Planet is pleased to announce that we have once again partnered with Geoplex, a mapping and GIS systems company based in Australia, to deliver timely, high resolution satellite image data. We’re especially excited about this effort because a portion of the data to be used by the Queensland government, within its Department of Natural Resources and Mines (DNRM), will be made available to the public under creative commons.
While satellite imagery over the State of Queensland was previously captured only once every couple of years, this partnership between Planet and Geoplex will provide DNRM with seasonally updated mosaics multiple times in a single year. The first-ever stream of quarterly-updated data will help decision-makers at the State and agency level make timely, better-informed decisions.
Geoplex was one of Planet’s first international partners, and we could not be more grateful for their continued loyalty and collaboration in our mission to make data about our planet visible, accessible and actionable.
I don’t do guest posts here. This blog is my private soapbox. You want to scream into the void? Go get your own soapbox.
Yesterday, I was privy to a private email message discussing a topic I care deeply about. I contacted the author and said “You really need to make this public and give this a wider audience.” His response boiled down to “if I wanted it to get a wider audience, I was welcome to do so myself.” So here’s my first ever guest post, from Jordan K Hubbard, one of the founders of the FreeBSD Project. While this discussion focuses on FreeBSD, it’s applicable to any large open source project.
The email discussion was about the FreeBSD Project recently giving someone the boot. I’m not linking to who it was; you can dig up the controversy elsewhere.
I did my first install of FreeBSD, version 2.0.5, in late 1995. I started reading FreeBSD mailing lists shortly afterwards. Allow me to provide some context to say that when jkh says he was a dick: yes. He was.
Like any good member of the press, I’ll give my anchor commentary after the footage. Again, it’s my soapbox.
My, what an interesting thread this has been, as well as an interesting (and probably controversial) recent talk by Benno on much the same topic.
I’m known for my long and overly verbose PhD thesis style postings, so I’ll try to make this one short(er) with a few pithy points:
1. Some of the FreeBSD project’s most energetic, motivated, and capable people have also, when viewed through the long lens of history, been total dicks, at least in electronic form. They just can’t seem to help themselves from coming off that way, one person’s “passionate concern for topic X” being another person’s “totally over-the-top behavior concerning topic X”, with neither side usually having the benefit of all the information while they form conclusions about which of the two it is.
2. The project needs driven individuals capable of achieving “10X productivity” (a software industry term, not mine) in driving various agendas, inspiring others by their progress and allowing important opportunities for project growth to be seized rather than squandered, just as it needs nice, cooperative, team-players who go out of their way to avoid stepping on toes or driving more junior, perhaps easily intimidated, volunteers away from the project. It would also be awesome to find both attributes in the same people, obviously, but that goal is usually more aspirational than one immediately (if ever) achieved.
So, how to reconcile these two seemingly fundamentally opposed goals in project membership management? “What is core going to do about it?”*
First, let me be very honest: I can only speak to you from the perspective of someone who has committed many of the sins in paragraph 1.
I have said many things I subsequently regretted. I have engaged in furious, pitched battles over topics that subsequently proved to be almost nonsensically trivial. I have definitely alienated people. The fact that I have Asperger’s syndrome also made it easy for me to be both highly driven and insensitive to other people’s feelings at the same time (it helps when you don’t even notice them) but that’s certainly no excuse because I have also learned, along the way, to grasp intellectually what I did not always grasp instinctively: Just don’t be a dick. Take a deep breath, swallow the irritation that is often my first response, and try to figure out another way of expressing myself that will lead to a better long-term outcome with less friction with my colleagues / bosses / end-users.
Does that work 100%? Heck no, I’m still a work in progress, but I’m definitely better than I was 22 years ago, and pretty much the only reason that I’m better is that people took the time to talk to me about being a dick. They sent me (oh so many) private emails saying, in effect, “Dude! Really??” They called me on the phone when it was clear I really needed a Healthy Dose of Perspective and email just wasn’t doing the job. All of my fellow developers and colleagues (and yes, occasionally HR departments) have collectively conspired to slap me across the face with the Trout of Truth when it was clear I was going, or had gone, off the rails where interpersonal communications and decision making skills were concerned. I have, in short, learned some hard lessons about being more responsible for my actions on a number of levels and I’m glad I managed to stick around long enough to learn them. I am, as I said, a work in progress.
* That’s where all of you come in. You can’t just say “What is Core Doing About It?” when it comes to addressing problems like this, because by the time Core gets involved, it’s already too late. The damage is done and probably irrevocably so because it’s been done over a long period of time. People complained and complained and finally core wearily stepped in and pulled the trigger. Bang. Too late for anything else.
If you want better outcomes than this, then you simply need to start mentoring one another. You need to take extra time to call your fellow developers on the phone / Skype / WhatsApp / whatever works when it’s clear one of them is having a bad day, or escalating a situation that doesn’t warrant escalation, or simply being a dick when they don’t need to be (and probably don’t even realize they’re being). We had that kind of close and frequent communication a lot in the early days of the project, and I absolutely know that it held things together through some rather tempestuous times. It’s also no excuse to say that the project is bigger and has outgrown this now, either, because it only takes one person to call one other person at the right time for ad-hoc mentorship to work. Don’t just wait until you see someone at the next conference when it’s clear they are struggling to interact successfully with others in the here-and-now, reach out, just as so many reached out to me!
Please also take my word for it when I say that a truly successful FreeBSD project will continue to need driven people, people who are often tempted to drive right over others who won’t get out of their way or otherwise tend to show “less than perfect patience”, just as it will continue to need quieter folks who are content to follow someone else’s vision, assuming that there is one to follow, and instinctively do a better job of getting along with others. Each “type” can benefit and learn from the example the other provides, assuming there is a real commitment to doing so.
I’ll leave you with an analogy: This is like a marriage. If both in the couple are very passive, then that will probably be a long-lived but rather boring relationship where both ultimately wind up just counting the days until death comes for them. If both are fiery and impetuous, the relationship will probably be exciting but equally short-lived. The most successful marriages are usually some combination of the two extremes, the worst impulses of one being kept reasonably in check while the other gets to experience new and exciting things they just wouldn’t have thought to do (or had the will to do) on their own. Assuming that both also commit to communicating on a frequent basis and don’t just assume Everything Is Fine, it works.
What kind of marriage do you folks want?
Jordan is absolutely right here.
The open source community has some incredibly smart people in it. You folks are brilliant.
When Jordan says that he’s a “work in progress,” though, that’s applicable to every one of us. Including myself.
I won’t say that the open source community is full of people with problems like ADD, Aspergers, and so on. I will say that of the adults I know that I happen to have these conditions, I met every single one of them through the open source community. I strongly suspect they gravitate there because computers are comparatively easy compared to people.
Other groups have their own issues. The writers I know run really heavy into depression and social anxiety. (I’m a writer and a techie. Thanks to my writing career and Amazon Prime’s free two-day shipping, I almost never leave the house. That’s just best.)
Brilliance is great. I admire really really smart people.
But to belong to a community, a person must be able to work with that community. I’m using “must” in the RFC sense here. It’s an absolute, non-negotiable requirement.
BSD, and open source in general, is full of brilliant but incomplete people. Everyone is incomplete. In open source, the incompleteness is often in social skills and the understanding of how to behave.
Social correction, and the establishment of social norms, comes only from the community. It’s entirely bottom-up. One on one.
While you can go to a counselor to help develop those skills, the best advice comes from peers who have been in your exact situation, who have faced those problems, and who have developed those skills.
Are you good at communicating in your open source community? You have another contributor you like, but who has social problems? Unofficially mentor them.
Are you an open source contributor who keeps getting messages from people saying something like “Dude, that’s really messed up,” or “You were really inappropriate here, stop it,” or similar? One message might not be a big deal. But if you keep getting them, it’s a sign that you’re missing a skill. A skill that can be learned. If someone you get along with offers to help: listen.
And it’s far better done via voice than electronic text. Text communication strips vital context, and it’s much much slower than voice. If a person has problems communicating via email, more email isn’t going to solve it.
One of the hardest things to do is listen when someone calls you a dick. Yes, it’s happened to me. When it comes from people I respect, I listen. It makes me less incomplete.
And if Jordan can learn to not be a dick, anyone can.
So why am I not naming the person who got booted from FreeBSD? Because he, like everyone else, is an incomplete person who lacks a particular skill. I hope he will develop that skill. And I don’t want a blog post from 2017 to hurt his chances of getting a job in 2037, or even 2018, when he’s had an opportunity to add those skills.
You have the power to make that brilliant but poorly socialized contributor a better community member. Even if that brilliant member is you.
Over the past few days, thousands and thousands of citizens around the world marched through the streets of cities and towns, voicing their opposition to, or support for, dozens of issues. From anti-Trump protests in the U.S., U.K., and Mexico, to anti-brutality demonstrations in France, to a pro-law-enforcement march in Hong Kong and a massive pro-refugee demonstration in Spain, and much more. Gathered here are just a handful of images of the varied unrest that erupted into public protests worldwide this weekend.
Here’s one of the reasons to have your own permanent server: The New York Times has a daily feature called, not surprisingly, “The Daily“. It’s a short 15-20 minute news segment, ready by 6 AM. It’s available through Google Play Music or iTunes, but I leave for work by 6:15, and I don’t want to use up cell data downloading something that should arrive on my phone just before I leave the house. Of course, there’s no obvious way to tell Google Play, “I know it’s there; go get it right now”. I don’t know the iPhone experience, but I imagine it’s the same. I want to download on my time, not on Google or Apple’s schedule.
Luckily, there’s an RSS feed for this podcast. That, plus this simple script on my DragonFly system, means I can pull it down whenever I’m ready:
fetch -o – http://feeds.podtrac.com/zKq6WZZLTlbM | grep enclosure | cut -d ‘”‘ -f2 | xargs fetch -m
So, it’s a matter of running that script, and syncing off my own local storage, on my own schedule. FolderSync Lite will happily sync back to my phone using sftp.
Amid the hustle and bustle of the RSA Security Conference in San Francisco last week, researchers at RSA released a startling report that received very little press coverage relative to its overall importance. The report detailed a malware campaign that piggybacked on a popular piece of software used by system administrators at some of the nation’s largest companies. Incredibly, the report did not name the affected software, and the vendor in question has apparently chosen to bury its breach disclosure. This post is an attempt to remedy that.
