to minimise expenditure on crews as on everything else. A commission of inquiry into the 1989 Exxon Valdez spill that nearly destroyed the Alaskan coast reported that ‘tankers in the 1950s carried a crew of 40 to 42 to manage about 6.3 million gallons of oil . . . the Exxon Valdez carried a crew of 19 to transport 53 million gallons of oil.’ [Quoted in Dangerous Waters: Modern Piracy and Terror on the High Seas by John Burnett] With the automation of many shipboard tasks, vessels today carry even fewer seamen than they did when the Exxon Valdez ran aground. That means fewer eyes to monitor the horizon and the decks for intruders.

Air and land transport routes have come under tighter scrutiny since 11 September 2001, but improvements to maritime security are few. An oil tanker can carry a load that is far, far more explosive than any civil aircraft. And most piracy, including the seizure of oil tankers, takes place near countries with powerful Islamist movements – Indonesia, Malaysia, the Philippines, Yemen and Somalia. Lloyd’s List reported on 4 November that Indonesia is ‘the global black spot’ with 87 attacks in the first nine months of this year – ‘the number of attacks in the Malacca Straits leaped from 11 in 2002 to 24 this year.’ Indonesia, which consists of two thousand islands, is the world’s most populous Muslim country. It has experienced decades of repression by a kleptocratic military, communal violence and the degradation of a once vibrant economy. Radical Islamists have made it the focus of their activity and recruitment in Asia.

Modern piracy on the high seas Read More »

Language shapes thought

From Celeste Biever’s “Language may shape human thought” (New Scientist: 19 August 2004):

Language may shape human thought – suggests a counting study in a Brazilian tribe whose language does not define numbers above two.

Hunter-gatherers from the Pirahã tribe, whose language only contains words for the numbers one and two, were unable to reliably tell the difference between four objects placed in a row and five in the same configuration, revealed the study. 

For one, two and three objects, members of the tribe consistently matched Gordon’s pile correctly. But for four and five and up to ten, they could only match it approximately, deviating more from the correct number as the row got longer.

The Pirahã also failed to remember whether a box they had been shown seconds ago had four or five fish drawn on the top. When Gordon’s colleagues tapped on the floor three times, the Pirahã were able to imitate this precisely, but failed to mimic strings of four or five taps.

Language shapes thought Read More »

A cheap, easy way to obfuscate license plates

From Victor Bogado da Silva Lins’ letter in Bruce Schneier’s Crypto-Gram (15 May 2004):

You mentioned in your last crypto-gram newsletter about a cover that makes a license plate impossible to read from certain angles. Brazilian people have thought in another low-tech solution for the same “problem”, they simply tie some ribbons to the plate or the car itself; when the car is running (speeding) the ribbons fly and get in front of the plate making it difficult to read the plate.

A cheap, easy way to obfuscate license plates Read More »

What actions change MAC times on a UNIX box?

From Holt Sorenson’s “Incident Response Tools For Unix, Part Two: File-System Tools” (SecurityFocus: 17 October 2003):

Various commands change the MAC [modify, access, and change] times in different ways. The table below shows the effects that some common commands have on MAC times. These tables were created on Debian 3.0 using an ext2 file system contained in a flat file mounted on a loopback device. … Experimenting with your own system to verify the information in the tables below is encouraged. These tables can serve as a general guide, however.

How common commands change MACtimes for a directory (foo):
Action atime ctime mtime
creation (mkdir foo) X X X
directory move (mv foo bar) X X
file creation (touch foo/foo) X X
file creation (dd if=/dev/zero of=foo/foo count=1) X X
list directory (ls foo) X
change directory (cd foo)
file test (-f foo)
file move/rename (mv foo foo_mvd) X X
permissions change (chmod/chown <some_perm> foo) X
file copy (mv foo_mvd foo) X X
file edit (vim foo) X X
file edit (emacs foo) X X X
file edit (nvi/nano foo)
How common commands change MACtimes for a file (f1):
Action atime ctime mtime
creation (touch foo) X X X
creation (dd if=/dev/zero of=foo count=1) X X X
rename (mv foo bar)
permissions change (chmod <some_perm> foo) X
copy (cp foo bar) X
copy overwrite (cp bar foo) X X
append (cat >> foo) X X
overwrite (cat > foo) X X
truncate (cp /dev/null foo) X X
list file (ls foo)
edit (vim/emacs/xemacs/joe/jed foo) X X X
edit (ed/nvi/vi (sun)/vi (obsd)/nano/pico foo) X1 X1 X1
1 – all times changed, but atime is slightly older than mtime and ctime

The ls command can be used to show the modify, access or change times of files. The following table shows various ls commands that sort in reverse order by mtime, atime, or ctime. This causes ls to list the most recent times last.

displaying MACtimes using ls:
Linux (ls from GNU fileutils) OpenBSD Solaris
mtime ls -latr –full-time ls -latTr ls -latr
atime ls -laur –full-time ls -lauTr ls -laur
ctime ls -lacr –full-time ls -lacTr ls -lacr

What actions change MAC times on a UNIX box? Read More »

What in our brains invest memories with emotion?

From Steven Pinker’s “What the F***?” (The New Republic: 9 Octobert 2007):

The mammalian brain contains, among other things, the limbic system, an ancient network that regulates motivation and emotion, and the neocortex, the crinkled surface of the brain that ballooned in human evolution and which is the seat of perception, knowledge, reason, and planning. The two systems are interconnected and work together, but it seems likely that words’ denotations are concentrated in the neocortex, especially in the left hemisphere, whereas their connotations are spread across connections between the neocortex and the limbic system, especially in the right hemisphere.