The RSA report detailed the threat from a malware operation the company dubbed “Kingslayer.” According to RSA, the attackers compromised the Web site of a company that sells software to help Windows system administrators better parse and understand Windows event logs. RSA said the site hosting the event log management software was only compromised for two weeks — from April 9, 2015 to April 25, 2015 — but that the intrusion was likely far more severe than the short duration of the intrusion suggests.
That’s because in addition to compromising the download page for this software package, the attackers also hacked the company’s software update server, meaning any company that already had the software installed prior to the site compromise would likely have automatically downloaded the compromised version when the software regularly checked for available updates (as it was designed to do).
RSA said that in April 2016 it “sinkholed” or took control over the Web site that the malware used as a control server — oraclesoft[dot]net — and from there they were able to see indicators of which organizations might still be running the backdoored software. According to RSA, the victims included five major defense contractors; four major telecommunications providers; 10+ western military organizations; more than two dozen Fortune 500 companies; 24 banks and financial institutions; and at least 45 higher educational institutions.
RSA declined to name the software vendor whose site was compromised, but said the company issued a security notification on its Web site on June 30, 2016 and updated the notice on July 17, 2016 at RSA’s request following findings from further investigation into a defense contractor’s network. RSA also noted that the victim software firm had a domain name ending in “.net,” and that the product in question was installed as a Windows installer package file (.msi).
Using that information, it wasn’t super difficult to find the product in question. An Internet search for the terms “event log security notification april 2015” turns up a breach notification from June 30, 2016 about a software package called EVlog, produced by an Altair Technologies Ltd. in Mississauga, Ontario. The timeline mentioned in the breach notification exactly matches the timeline laid out in the RSA report.
As far as breach disclosures go, this one is about the lamest I’ve ever seen given the sheer number of companies that Altair Technologies lists on its site as subscribers to eventid.net, an online service tied to EVlog. I could not locate a single link to this advisory anywhere on the company’s site, nor could I find evidence that Altair Technologies had made any effort via social media or elsewhere to call attention to the security advisory; it is simply buried in the site. A screenshot of the original, much shorter, version of that notice is here.
Perhaps the company emailed its subscribers about the breach, but that seems doubtful. The owner of Altair Technologies, a programmer named Adrian Grigorof, did not respond to multiple requests for comment.
“This attack is unique in that it appears to have specifically targeted Windows system administrators of large and, perhaps, sensitive organizations,” RSA said in its report. “These organizations appeared on a list of customers still displayed on the formerly subverted software vendor’s Web site. This is likely not coincidence, but unfortunately, nearly two years after the Kingslayer campaign was initiated, we still do not know how many of the customers listed on the website may have been breached, or possibly are still compromised by the Kingslayer perpetrators.”
It’s perhaps worth noting that this isn’t the only software package sold by Altair Technologies. An analysis of Eventid.net shows that the site is hosted on a server along with three other domains, eventreader.com, firegen.com and grigorof.com (the latter being a vanity domain of the software developer). The other two domains — eventreader.com and firegen.com — correspond to different software products sold by Altair.
The fact that those software titles appear to have been sold and downloadable from the same server as eventid.net (going back as far as 2010) suggests that those products may have been similarly compromised. However, I could find no breach notification mentioning those products. Here is a list of companies that Altair says are customers of Firegen; they include 3M, DirecTV, Dole Food Company, EDS, FedEx, Ingram Micro, Northrup Grumman, Symantec and the U.S. Marshals Service.
RSA calls these types of intrusions “supply chain attacks,” in that they provide one compromise vector to multiple targets. It’s not difficult to see from the customer lists of the software titles mentioned above why an attacker might salivate over the idea of hacking an entire suite of software designed for corporate system administrators.
“Supply chain exploitation attacks, by their very nature, are stealthy and have the potential to provide the attacker access to their targets for a much longer period than malware delivered by other common means, by evading traditional network analysis and detection tools,” wrote RSA’s Kent Backman and Kevin Stear. “Software supply chain attacks offer considerable ‘bang for the buck’ against otherwise hardened targets. In the case of Kingslayer, this especially rings true because the specific system-administrator-related systems most likely to be infected offer the ideal beachhead and operational staging environment for system exploitation of a large enterprise.”
A copy of the RSA report is available here (PDF).
Registration is now open for the 2017 Tennessee Valley Interstellar Workshop, which will be held in Huntsville, AL on October 4-6. The title for this year’s conference is “Step By Step: Building a Ladder to the Stars.” The registration page is here, and if you’re thinking of attending, I recommend registering right away, as spaces filled up swiftly the last time around. This year’s TVIW will take place in partnership with the Tau Zero Foundation as well as Starship Century, which has already produced two successful symposia of its own.
Despite its regional name, the Tennessee Valley Interstellar Workshop has become a well received forum for interstellar discussions on a global scale, with speakers and workshop participants well known to Centauri Dreams readers. Registration at this year’s event costs $175, with discounts available for students. Pre-symposium seminars for an additional fee are to be held on Tuesday October 3. This year’s topics are Conflict in Space; Laser Propulsion: An Introduction to Laser Propulsion and Assessment of Relevant Current Technologies; and Human Life in Space – Separating Reality from Wishful Thinking.
I’ve been pleased to attend all of the previous symposia except the last one, which I had to miss because of an untimely bout of the flu. The recent call for papers jogged me into getting my registration in early, as I don’t want to miss two in a row. The text below is taken directly from the submissions page on the TVIW site:
TVIW 2017 Call for Papers, Workshop Tracks, and Posters: The Tennessee Valley Interstellar Workshop (TVIW), in collaboration with Starship Century and Tau Zero Foundation, hereby invites participation in its 2017 Symposium to be held from Wednesday, October 4 through Friday, October 6, 2017, in Huntsville, Alabama. Our Program Committee is seeking proposals for Plenary Papers/Talks, Working Tracks, and Sagan Meetings as well as other content such as posters.
Sagan Meetings are new for TVIW 2017. Carl Sagan famously employed this format for his 1971 conference at the Byurakan Observatory in old Soviet Armenia, which dealt with the Drake Equation. Each Sagan Meeting will invite five speakers to give a short presentation staking out a position on a particular question. These speakers will then form a panel to engage in a lively discussion with the audience on that topic.
Invited Talks are presentations that contain significant results or describe major activities in the field and will be solicited by sponsoring organizations or the conference organizers.
Discussion Groups are for those not participating in the working tracks or Sagan Meetings and offer opportunities for free form discussion of subjects of mutual interest to attendees. They are unstructured and no specific output is expected although it is hoped that these groups might generate teams and/or topics that would lead to future Working Tracks and possible collaborative efforts in the interstellar field. Coffee, pen, and paper will be provided. An expanded list of possible topics will be available each day of the Symposium and anyone wishing to propose a topic is free to do so. Contact David Fields (email@example.com) to suggest topics.
Other Content includes, but is not limited to, posters, displays of art or models, demonstrations, panel discussions, interviews, or public outreach events. Please refer to Appendix 1 for more information and the abstract submission guidelines.
Full information on formats and other structural matters can be found on the Submissions page. If you’re wondering about ‘working tracks,’ TVIW has used these in the past to engage up to four parallel tracks on issues of interstellar import, such as mission targets, propulsion systems, life support and the human factors needed for interstellar exploration. Each working track will be allocated two-hour blocks each day. Proposals for working tracks are still open, with the letter of intent deadline coming up on March 3, and deadline for complete proposals on March 31. TVIW hopes to have four to six working tracks in the 2017 symposium.
I notice that Andrew Siemion (UC-Berkeley), who serves as director of the UC Berkeley Center for the Search for Extraterrestrial Intelligence (SETI) will be speaking in Huntsville. Siemion is also one of the leaders of the Breakthrough Listen Initiative, which under the aegis of the Breakthrough Prize Foundation is conducting the most sensitive search yet for signs of extraterrestrial technology. At TVIW 2017, Siemion will be discussing “The Search for Ourselves Among the Stars,” a look at the past, present and future of SETI activities.
I’ve also recently heard from Kelvin Long, who heads up the Initiative for Interstellar Studies, about a workshop to be held at City Tech, CUNY in New York from June 13-15. The group’s goal is “facilitating real progress on existing problems related to interstellar studies.” This year’s session is to have a propulsion focus, but according to the workshop’s web page, the focus will change with successive meetings as issues arise and concepts change.
Sponsored by the i4IS and the Center for Theoretical Physics (CTP) at City Tech, the workshop is intended as a small gathering with informal conversations and social interactions designed to promote discussion. The deadline for ‘extended abstracts’ is March 15, though this can be extended to the 25th. Early bird registration begins April 1, with regular registration beginning April 17. The advantage of early registration is a discounted fee for attendance ($200 per person); the fee goes up to $250 once regular registration begins.
Here is the group’s overview of the event:
At the start of this new millennium we are faced with one of the greatest challenges of our age Can we cross the vast distances of space to visit other worlds around other stars? At the end of the last century the idea of interstellar travel was considered one of science fiction. In recent times that has changed and interstellar flight has received much interest. This is particularly since the discovery of many planets outside of our Solar System around other stars. Indeed, we now know that an Earth sizes mass planet orbits one of our closest stars, Proxima b. In addition, national space agencies and private commercial industry are beginning to turn their attention to the planets and beyond. It is time to start considering the bold interstellar journey and how we might accomplish it. Yet, this challenge presents many difficult problems to solve and who better to address them than the global physics community.
The Institute For Interstellar Studies (I4IS) and the Center for Theoretical Physics (CTP) at City Tech have partnered to bring together some of the best minds in the fields of physics to address some of the fundamental problems associated with becoming an interstellar capable civilisation.
The first day of the workshop is devoted to ‘energetic reaction engines,’ i.e., engines that involve the ejection of matter or energy rearward from the vehicle to generate thrust. This could be electric, plasma, nuclear thermal, fission, fission-fragment, fusion, antimatter catalyzed fusion, antimatter. Day 2 focuses on sails and beamed energy via photons or particle beams, covering laser sails, microwave sails, particle beamers, stellar wind pushers. Day 3 is given over to breakthrough propulsion topics, “an area of technology development that seeks to explore and develop a deeper understanding of the nature of space-time, gravitation, inertial frames, quantum vacuum, and other fundamental physical phenomena.”
Harold ‘Sonny’ White is to chair day 3 of the workshop, with Kelvin Long taking day 1 and CUNY’s Roman Kezerashvili taking day 2. White’s presence will give the opportunity for those interested in his latest EmDrive work to learn and ask questions. I haven’t seen him since we ate cheeseburgers sitting around the swimming pool at the Dallas Starship Congress meeting some years back. I’ve enjoyed being at several conferences with Kelvin, and remember Roman Kezerashvili from the Aosta conference in Italy where I first met him. He’s a rigorous scholar and an engaging conversationalist. It will be interesting to see how this crew finalizes the lineup of presentations for the upcoming event.
Submissions to the workshop are open, and those accepted are to appear in the Journal of the British Interplanetary Society. On the nature of submissions, the group says this:
All submissions should be attempted solutions of existing problems, or at least a strong discussion on the pathway towards a solution. This is a working meeting and audience participation and discussion should be expected in any results. The rule for the workshop is “no solution, no presentation”. Some spaces will be reserved for ‘special observer status’ participation.
For further information on submission format, see Foundations of Interstellar Studies
Workshop at City Tech, CUNY.
Still cloudy here, but we got a gap earlier this evening, a persistent sucker hole right over Orion, and I got a whole 10 minutes of observing in. I was using the Bresser AR102S Comet Edition and for eyepieces the 20mm 70-degree that came with it, and my new 28mm RKE from Edmund.
Both eyepieces will just fit in the belt of Orion, with Alnitak and Mintaka in the last 5% or so of the field on either side. So the belt turns out to be a good test of edge characteristics. The 28mm RKE is way sharper at the edges, by the way. You might think that its 45-degree apparent field of view would feel positively claustrophobic after the 70-degree field of the Bresser eyepiece.
But it doesn’t, because of the magical floating stars effect. It’s real! It’s one of the most arresting things I have experienced in almost a decade of observing. As your eye gets closer to the eyepiece, you begin to be able to see the image. As you move in until you can see the entire field, the point where the eyepiece barrel disappears from view coincides exactly with the point where you are far enough to see the field stop of the eyepiece. If you hold up right there, you see the image created by the eyepiece floating in space, with a thin ring of unresolved darkness around it, which if you back out a bit will be the eyepiece barrel, and if you move in a bit will be the eyepiece field stop. In either case, the eye relief is great enough that you can still see the rest of the scope in your peripheral vision, past the thin ring of darkness at the edge of the field.
I have never, ever seen anything like this. It is exactly as cool and immersive as the legends have it. I can imagine building a whole observing kit consisting of this one eyepiece and a series of Barlows of various magnifications.
Anyway, if you have been on the fence about this eyepiece like I was, just get it. It’s amazing.
If you are anywhere near KnoxBUG’s meeting place (mid-Tennessee, US), Joe Maloney will be presenting on OpenRC and TrueOS, tomorrow night. See the link for address and times.
Karen Levy has an interesting new article critiquing blockchain-based “smart contracts.” The first part of her title, “Book-Smart, not Street-Smart,” sums up her point. Here’s a snippet:
Though smart contracts do have some features that might serve the goals of social justice and fairness, I suggest that they are based on a thin conception of what law does, and how it does it. Smart contracts focus on the technical form of contract to the exclusion of the social contexts within which contracts operate, and the complex ways in which people use them. In the real world, contractual obligations are enforced through all kinds of social mechanisms other than formal adjudication—and contracts serve many functions that are not explicitly legal in nature, or even designed to be formally enforced.
To review, “smart contracts” are a feature of some blockchain-based systems, which allow an interaction between multiple parties to be encoded as a set of rules which will be executed automatically by the system, so that neither the parties nor anyone else can prevent those rules from being enforced. There are lots of variations on the basic idea, which differ in aspects such as exactly what kind of code is used to program the rules, what kinds of actions can be expressed in a ruleset, and so on.
A simple example is an escrow arrangement, where Alice puts some money into escrow, and the money is released to Bob later if an arbiter Charlie determines that Bob performed some required action; otherwise the money returns to Alice. An escrow mechanism can be encoded as a “smart contract” so that once put into escrow the funds can only be disbursed to Alice or Bob, and only as specified by Charlie. Additional features, such as (say) splitting the money 50/50 between Alice and Bob if Charlie fails to act, can be built in. Indeed, the whole idea is that complicated rules can be encoded and then automatically executed with no dispute or appeal possible.
Karen’s argument, that contracts serve functions that are not merely legal, is correct–and that is one reason why “smart contracts” may not be street-smart. But in addition to failing to do the non-legal work that contracts do, “smart contracts” also fail to do much of the legal work that contracts do, because they don’t work in the same way as contracts.
To give just one example, a legal contract need not try to anticipate absolutely every relevant event that might occur. If some weird thing happens that is not envisioned in a regular legal contract, the parties can work out a modification to the contract that seems reasonable to them, and failing that, a judge might decide the outcome, subject to established legal principles. Similarly, a single error or “bug” in writing a regular contract, causing its literal meaning to differ from what the parties intended, is unlikely to lead to extreme results because the legal system will often resolve such a problem by trying to be reasonable.
Contrast this with “smart contracts” where a bug in a “contract’s” code can lead to a perverse result that may allow one party to exploit the bug, extracting much of the value out of the arrangement with no recourse for the other parties. That’s what happened with the DAO in Ethereum, leading to a controversial attempt to unwind a legal-according-to-the-rules set of transactions, and dividing the Ethereum community.
So if “smart contracts” may not be smart, and may not be contracts, what are they? It’s best to think of them not as contracts but as mechanisms. A mechanism is a sort of virtual machine that will do exactly what it is designed to do. Like an industrial machine, which can cause terrible damage if it’s not designed very carefully for safety or if it is used thoughtlessly, a mechanism can cause harm unless designed and used with great care. That said, in some circumstances a mechanism will be exactly what you need.
Discarding the term “smart contract” which promises too much in both respects–being sometimes not smart and sometimes unlike a contract–and instead thinking of these virtual objects as nothing more or less than mindless mechanisms is not only more accurate, but also more likely to lead to more prudent application of this powerful idea.
Last month, I had three (1, 2, 3) posts on how people are integrating their Google Calendars with Emacs. The common idea was to be able to see some or all of the calendar items in Emacs. Mike Zmansky’s solution goes further and allows you to move data in both directions so that you can add data to your Google Calendar from Emacs.
Even if you’re not a GCal user, you may be interested in
emacs-calfw. It can be configured for use with Org, Emacs diary, iCalendar (GCal, iCal, etc.), and howm.
These four solutions for integrating GCal show again how easily you can adapt Emacs to your workflow. And, of course, how you can spend most of your time in Emacs.
We don’t hear much about the Soviet program to explore and return samples of the moon to Earth, but the Russians were busy with lunar missions right from the start of the get-go. The first in a series of 24 flyby, lander and sample-return missions, dubbed the Luna Program, began with the Jan. 2, 1959 launch of Luna 1, a flyby mission and ended with Luna 24, sample return mission in August 1976. During Luna 1’s flight to the moon, it obtained new information about Earth’s Van Allen radiation belts, discovered that the moon had no magnetic field and that the sun’s “breath,” a.k.a. the solar wind, streamed through interplanetary space.
Luna 3, launched on Oct. 4, 1959, took and transmitted the first pictures ever taken of the unseen lunar farside. They showed a much more rugged landscape with few of the dark patches, called lunar seas, that make the distinctive face of the Man in the Moon on the familiar nearside. Later missions landed on the the surface and deployed rovers to explore and gather moon rocks and dust that were then launched from the moon and returned to Earth. All by machine — no human rock pickers as with the Apollo program.
The then-Soviet state launched three sample return missions between September 1970 and August 1976: Luna 16, 20 and 24. In each case, a drill was used to chew into the lunar regolith, the name given to the gritty lunar soil, and gather small rocks and dust in a tube. The sample was then placed in a small capsule and launched to Earth.
The first of the three sampling attempts gathered 3.5 ounces (101 grams) from a landing site in the Sea of Fertility; the second, one ounce (30 grams) from a different site in the same sea and the third, a sample of 6 ounces (170.1 grams) from the Sea of Crisis. All arrived safely back on Earth and were retrieved for study — a total of 10.5 ounces. In contrast, the Apollo astronauts’ haul came to 842 pounds (382 kg). Each year over 400 samples of these Gollumly-precious rocks are distributed to scientists across the globe for research.
Two of the Luna missions brought rovers — Lunokhod 1 and 2 — that trundled across the dusty terrain in 1970-71 and 1973, respectively. Lunokhod 1’s controllers drove the robot an astonishing 6.5 miles (10.5 km) and transmitted more than 20,000 TV pictures including 200 panoramas. During its ten and a half months of operation, it also conducted more than 500 lunar soil tests. Lunokhod 2 operated for about 4 months, covered 23 miles (37 km) of terrain including hilly upland areas and winding lunar crevasses called rills, and sent back 86 panoramic images and over 80,000 TV pictures.
By all accounts the Luna program was highly successful. Like the manned Apollo program, landers, rovers and equipment left their marks and presence on the moon’s surface. You’ve may have already seen photos taken from low orbit by LRO of each of the six Apollo landing sites that show descent modules, shiny reflections from equipment, rover tracks and even the winding paths made by the astronauts.
LRO has also photographed some of the Luna landers, rovers and their tracks, all of which will be nicely preserved for countless thousands of years. It’s fun to look back and see where we’ve been, and where we may be returning to very soon. Yes, it appears that the Trump administration has drawn up new priorities for NASA including a return to the moon in as little as three years! Read more about those plans here.
This is interesting:
The My Friend Cayla doll, which is manufactured by the US company Genesis Toys and distributed in Europe by Guildford-based Vivid Toy Group, allows children to access the internet via speech recognition software, and to control the toy via an app.
But Germany's Federal Network Agency announced this week that it classified Cayla as an "illegal espionage apparatus". As a result, retailers and owners could face fines if they continue to stock it or fail to permanently disable the doll's wireless connection.
Under German law it is illegal to manufacture, sell or possess surveillance devices disguised as another object.
I always say that I was a professional comedian for twelve years, but because I was clinging to the bottom few rungs of the showbiz ladder, and I was doing so in the American Northwest, really, I was more of a professional driver than an entertainer.
If someone offered me a job driving my own car, paying for my own fuel, going eight to twelve hours a day, four or five days in a row, usually with some obnoxious person I didn’t enjoy sitting in the passenger seat for $100 or so dollars a day, there’s no way I’d take it. But when I was in my twenties, if they added me doing my act in a bar when I arrived at my destination every night, I took the job and thanked them for the opportunity.