A likely suspect within the limbic system is the amygdala, an almond-shaped organ buried at the front of the temporal lobe of the brain (one on each side) that helps invest memories with emotion. A monkey whose amygdalas have been removed can learn to recognize a new shape, like a striped triangle, but has trouble learning that the shape foreshadows an unpleasant event like an electric shock. In humans, the amygdala “lights up”–it shows greater metabolic activity in brain scans–when the person sees an angry face or an unpleasant word, especially a taboo word.

What in our brains invest memories with emotion? Read More »

Do’s and don’ts for open source software development

From Jono DiCarlo’s “Ten Ways to Make More Humane Open Source Software” (5 October 2007):

Do

  1. Get a Benevolent Dictator
    Someone who has a vision for the UI. Someone who can and will say “no” to features that don’t fit the vision.
  2. Make the Program Usable In Its Default State
    Don’t rely on configurable behavior. It adds complexity, solves little, and most users will never touch it anyway. Usable default behavior is required.
  3. Design Around Tasks
    Figure out the tasks that people want to do with your software. Make those tasks as easy as possible. Kill any feature that gets in the way.
  4. Write a Plug-In Architecture
    It’s the only good solution I’ve seen to the dilemma of providing a complete feature set without bloating the application.
  5. User Testing, User Testing, User Testing!!
    Without user testing, you are designing by guesswork and superstition.

Do Not

  1. Develop Without A Vision
    “When someone suggests another feature, we’ll find a place to cram it in!”
  2. Join the Clone Wars
    “Closed-source program X is popular. Let’s just duplicate its interface!”
  3. Leave the UI Design Up To The End User
    “I’m not sure how that should work. I’ll make it a check box on the preferences screen.”
  4. Make the Interface a Thin Veneer over the Underlying Implementation
    “But it’s got a GUI now! That makes it user-friendly, right?”
  5. Treat UI Design as Babysitting Idiots
    “They should all quit whining and read the manual already.”

Do’s and don’ts for open source software development Read More »

Scarcities and the music, movie, and publishing businesses

In Clay Shirky’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007), he takes on the persona of someone talking about what new changes are coming with the Gutenberg movable type press. At one point, he says, “Such a change would also create enormous economic hardship for anyone whose living was tied to earlier scarcities.”

It’s not just writing and writers and publishers that now face that change. Scarcities drove the music and movie businesses, and those scarcities are disappearing. When music is no longer tightly controlled in terms of creation, availability, manufacture, and distribution, when it’s possible to download or listen to anything at any time, those businesses face rapid, discombobulating change.

Is it the government’s – or society’s – duty, however, to put those scarcities back into place, either through technologies or law?

Scarcities and the music, movie, and publishing businesses Read More »

Like music, authors will make more money from personal appearances

From Douglas Rushkoff’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007):

But I think many writers – even good ones – will have to accept the fact that books can be loss-leaders or break-even propositions in a highly mediated world where showing up in person generates the most income.

Like music, authors will make more money from personal appearances Read More »

The Internet makes (sloppy) writers of nearly everyone

From Adam Parfrey’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007):

I like the internet and computers for their ability to make writers of nearly everyone. I don’t like the internet and computers for their ability to make sloppy and thoughtless writers of nearly everyone.

The Internet makes (sloppy) writers of nearly everyone Read More »

The shift from interior to exterior lives

From Mark Dery’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007):

But we live in times of chaos and complexity, and the future of writing and reading is deeply uncertain. Reading and writing are solitary activities. The web enables us to write in public and, maybe one day, strike off the shackles of cubicle hell and get rich living by our wits. Sometimes I think we’re just about to turn that cultural corner. Then I step onto the New York subway, where most of the car is talking nonstop on cellphones. Time was when people would have occupied their idle hours between the covers of a book. No more. We’ve turned the psyche inside out, exteriorizing our egos, extruding our selves into public space and filling our inner vacuums with white noise.

The shift from interior to exterior lives Read More »

People being rescued run from their rescuers

From Les Jones’s email in Bruce Schneier’s “Crypto-Gram” (15 August 2005):

Avoiding rescuers is a common reaction in people who have been lost in the woods. See Dwight McCarter’s book, “Lost,” an account of search and rescue operations in the Great Smoky Mountains National Park. In one chapter McCarter tells the story of two backpackers in the park who got separated while traveling off-trail in the vicinity of Thunderhead. The less-experienced hiker quickly got lost.

After a day or two wandering around he was going through his pack and found a backpacking how-to book that explained what to do in case you got lost in the woods. Following the advice, he went to a clearing and built a signal fire. A rescue helicopter saw the smoke and hovered overhead above the tree tops as he waved his arms to attract their attention. The helicopter dropped a sleeping bag and food, with a note saying they couldn’t land in the clearing, but that they would send in a rescue party on foot.

The lost hiker sat down, tended his fire, and waited for rescue. When the rescuers appeared at the edge of the clearing, he panicked, jumped up, and ran in the other direction. They had to chase him down to rescue him. This despite the fact that he wanted to be rescued, had taken active steps to attract rescuers, and knew that rescuers were coming to him. Odd but true.

People being rescued run from their rescuers Read More »