I was, in short, a moron.
On an unrelated note, The last panel was done as a favor for a reader who worked for a trucking company and hoped my comic would be good for the drivers’ morale. I don’t know if it worked, but they sent me a nice hat with the company logo on it, which I still have.
Note: we were just awarded this allocation on Jetstream for DIBSI. Huzzah!
Large datasets have become routine in biology. However, performing a computational analysis of a large dataset can be overwhelming, especially for novices. From June 18 to July 21, 2017 (30 days), the Lab for Data Intensive Biology will be running several different computational training events at the University of California, Davis for 100 people and 25 instructors. In addition, there will be a week-long instructor training in how to reuse our materials, and focused workshops, such as: GWAS for veterinary animals, shotgun environmental -omics, binder, non-model RNAseq, introduction to Python, and lesson development for undergraduates. The materials for the workshop were previously developed and tested by approximately 200 students on Amazon Web Services cloud compute services at Michigan State University's Kellogg Biological Station from 2010 and 2016, with support from the USDA and NIH. Materials are and will continue to be CC-BY, with scripts and associated code under BSD; the material will be adapted for Jetstream cloud usage and made available for future use.
Keywords: Sequencing, Bioinformatics, Training
Principal investigator: C. Titus Brown
Field of science: Genomics
We are requesting 100 m.medium instances with 6 cores, 16 GB RAM, and 130 GB VM space each for each instructor and student for 4 weeks. The total request is for 432,000 service units (6 cores * 24 hrs/day * 30 days * 100 people). To accommodate large size data files, an additional 100 GB of storage volumes are requested for each person. Persistent storage beyond the duration is not necessary for this training workshop.
These calculations are based on running the course for seven years with approximately 200 students total over the past six years on AWS cloud services.
Resources: IU/TACC (Jetstream)
A handful of readers have inquired as to the whereabouts of Microsoft‘s usual monthly patches for Windows and related software. Microsoft opted to delay releasing any updates until next month, even though there is a zero-day vulnerability in Windows going around. However, Adobe did push out updates this week as per usual to fix critical issues in its Flash Player software.
In a brief statement this week, Microsoft said it “discovered a last minute issue that could impact some customers” that was not resolved in time for Patch Tuesday, which normally falls on the second Tuesday of each month. In an update to that advisory posted on Wednesday, Microsoft said it would deliver February’s batch of patches as part of the next regularly-scheduled Patch Tuesday, which falls on March 14, 2017.
On Feb. 2, the CERT Coordination Center at Carnegie Mellon University warned that an unpatched bug in a core file-sharing component of Windows (SMB) could let attackers crash Windows 8.1, and Windows 10 systems, as well as server equivalents of those platforms. CERT warned that exploit code for the flaw was already available online.
The updates from Adobe fix at least 13 vulnerabilities in versions of Flash Player for Windows, Mac, ChromeOS and Linux systems. Adobe said it is not aware of any exploits in the wild for any of the 13 flaws fixed in this update.
The latest update brings Flash to v. 126.96.36.199. The update is rated “critical” for all OSes except Linux; critical flaws can be exploited to compromise a vulnerable system through no action on the part of the user, aside from perhaps browsing to a malicious or hacked Web site.
Flash has long been a risky program to leave plugged into the browser. If you have Flash installed, you should update, hobble or remove Flash as soon as possible. To see which version of Flash your browser may have installed, check out this page.
The smartest option is probably to ditch the program once and for all and significantly increase the security of your system in the process. An extremely powerful and buggy program that binds itself to the browser, Flash is a favorite target of attackers and malware. For some ideas about how to hobble or do without Flash (as well as slightly less radical solutions) check out A Month Without Adobe Flash Player.
If you choose to keep and update Flash, please do it today. The most recent versions of Flash should be available from the Flash home page. Windows users who browse the Web with anything other than Internet Explorer may need to apply this patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).
Chrome and IE should auto-install the latest Flash version on browser restart (users may need to manually check for updates and/or restart the browser to get the latest Flash version). Chrome users may need to restart the browser to install or automatically download the latest version. When in doubt, click the vertical three dot icon to the right of the URL bar, select “Help,” then “About Chrome”: If there is an update available, Chrome should install it then.
Organic molecules — those made primarily of carbon, hydrogen, and oxygen atoms — are essential for life as we know it. Carbon is the coolest, most special atom of all. Not only can it link in multiple ways to other atoms, but it happily links with itself to form incredibly complex molecules, the kind that make proteins and bodies possible. And while organic compounds alone don’t necessarily mean a living thing, finding them in meteorites, Mars, Titan and now on the dwarf planet Ceres, gives us hope that all the necessary ingredients for life were readily available to the young Earth at the dawn of the solar system.
Scientists at NASA’s Dawn mission recently announced finding evidence for organic material on Ceres, a dwarf planet and the largest body in the main asteroid belt between Mars and Jupiter. They used the spacecraft’s visible and infrared mapping spectrometer (VIR), an instrument that detect the “fingerprints” of materials by studying the light they reflect from the sun, to find carbon-containing compounds around the northern-hemisphere crater called Ernutet.
The discovery, the first on a main asteroid belt object, adds to the growing list of bodies in the solar system where organics have been found. Ceres resembles the group of space rocks called carbonaceous chondrites which are rich in water and organics, strengthening the connection between the dwarf planets and these dark, crumbly meteorites we occasionally find here on Earth. This
Previously, scientists had identified carbonates (which form in water), water ice and clays on Ceres as well as evidence of heat in the formation of the dwarf planet’s tallest mountain, Ahuna Mons, a likely volcano made of oozing mud. Salts and sodium carbonate, such as those found in the bright areas of Occator Crater, are also thought to have been carried to the surface by liquid.
The organic materials on Ceres are mainly located in an area covering approximately 400 square miles (about 1,000 square kilometers). The new-found organic materials cover about 400 square miles (~1,000 sq. km) and spread across the floor of Ernutet, its southern rim and an area just outside the crater to the southwest. Organics also were found in a very small area in Inamahari Crater, about 250 miles (400 km) away from Ernutet. Scientists could not say exactly what kind of organic material Dawn picked up, just that it looked like a variety that have straight chains of carbon atoms instead of being arranged in rings.
Dawn is now in a stretched-out elliptical orbit at Ceres, going from an altitude of 4,670 miles (7,520 km) up to almost 5,810 miles (9,350 km). On Feb. 23, it will make its way to a new altitude of around 12,400 miles (20,000 km), about the height of GPS satellites above Earth, and to a different orbital plane. This will put the probe in a position to study Ceres from a completely new perspective. Who knows what we’ll find?
I use Evernote to keep copies of resources that I think may disappear over time and I’m pretty happy with it. Recently, they’ve introduced a new fee structure and there’s been some grumbling about finding another platform. As I say, I’m happy with them for now but if you’re looking for a way to migrate off Evernote and you’re an Org mode user, Karl Voit tells us one way to do it
— Karl Voit (@n0v0id) February 13, 2017
Everorg was written by Mario Martelli to migrate his Evernote data to Org mode because of the new pricing policy. It appears to be pretty complete" class="wp-smiley" style="height: 1em; max-height: 1em;" />see the README" class="wp-smiley" style="height: 1em; max-height: 1em;" />but if you have special needs you may have to do part of the migration by hand.
Again, I’m happy with Evernote for the time being so I haven’t used EverOrg but if you’re looking for a migration solution EverOrg is the best I’ve seen.
It’s Lazy Reading Science week!
This story started a few nights ago. I had been monkeying around with the AR102S, both at its native aperture and stopped down, and I decided to see how it compared to the C80ED. In particular, I wanted to compare the rich-field views of both scopes (such as they are here – I was observing from the driveway after all), so I was looking at the belt and sword of Orion. The results of that comparo were not very surprising – with it’s wider aperture and shorter focal length, the AR102S goes significantly wider and brighter, but the longer focal ratio and low-dispersion glass of the C80ED produce a better-corrected image.
What was not only surprising, but actively alarming, was that at low power I was getting ugly star images in the C80ED. Even in the center of the field, stars were not focusing down to nice little round points, but to crosses and shapes like flying geese. I wondered if my diagonal might have gotten banged up, so I swapped diagonals. The problem persisted. The scope will not reach focus without a diagonal or extension tube, and I don’t have an extension tube, so I couldn’t try straight-through viewing. Still, it was exceptionally unlikely that both of my good diagonals got horked in the same way.
I didn’t know what to make of that. I figured maybe the scope had gotten out of collimation somehow, and I was pondering whether to mess with it. It’s always been optically excellent and mechanically solid (overbuilt, in fact), and I was loathe to take it apart (as opposed to the TravelScope 70 and SkyScanner 100, both of which were crying out for disassembly).
Then a few days later I ran across this thread on CN, in which a guy was having the same problem I had. It sounded like it was more likely astigmatism (aka the Stig) in the eyes than in the telescope. Apparently it’s worse at low powers where the exit pupil is large, which makes sense – astigmatism is caused by having corneas that are out of round (football-shaped rather than basket-ball shaped), but as the exit pupils get smaller, the less of the cornea is involved in vision, and the more likely it is that the ‘active’ portion will approximate a radially even curvature.
One commenter recommended making a little diaphragm between thumb and forefinger to stop down the exit pupil. I tried that, but it was awfully difficult to hold my finger and my eye all steady and in alignment. Then I had the idea of using a collimation cap from one of my reflectors. That stopped down the exit pupil to a 1mm circle, which made the image d-i-m, but the star images cleaned right up. Then I took away the collimation cap and tried the view with and without glasses, and the glasses also cleaned up the star images.
It wasn’t the scope, it was me. I have astigmatism, and it’s bad enough that stars look ugly at low power unless I wear glasses.
On one hand, that’s a big relief, because the C80ED scope has always been a rock-solid performer. Along with the Apex 127, it’s my reference standard for good optics. I was feeling a bit queasy at the thought that it might have gotten out of whack.
On the other hand, I now need to prioritize eye relief in my eyepiece collection. I have a bunch that are too tight to show the whole field when I’m wearing glasses. So I have some decisions to make.
That was the first major discovery of the night.
The second was that the AR102S can take 2″ eyepieces with the most minor tinkering. The 2″-to-1.25″ adapter at the top of the AR102S focuser drawtube screws right off. I had been worried that it might be permanently affixed, but when I tried turning it, it spun with remarkable ease. Once I had it off, I dropped in the 32mm Astro-Tech Titan, which is my only 2″ eyepiece, and the views were pretty darned good. Way wider than with any of my 1.25″ eyepieces, and pretty clean as well, although I need to a little more head-to-head testing on that score. Possibly the star images looked good because they were so small at only 14x.
In any case, the 32mm Titan gives a significant boost in true field, from 3.6 degrees in the 32mm Plossl and 24mm ES68, to a whopping 4.88 degrees.
I don’t think there would be any advantage in going wider, at least in the AR102S. Astronomics seems to be out of Titans, but the equivalent 70-degree EPs are available through Bresser and Agena. The next step up would be a 35mm or 38mm, giving 13x and 12x, but those would push the exit pupil to 7.7mm and 8.5mm, and that’s just wasted light. At least in the AR102S – in the C80ED, longer 70-degree eyepieces would yield the following:
Focal length / magnification / exit pupil / true field
Either of those would be a good step up from the 3.7-degree max field that the 32mm Titan gives in the C80ED, without pushing the exit pupil uselessly wide.
Anyway, I’m just noodling now. The big news is that the C80ED is fine, I need to prioritize long eye relief in future EP purchases (and maybe thin the herd a bit?) so I can observe with glasses on, and the AR102S can take 2″ EPs after all.
The emergence and proliferation of Internet of Things (IoT) devices on industrial, enterprise, and home networks brings with it unprecedented risk. The potential magnitude of this risk was made concrete in October 2016, when insecure Internet-connected cameras launched a distributed denial of service (DDoS) attack on Dyn, a provider of DNS service for many large online service providers (e.g., Twitter, Reddit). Although this incident caused large-scale disruption, it is noteworthy that the attack involved only a few hundred thousand endpoints and a traffic rate of about 1.2 terabits per second. With predictions of upwards of a billion IoT devices within the next five to ten years, the risk of similar, yet much larger attacks, is imminent.
The Growing Risks of Insecure IoT Devices
One of the biggest contributors to the risk of future attack is the fact that many IoT devices have long-standing, widely known software vulnerabilities that make them vulnerable to exploit and control by remote attackers. Worse yet, the vendors of these IoT devices often have provenance in the hardware industry, but they may lack expertise or resources in software development and systems security. As a result, IoT device manufacturers may ship devices that are extremely difficult, if not practically impossible, to secure. The large number of insecure IoT devices connected to the Internet poses unprecedented risks to consumer privacy, as well as threats to the underlying physical infrastructure and the global Internet at large:
The large magnitude and broad scope of these risks implore us to seek solutions that will improve infrastructure resilience in the face of Internet-connected devices that are extremely difficult to secure. A central question in this problem area concerns the responsibility that each stakeholder in this ecosystem should bear, and the respective roles of technology and regulation (whether via industry self-regulation or otherwise) in securing both the Internet and associated physical infrastructure against these increased risks.
Risk Mitigation and Management
One possible lever for either government or self-regulation is the IoT device manufacturers. One possibility, for example, might be a device certification program for manufacturers that could attest to adherence to best common practice for device and software security. A well-known (and oft-used) analogy is the UL certification process for electrical devices and appliances.
Despite its conceptual appeal, however, a certification approach poses several practical challenges. One challenge is outlining and prescribing best common practices in the first place, particularly due to the rate at which technology (and attacks) progress. Any specific set of prescriptions runs the risk of falling out of date as technology advances; similarly, certification can readily devolve into a checklist of attributes that vendors satisfy, without necessarily adhering to the process by which these devices are secured over time. As daunting as challenges of specifying a certification program may seem, enforcing adherence to a certification program may prove even more challenging. Specifically, consumers may not appreciate the value of certification, particularly if meeting the requirements of certification increases the cost of a device. This concern may be particularly acute for consumer IoT, where consumers may not bear the direct costs of connecting insecure devices to their home networks.
The consumer is another stakeholder who could be incentivized to improve the security of the devices that they connect to their networks (in addition to more effectively securing the networks to which they connect these devices). As the entity who purchases and ultimately connects IoT devices to the network, the consumer appears well-situated to ensure the security of the IoT devices on their respective networks. Unfortunately, the picture is a bit more nuanced. First, consumers typically lack either the aptitude or interest (or both!) to secure either their own networks or the devices that they connect to them. Home broadband Internet access users have generally proved to be poor at applying software updates in a timely fashion, for example, and have been equally delinquent in securing their home networks. Even skilled network administrators regularly face network misconfigurations, attacks, and data breaches. Second, in many cases, users may lack the incentives to ensure that their devices are secure. In the case of the Mirai botnet, for example, consumers did not directly face the brunt of the attack; rather, the ultimate victims of the attack were DNS service providers and, indirectly, online service providers such as Twitter. To the first order, consumers suffered little direct consequence as a result of insecure devices on their networks.
Consumers’ misaligned incentives suggest several possible courses of action. One approach might involve placing some responsibility or liability on consumers for the devices that they connect to the network, in the same way that a citizen might be fined for other transgressions that have externalities (e.g., fines for noise or environmental pollution). Alternatively, Internet service providers (or another entity) might offer users a credit for purchasing and connecting only devices that it pass certification; another variation of this approach might require users to purchase ”Internet insurance” from their Internet service providers that could help offset the cost of future attacks. Consumers might receive credits or lower premiums based on the risk associated with their behavior (i.e., their software update practices, results from security audits of devices that they connect to the network).
A third stakeholder to consider is the Internet service provider (ISP), who provides Internet connectivity to the consumer. The ISP has considerable incentives to ensure that the devices that its customer connects to the network are secure: insecure devices increase the presence of attack traffic and may ultimately degrade Internet service or performance for the rest of the ISPs’ customers. From a technical perspective, the ISP is also in a uniquely effective position to detect and squelch attack traffic coming from IoT devices. Yet, relying on the ISP alone to protect the network against insecure IoT devices is fraught with non-technical complications. Specifically, while the ISP could technically defend against an attack by disconnecting or firewalling consumer devices that are launching attacks, such an approach will certainly result in increased complaints and technical support calls from customers, who connect devices to the network and simply expect them to work. Second, many of the technical capabilities that an ISP might have at its disposal (e.g., the ability to identify attack traffic coming from a specific device) introduce serious privacy concerns. For example, being able to alert a customer to (say) a compromised baby monitor requires the ISP to know (and document) that a consumer has such a device in the first place.
Ultimately, managing the increased risks associated with insecure IoT devices may require action from all three stakeholders. Some of the salient questions will concern how the risks can be best balanced against the higher operational costs that will be associated with improving security, as well as who will ultimately bear these responsibilities and costs.
Improving Infrastructure Resilience
In addition to improving defenses against the insecure devices themselves, it is also critical to determine how to better build resilience into the underlying Internet infrastructure to cope with these attacks. If one views the occasional IoT-based attack inevitable to some degree, one major concern is ensuring that the Internet Infrastructure (and the associated cyberphysical infrastructure) remains both secure and available in the face of attack. In the case of the Mirai attack on Dyn, for example, the severity of the attack was exacerbated by the fact that many online services depended on the infrastructure that was attacked. Computer scientists and Internet engineers should be thinking about technologies that can both potentially decouple these underlying dependencies and ensure that the infrastructure itself remains secure even in the event that regulatory or legal levers fail to prevent every attack. One possibility that we are exploring, for example, is the role that an automated home network firewall could play in (1) help- ing users keep better inventory of connected IoT devices; (2) providing users both visibility into and control over the traffic flows that these devices send.
Improving the resilience of the Internet and cyberphysical infrastructure in the face of insecure IoT devices will require a combination of technical and regulatory mechanisms. Engineers and regulators will need to work together to improve security and privacy of the Internet of Things. Engineers must continue to advance the state of the art in technologies ranging from lightweight encryption to statistical network anomaly detection to help reduce risk; similarly, engineers must design the network to improve resilience in the face of the increased risk of attack. On the other hand, realizing these advances in deployment will require the appropriate alignment of incentives, so that the parties that introduce risks are more aligned with those who bear the costs of the resulting attacks.
This week, our “Americans at Work” photo essay features photographs of millennial freelancers living in Los Angeles made by photographer Jessica Chou:
“A full-time job with one employer has been the norm for decades, but in recent years, the gig economy has steadily grown. A study by Intuit predicts that by 2020, 40 percent of the American workforce will be independent contractors. This project explores the everyday lives of young people in Los Angeles working in short-term, temporary positions as freelancers.
To explore the motivations and better understand the circumstances, I photographed people in their 20s and 30s from different cultural and educational backgrounds working on-demand. While individual paths to the gig economy are as unique as the people themselves, the decisions are typically driven by a two factors — the chance to pursue one’s passion or the necessity to make ends meet. In some cases, it can be a combination of both. I’ve found that once they have found this autonomy, the 9- to-5 work life seems less and less attractive.
The gig economy offers a unique opportunity for people looking for purpose in their work. There is the freedom to manage one’s own time, room to explore different work methods to better suit one’s personality, and the ability to provide meaningful contributions to one’s community. There is also the satisfaction through the ownership of the work — the process of investing time and effort results in the building of one’s own business.
On the downside, workers who are full-time independent contractors have little to no social safety nets. Independent contractors assume all risks, so getting sick means losing income. Additionally, all the responsibilities of running a business, like branding, marketing and bookkeeping, are now the sole responsibility of the individual. And with little financial stability, making decisions about the future becomes more difficult.
The gig economy seems to reflect people’s changing values and ideas about priorities in life and work. While greater personal freedom can result in income instability, it also provides an opportunity to shape one’s life in a more profound way. As Mai-Tam Nguyen, a pastry chef from said, ‘Even if you can make a lot of money, if you are not happy, what is the point?’”
Lots of storage this week.
Look what came in the mail today.
Something small, in a gold box.
An eyepiece wrapped in paper, and a rubber eyeguard.
And here they are.
That is a big honkin’ eye lens. And that’s why I got this eyepiece. The 28mm RKE from Edmund is legendary for its “floating stars” effect where the big eye lens, the sharply raked barrel, and the long eye relief combine to create the impression that the eyepiece has disappeared and the image is simply floating in space. I’ve never experienced this, because I’ve never gotten to look through one of these before. But the reputation of this eyepiece, illustrated by several glowing threads on Cloudy Nights (like the ones that follow), was enough to convince me to take the plunge:
It didn’t come with a case, so I made my own out of an old prescription pill bottle. A little bubble wrap stuffed in the bottom and taped inside the lid, and I’ve got a nice padded case for free.
And I need that case, because the new gear curse is in full effect. How does this eyepiece work in practice? No idea yet – with any luck, I might find out next Wednesday, when the clouds are finally supposed to part. I’ll keep you posted.
A charismatic populist president wanted to boost manufacturing and create jobs. She told companies, 'if you want to sell your stuff here, you have to build it here.' This is what happened.
(Image credit: David Paul Morris/Bloomberg via Getty Images)
Are you on DragonFly-master? Are you using a Realtek network device? Sepherosa Ziehau has an update he would like you to test.
It’s been a remarkable week for cyber justice. On Thursday, a Ukrainian man who hatched a plan in 2013 to send heroin to my home and then call the cops when the drugs arrived was sentenced to 41 months in prison for unrelated cybercrime charges. Separately, a 19-year-old American who admitted to being part of a hacker group that sent a heavily-armed police force to my home in 2013 was sentenced to three years probation.
Sergey Vovnenko, a.k.a. “Fly,” “Flycracker” and “MUXACC1,” pleaded guilty last year to aggravated identity theft and conspiracy to commit wire fraud. Prosecutors said Vovnenko operated a network of more than 13,000 hacked computers, using them to harvest credit card numbers and other sensitive information.
When I first became acquainted with Vovnenko in 2013, I knew him only by his many hacker names, including “Fly” and “Flycracker,” among others. At the time, Fly was the administrator of the fraud forum “thecc[dot]bz,” an exclusive and closely guarded Russian language board dedicated to financial fraud and identity theft.
After I secretly gained access to his forum, I learned he’d hatched a plot to have heroin sent to my home and to have one of his forum lackeys call the police when the drugs arrived.
I explained this whole ordeal in great detail in 2015, when Vovnenko initially was extradited from Italy to face charges here in the United States. In short, the antics didn’t end when I foiled his plot to get me arrested for drug possession, and those antics likely contributed to his arrest and to this guilty plea.
Vovnenko contested his extradition from Italy, and in so doing spent roughly 15 months in arguably Italy’s worst prison. During that time, he seemed to have turned his life around, sending me postcards at Christmas time and even an apparently heartfelt apology letter.
On Thursday, a judge in New Jersey sentenced Vovnenko to 41 months in prison, three years of supervised released and ordered him to pay restitution of $83,368.
Separately, a judge in Washington, D.C. handed down a sentence of three year’s probation to Eric Taylor, a hacker probably better known by his handle “Cosmo the God.”
Taylor was among several men involved in making a false report to my local police department at the time about a supposed hostage situation at our Virginia home. In response, a heavily-armed police force surrounded my home and put me in handcuffs at gunpoint before the police realized it was all a dangerous hoax known as “swatting.”
CosmoTheGod rocketed to Internet infamy in 2013 when he and a number of other hackers set up the Web site exposed[dot]su, which “doxed” dozens of public officials and celebrities by publishing the address, Social Security numbers and other personal information on the former First Lady Michelle Obama, the then-director of the FBI and the U.S. attorney general, among others. The group also swatted many of the people they doxed.Taylor and his co-conspirators were able to dox so many celebrities and public officials because they hacked a Russian identity theft service called ssndob[dot]ru. That service in turn relied upon compromised user accounts at data broker giant LexisNexis to pull personal and financial data on millions of Americans.
At least two other young men connected to the exposed[dot]su conspiracy have already been sentenced to prison.
Among them was Mir Islam, a 22-year-old Brooklyn man who was sentenced last year to two years in prison for doxing and swatting, and for cyberstalking a young woman whom he also admitted to swatting. Because he served almost a year of detention prior to his sentencing, Islam was only expected to spend roughly a year in prison, although it appears he was released before even serving the entire year.
Hours after his sentencing, Taylor reached out to KrebsOnSecurity via Facetime to apologize for his actions. Taylor, a California native, said he is trying to turn his life around, and that he has even started his own cybersecurity consultancy.
“I live in New York City now, have a baby on the way and am really trying to get my shit together finally,” Taylor said.
If Taylor’s physical appearance is any indication, he is indeed turning over a new leaf. At the time he was involved in publishing exposed[dot]su, the six-foot, seven-inch CosmoTheGod was easily a hundred pounds heavier than he is now.
Unfortunately, not everyone in Taylor’s former crew is making changes for the better. According to Taylor, his former co-conspirator Islam was recently re-arrested after allegedly cyberstalking Taylor’s girlfriend. That stalking claim could not be independently confirmed, however court documents show that Islam was indeed re-arrested and incarcerated last month in New York.
xʷməθkʷəy̓əm (Musqueam) (February 15, 2017) – The Union of B.C. Indian Chiefs, the B.C. Civil Liberties Association, the Canadian Feminist Alliance for International Action and Justice for Girls responded this morning to the report of the Public Interest Investigation regarding RCMP policing in northern British Columbia.
The investigation was launched in 2013 by the Civilian Review and Complaints Commission for the RCMP, and responded to allegations in the 2013 report of Human Rights Watch “Those Who Take Us Away: Abusive Policing and Failures in Protection of Indigenous Women and Girls in Northern British Columbia”, and the BCCLA’s 2011 report “Small Town Justice: A Report on the the RCMP in northern and rural British Columbia”.
Grand Chief Stewart Phillip stated: “This investigation has revealed serious failures on the part of RCMP members and supervisors, across northern BC, including huge problems in the way that the RCMP deal with investigations of missing persons including women and girls. We are deeply disappointed that this report completely avoids any examination of allegations of systemic racism against Indigenous people by the police in northern British Columbia. This is a tragic fact of life that First Nations people have to live with every day, many of whom have their rights violated by police repeatedly. The Human Rights Watch report that prompted this investigation made scathing allegations of racism, neglect and mistreatment by police towards Indigenous women and girls in particular, and this investigation has failed to deal with these issues that are gripping our communities and that create a lack of trust between our communities and the police. If the complaints commission, and the RCMP itself, genuinely want to improve relationships with First Nations people, there is a great deal more work to do. The recommendations in this report, while they may help to improve some police practices, will not fix the massive problem of systemic racism that our people experience daily and have had to endure ever since the RCMP started policing our lands and peoples.”
Farida Deif, Canada Director of Human Rights Watch stated: “While the Commission’s investigation confirms many of the policing problems Human Rights Watch documented, the report falls short in addressing policing failures in Indigenous communities. Indigenous women and girls told us that the RCMP frequently blamed them for the abuse they suffered, shamed them over alcohol or substance use, or threatened to arrest them for trying to protect themselves from domestic violence. But the Commission’s report only ‘found room for improvement’ in the RCMP’s response to domestic violence, ignoring widespread evidence of systemic racism and sexism. While Human Rights Watch documented serious allegations of abusive policing, including excessive use of force against girls, strip searches by male officers, and physical and sexual abuse, the Commission claims that it could not find evidence of ‘systemic misconduct by RCMP members in northern British Columbia.’ Given the serious policing shortcomings the Commission highlighted, including failures to properly document missing persons investigations or appropriately conduct body and strip searches, this raises serious questions about the Commission’s threshold for systemic misconduct. The report is an important first step, but the Commission’s new office in British Columbia should not shy away from tackling systemic problems with the RCMP’s policing of Indigenous communities head on.”
Annabel Webb of Justice for Girls stated: “The report is a clear and detailed indictment of RCMP policing in Northern B.C., echoing what many of us have been pointing to for years. It is unfortunate, however that the Commission didn’t address the underlying reasons for these policing failures and abuses—systemic racism and sexism within the RCMP that defines their colonial relationship with Indigenous women and girls. Let’s not forget that a key impetus for this report was the courageous testimony of Indigenous girls and women exposing serious abuses and failures of the RCMP in Northern B.C.. When the report talks about unjustified and undocumented strip searches and use of force, or failures to properly respond to domestic violence and missing persons reports, I think of the many Indigenous teenage girls I spoke to in the North who suffered those indignities and abuses by police, but had no way to hold the RCMP accountable.”
Josh Paterson, executive director of the BC Civil Liberties Association, stated: “The RCMP’s routine failure to meet even the most basic administrative and procedural requirements is highly discrediting and calls for urgent attention. This report confirms that the RCMP in northern BC has failed to adequately record reasons for using force, failed to properly document missing persons investigations, failed to deal appropriately with personal searches and strip searches and failed to ensure that domestic violence response is done appropriately. The RCMP needs to work hard to respond to the disturbing findings in this report, and we hope the investigation’s findings and recommendations will help them to do that. At the same time, this report says almost nothing about the issue of systemic racism. While the report mentions that it heard some allegations about discrimination, it is troubling that the Commission did not investigate those allegations or make any conclusions. Now that the Commission has established full-time investigators here in British Columbia, partly in response to these findings, we expect it to devote serious attention to systemic racism and discriminatory treatment by the RCMP and to follow up to ensure that the RCMP fixes the serious problems that this investigation has confirmed.”
Shelagh Day, Chair, Human Rights Committee, Canadian Feminist Alliance for International Action, stated: “The report is damning; it confirms the failures in policing identified by Human Rights Watch and the Inter-American Commission on Human Rights. However, the report does not name the discrimination, racism and sexism that lies at the root of these failures. It is the hope of the Canadian Feminist Alliance for International Action (FAFIA) that the National Inquiry on Missing and Murdered Indigenous Women and Girls will pick up where this report leaves off. Superintendent Paulson’s assurances that policing failures will be put right is not enough.”
The post RCMP Northern BC Policing Investigation: First Nations and Human Rights Groups React appeared first on BC Civil Liberties Association.
Makha Bucha Day in Thailand, an overflowing dam in California, the Yanshui Beehive Rockets Festival in Taiwan, alpacas in Siberia, Beyonce at the Grammys, Carnival in Venice, protests in Romania and France, and much more.
What kind of civilization might eventually emerge on Mars? Colonies of various kinds have been examined in science fiction for decades, but as we close in on the possibility of actual human arrival on the planet, perhaps in the 2030s, we can wonder how living on a different world will change the people who eventually choose to call it home. The prolific Nick Nielsen likes to take the long view, arguing in the essay below that while there are contrasting definitions of civilization itself, we may yet learn through experiment and experience how a ‘central project’ emerging from local conditions may define the future of colonies on other worlds. Human history offers guidance, but it may be that a successful Martian colony will see its position as a gateway to the exploration of the Solar System. You can follow Nick on his Grand Strategy: The View from Oregon site, as well as his Grand Strategy Annex.
by J. N. Nielsen
Suppose that one or several planned large-scale missions to Mars come to fruition over the next few decades. Perhaps the first mission or missions are temporary scientific visits that endure a few weeks or months and then Mars is left vacant again. Even if it is only a handful of individuals temporarily on Mars for a few weeks or a few month of exploration, the camaraderie unique to these early Mars missions will be the first intimation of a distinctively Martian social milieu.
Beyond the transient exploration of a scientific mission, the vision of several Mars mission planners includes settlement, and these plans, if realized, will mean that eventually there will be large numbers of human beings living and working on Mars. We may see a patchwork of multiple settlements and multiple temporary scientific missions, existing side-by-side, each pursuing their own ends in their own ways. Some of the early explorers may chose to return and to remain, their lives having been touched and irrevocably changed by their initial encounter with the Red Planet.
In the case of an ongoing human presence, the numbers of human settlers will grow, eventually also they will become self-supporting and self-sustaining. Whether or not they formally declare their independence, they will be independent for all practical purposes. Given these eventualities, at some point we will need to recognize that an independent and distinctive Martian civilization exists. At what point in its development would we recognize a Martian civilization? What will be the character of this civilization?
Image: A lone explorer on Mars by Italian digital artist Alberto Vangelista.
In the classic science fiction film Forbidden Planet there is a striking scene early in the film in which two characters discuss the color of the sky, and one says, “I think a man could get used to this and grow to love it.” Will Martian settlers get used to the red skies of Mars and grow to love it?
Whether or not they love the red skies of the Red Planet, these red skies will be a fact of life on Mars no less than the red sands under foot. These Martian facts of life will collectively shape a distinctive Martian perspective, and a Martian civilization will grow out of a uniquely and distinctively Martian perspective. In What will it be like to be a Martian? I have already discussed that there will be something that it is like to be a Martian (borrowing from Thomas Nagel’s famous formulation that there is something that it is like to be a bat ), and in The Martian Standpoint (and Addendum on the Martian Standpoint) I discussed the emergence of a distinctively Martian perspective.
This perspective will be marked by properties in common with terrestrial civilization (such as being human) as well as properties not shared with terrestrial civilization (living life under a red sky, being able to pick out Earth in the night sky, having to wear a pressure suit outside, and so on). Most of that which is in common with terrestrial life will pass unnoticed, but the differences will be prominent in the minds of Martian settlers precisely because the differences will stand out against the background of unnoticed similarity.
Mars itself, its gravity, its weather, its seasons, the length of its day and coolness of the sun in the sky, as well as the adaptations that the settlers will have to make in order to live on Mars, will become selection pressures that will shape the social life of these communities. An individual human being who experiences what it is like to be a Martian, and who, as a consequence of living on Mars, has a Martian perspective, will be an individual participating in a community, all of whom are experiencing what it is like to be a Martian and to have a Martian perspective. Pride in being first on Mars will be mixed with equal parts homesickness, and, just so, every aspect of human moral psychology will find itself tested by the tension between old and new. From this dialectic will emerge an outlook unique to Mars, the Martian perspective, and this Martian perspective will inform all aspects of social life, from the most intimate introspection to the most public debates on what kind of society the Martians should build for themselves.
As the Martians go about building the economic infrastructure of Martian civilization, an intellectual superstructure will come into being in parallel with the built environment, and infrastructure and superstructure will be inseparably joined by the central project of Martian civilization, which at first will simply be the attempt to build a self-sustaining and self-supporting human presence on Mars.  What form the central project of Martian civilization will take after this initial goal is achieved cannot now be known. Martian society will be sufficiently small that it could be comprehensively motivated and unified by a central project, and the population of Mars will be sufficiently self-selected for scientific acumen and practical ability that whatever central project naturally grows out of the combined exertions of this population is likely to be as distinctive as the self-selected conquistadors who came to South America and the self-selected Puritans who came to North America.
Civilization on Earth has already passed through many stages of development, and it is at least arguable that at least some terrestrial civilizations have reached maturity, but a nascent civilization on Mars, while an heir to these mature traditions of terrestrial civilization, would be an entirely novel enterprise. The Martian civilization will be a new civilization, and as a new civilization it will begin its social development at its inception; it will not be a mature civilization of long-established institutions, but a tentative experimentation in institution building and in ways of life possible on Mars.
When a civilization originates in a given historical epoch, that historical epoch is expressed in that civilization, so that the civilization of classical antiquity expressed the world of the ancient Mediterranean Basin and the civilization of medieval Islam expressed the world of seventh century Arabia and the civilization of the industrial revolution expressed Enlightenment era northern Europe. Martian civilization, coming into being in the twenty-first civilization, would emerge from a radically different social context than any of these previous civilizations, and so it would express a radically different world than civilizations of the past. Martian civilization, then, could be a new civilization in more than one sense. It would also be a civilization de novo.
Image: Workshop of Filippe Maëcht and Hans Taye. Constantine Directing the Building of Constantinople. 1623-1625. Wool, silk, gold and silver. 484 × 480 cm (190.6 × 189 in). Philadelphia.
For quite some time I have been planning to write about the possibility of what I call de novo civilization, i.e., civilizations that are newly constituted, but are distinct from those civilizations with which civilization began on Earth. The earliest civilizations in the world—the West Asian Cluster (Anatolia, Mesopotamia, Egypt, etc.), Mesoamerican, Peruvian, Chinese, and Indian civilizations, at a minimum—were all de novo civilizations, originating as something entirely new in the history of the planet. These original civilizations might be called “founder” civilizations, as they were the founders of all civilizations to subsequently follow.
Descended from these “founder” civilizations were a greater or lesser number of subsequent civilizations—depending upon the principles we adopt to individuate and therefore count civilizations—that were derived from the founder civilizations through descent with modification, through idea diffusion, through allopatric speciation, and so on. By identifying de novo civilizations as new civilizations distinct from this small, finite class of founder civilizations, I am suggesting that a new civilization can come into being through a new foundation (or a re-foundation) of some existing civilization. What particularly interests me most are those civilizations that “suddenly” come into being as the result of some relatively rapid historical change. Martian civilization would be such a de novo civilization arising from a new foundation.
The best example I can offer of de novo civilization is that of Byzantium. The Byzantine Empire is typically identified as becoming a distinct entity sometime between Constantine’s foundation of Constantinople (on the site of the earlier Greek city of Byzantium) in 330 and the reign of Justinian during the sixth century AD. Constantine spared no expense in furnishing his new Christian capital city, endowing it with art and sculpture essentially looted from other much older cities. An urban proletariat was even imported to populate the new metropolis. Eventually Greek speaking, and eventually Orthodox in its Christianity, Constantinople and the distinctive Byzantine civilization over which the city presided had inherited the traditions of Roman civilization, and as the city grew in size and influence there was no “breakdown” of trade or communication that isolated the region. When the last legal emperor of the western Roman Empire, Romulus Augustulus, surrendered control of Rome to the barbarian king Odoacer, the imperial insignia were sent to Constantinople for safekeeping. Thus Byzantium, still in touch with its parent civilization, nevertheless speciated and became its own distinctive civilization, different from Rome even while continuing to self-identify as Roman.
So it will be, I think, with Martian civilization, which will become its own distinctive civilization even while continuing to self-identify with essential elements of terrestrial civilization. The selection pressures upon terrestrial and Martian civilization will be so markedly different that the speciation of Martian civilization from its parent terrestrial civilization is nearly inevitable, although there will be ongoing commerce, communication, and conflict between Earth and Mars. Martian civilization will emerge as a de novo civilization even in the absence of a rupture between Earth and Mars; the transfer of some portion of terrestrial civilization to a human population on Mars will be sufficient for a new foundation of civilization, even if this is not what is intended.
Image: Prehistorian V. Gordon Childe at Skara Brae, Orkney.
One of the most influential accounts of the origin of civilization is that of V. Gordon Childe, and, ironically, it was not explicitly cast as an account of civilization, but rather of the “urban revolution,” i.e., the origin of cities.  There is a vast literature on Childe’s “urban revolution” and it has become a commonplace among archaeologists, especially those archaeologists formulating theories about the origins of civilization, to employ Childe’s ten criteria for the urban revolution as a definition of civilization: something is a civilization if it possesses most of the items on Childe’s list.  Subsequent prehistorians have tinkered and tampered with Childe’s model, but for the most part it remains intact and continues to influence archaeological thought about civilization even today.
While Childe does not himself assert that the properties he identifies as characterizing the urban revolution constitute a definition of civilization, he may as well have said so, as this is the lesson that has been taken from the paper. In so far as “urban revolution” implies the revolutionary appearance of many cities, the lesson is justified. A rough characterization of civilization could be a network of cities actively engaged in cooperation and conflict with each other.  We see this pattern clearly in Mesopotamia, in Mesoamerica, in the Indus Valley, and will probably find it wherever civilization independently emerges.
Following this example, when there are a network of settlements on Mars actively engaged in cooperation and conflict with each other (as in the suggestion above that Mars may be a patchwork of settlements both temporary and permanent), we could at that point identify a Martian civilization. As Martian civilization grows, it will unify itself as a planetary civilization, all of which evolves under the uniform physical selection pressures of the planet, just as terrestrial civilization has evolved under the uniform selection pressures of Earth. On Mars, communication between regions of the planet will be nearly instantaneous, as is communication on Earth today, and the immediate neighborhood of Mars, its satellites and space stations, will also be a part of this instantaneous communications network. Mars will have its own internet, which will presumably be updated on a regular basis, much like a backup system where Mars and Earth each back up the other. Martian social media will be dominated by “Martian issues” just as terrestrial social media will be dominated by terrestrial issues.
Image: Mars may come to be the origin of a spacefaring civilization. (Mars from the Moon Phobos by Jack Coggins, 1951).
A planet is a natural unit for civilization, which I have expressed elsewhere by saying that planetary civilization is the natural teleology of civilization.  Beyond the scope of a planetary civilization communication will experience relativistic delays that become longer the more distant the parties to the communication. There will be communication between Mars and Earth, of course, but of a stilted and somewhat awkward variety, as there will be trade, probably a trickle of luxury goods (rather than staples) as once slowly moved along the Silk Road tenuously connecting the ancient east to the ancient west. Communication and commerce, however, will underscore rather than unify the natural planetary units of Earth and Mars. Exactly what is communicated and what is traded (as well as what is not communicated and what is not traded) will define a system of meanings and values, and these systems will be different on Earth and Mars. 
We can always formulate a more comprehensive conception of civilization that includes both terrestrial civilization and Martian civilization—presumably this more comprehensive conception will be “human civilization” as this conception will of necessity be based on those properties shared in common between terrestrial and Martian civilization—much as we can today speak of a planetary civilization that encompasses the many regional civilizations that have grown together as human transportation, communication, and commerce networks have come to integrate the planet entire. Perhaps this more comprehensive conception of civilization could also be called a de novo civilization. With planetary civilization converging on totality, the next stage of emergence in large-scale social organization will be the interaction of these distinct planetary civilizations—the civilizations of Earth, Mars, the moon, and elsewhere, including clusters of artificial habitats.
The expanding scope of large-scale social organization, from a network of cities involved in cooperation and conflict to a network of planets involved in cooperation and conflict and eventually a network of planetary systems engaged in cooperation and conflict, define stages in the development of a cosmological civilization. The civilization that we may yet build within our own solar system will be a model in miniature of an interstellar civilization in which it is a network of planetary systems engaged in cooperation and conflict that defines large-scale social organization. In this context, the different between terrestrial and Martian civilization may become significant.
In the settlement of the New World it is interesting to note the difference between those regions settled directly by European peoples and those regions settled not from the Old World, but from earlier settlements. Thus while New England was settled by Puritans from England, the Carolinas were settled by Caribbean planters.  Sugar cane was such a lucrative crop that every scrap of available ground on the Caribbean islands was planted in sugar cane plantations, but these plantations in turn needed to be supplied with foodstuffs and building materials, and so the Carolinas were settled in order to produce the sustenance and material goods required by the export-oriented monoculture of sugar plantations in the Caribbean.  The cultural differences between these regions persists to the present day, and is likely to continue to persist into the foreseeable future.
It would be reasonable to expect that a similar pattern will reveal itself in the settlement of the solar system, with some colonies being established directly from Earth, while other colonies may be established by Martian and Lunar settlements, once these latter have reached a sufficient state of development that they can mount outward colonization efforts themselves.  In this way, the characteristic differences between terrestrial and Martian civilization will be perpetuated throughout the solar system, and perhaps even throughout the galaxy, and may persist long after any rivalry between Earth and Mars is politically relevant.
But will it ultimately be terrestrial or Martian civilization that leaves the greatest imprint on the universe? The fact that Martians will have already made the leap from Earth to Mars, representing the first spacefaring diaspora, and the likely disproportionate scientific and technological knowledge and expertise in the Martian population to come, will predispose Martians to a central project for their civilization based on spacefaring. Once the Martians have assured their survival and independence, the solar system will be at their doorstep. Mars is the perfect base for a spacefaring civilization, with the lower gravity making the construction of a space elevator easier than on Earth, and being positioned close to the asteroid belt Thus even if a scientific and spacefaring civiization does not fully emerge on Earth, social conditions on Mars may be more favorable to such a development.
 Thomas Nagel, “What is it like to be a bat?” The Philosophical Review, LXXXIII, 4 (October 1974): 435-50.
 I sometimes define civilization as an economic infrastructure joined to an intellectual superstructure by a central project. I regard this formulation as tentative. Mass societies may be too large and too diverse to be defined by a single central project, so a mass society may have several central projects, but no single, dominant project—or it may have no central project at all. Prior to the advent of mass society, regional civilizations (not yet having converged on planetary scale) were almost always strongly marked by a central project, which almost always was soteriological or eschatological in nature.
 V. Gordon Childe, “The Urban Revolution,” The Town Planning Review, Vol. 21, No. 1 (Apr., 1950), pp. 3-17. (Careful observers of the Indiana Jones films will notice that the archaeologist protagonist of the films cites V. Gordon Childe.)
 In brief, Childe’s list includes, 1) extent and density of settlements, 2) division of labor, i.e., craft specialization, 3) surplus value transferred to social elites (which might also be called “capital accumulation”), 4) monumental architecture, 5) social stratification, 6) writing, 7) science, 8) art, 9) trade, and 10) prioritizing residence over kinship. I briefly touched on Childe’s conception of civilization in terms of the urban revolution in my talk at the 2015 Starship Congress, “What kinds of civilizations build starships?” in which I also gave an exposition of my understanding of economic infrastructure and intellectual superstructure (cf. note ).
 Above in note  I said that I sometimes define civilization as an economic infrastructure joined to an intellectual superstructure by a central project; I also sometimes define a civilization as a network of cities bound by relationships of cooperation and conflict. I regard all of these formulations as tentative; the definitive definition of civilization has yet to be formulated. The definition of civilization in terms of a network of cities is obviously a practical characterization that could be established by means of archaeology; a definition of civilization as a central project linking infrastructure and superstructure is much more abstract, and for the same reason it is much more likely to be adaptable to unforeseen developments in the future.
 The assertion that planetary civilization is the natural teleology of civilization may be true for only one historical stage in the development of civilization (I explored this idea in Counterfactual Suboptimal Civilizations of Planetary Endemism and Addendum on Civilizational Optimality). It could be argued that the natural extent of a civilization grows over time, so that the earliest manifestation is a city-state with a surrounding region, then an empire, then a regional civilization, then a planetary civilization, then a system-wide civilization, and so on.
 These systems of meanings and values constitute part of the intellectual superstructure.
 Similarly, in South America Chile was settled for purposes of supply rather than monoculture export.
 New England also came to rely on export-oriented monoculture, but of tobacco rather than sugar, especially the “tobacco colonies” of the Chesapeake Bay region. While Caribbean islands were not large enough both to produce sugar for export and to produce their own food, there was sufficient land in New England for both export and staple crops.
 It is to be expected that most if not all of the earliest settlement enterprises will be financial failures, if historical analogy holds: “Many early colonial adventures—like Cartier’s voyages, the Panfilo de Narvaez expedition, and Raleigh’s Guiana and Roanoke projects—were characterized by gigantic losses. By the end of the 1620s every single English colonial company had failed both financially and organizationally, and every single early French trading company had been dissolved; by 1674, the Dutch West Indies Company had gone bankrupt for the first of two times.” (A Companion to the Literatures of Colonial America, edited by Susan Castillo and Ivy Schweitzer, p. 64)
When the first close range photos of Rosetta’s Comet started coming in, a few of us joked it looked just like one of those rubber ducks we played with as kids in the bathtub. Only this duck was made of porous ice and dust and 2.5 miles (4 km) wide, though I suspect it would float if you had a tub big enough. Now, new radar images have bagged yet another duck.
The recent close flyby of another mouthful of a comet, 45P/Honda-Mrkos-Pajdusakova, provided a not-to-be-missed opportunity to bounce radio waves off its nucleus and study the returning echoes to create close up if shadowy images. While asteroids routinely pass near Earth — there are millions of them in the neighborhood — close approaches of comets are relatively rare.
That’s why astronomers fired up the giant, 1,000-wide radio dish at the Arecibo Observatory in Puerto Rico and began pinging it with radio waves starting on the Feb. 12 and continuing right through to today, the 17th. This is only the 7th comet to have its portrait taken with radar.
After sending their Valentine’s Day card, astronomers were very happy with the comet’s response. In the animation, comprised of 13 images made during 2 hours of observation on Feb. 12, we see a peanut-shape or twin-lobed body that resembles the rubber ducky comet 67P. We also learned that the nucleus or heart of the comet measures 0.8 mile (1.3 km) across and rotates about once every 7.6 hours. Go to work at 8 and about the time you wrap up for the day, 45P has made one complete spin. If you watch and re-watch the animation, you can make out bright spots and rugged textures in places that indicate erosion by vaporization.
A comet loses material everything they approach the sun as water and carbon dioxide (dry ice) vaporizes directly into space both from its surface and from pits that release heated and pent up gases from below the surface. The gas carries along dust and the dust creates the big fuzzy glow around the nucleus called the coma. Sunlight both energizes gas and physically pushes the dust behind the comet to create the two basic types of comet tushes: the gas or ion tail and the familiar dust tail.
Astronomers have shown through close-up study of 67P/C-G that twin-lobed comets form when two smaller comets collide at low speed and become welded together to form a single larger one. They found that rock terraces and layers of exposed material in cliffs on each lobe of 67P were inclined in opposite directions, indicating two separate objects that long ago fused into one.
For more about 45P and how to see with your telescope, please see my earlier write-up.
** If you’d like to know more about comets and the meteors and meteor showers that come from them, pick up a copy of my recently published book, Night Sky with the Naked Eye, at Amazon or Barnes and Noble. It covers lots of different night sights — no equipment needed!
Verizon's Data Brief Digest 2017 describes an attack against an unnamed university by attackers who hacked a variety of IoT devices and had them spam network targets and slow them down:
Analysis of the university firewall identified over 5,000 devices making hundreds of Domain Name Service (DNS) look-ups every 15 minutes, slowing the institution's entire network and restricting access to the majority of internet services.
In this instance, all of the DNS requests were attempting to look up seafood restaurants -- and it wasn't because thousands of students all had an overwhelming urge to eat fish -- but because devices on the network had been instructed to repeatedly carry out this request.
"We identified that this was coming from their IoT network, their vending machines and their light sensors were actually looking for seafood domains; 5,000 discreet systems and they were nearly all in the IoT infrastructure," says Laurance Dine, managing principal of investigative response at Verizon.
The actual Verizon document doesn't appear to be available online yet, but there is an advance version that only discusses the incident above, available here.
Duqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security features is that it stays resident in its host's memory without ever writing persistent files to the system's drives. Now, this same technique is being used by criminals:
Now, fileless malware is going mainstream, as financially motivated criminal hackers mimic their nation-sponsored counterparts. According to research Kaspersky Lab plans to publish Wednesday, networks belonging to at least 140 banks and other enterprises have been infected by malware that relies on the same in-memory design to remain nearly invisible. Because infections are so hard to spot, the actual number is likely much higher. Another trait that makes the infections hard to detect is the use of legitimate and widely used system administrative and security tools -- including PowerShell, Metasploit, and Mimikatz -- to inject the malware into computer memory.
The researchers first discovered the malware late last year, when a bank's security team found a copy of Meterpreter -- an in-memory component of Metasploit -- residing inside the physical memory of a Microsoft domain controller. After conducting a forensic analysis, the researchers found that the Meterpreter code was downloaded and injected into memory using PowerShell commands. The infected machine also used Microsoft's NETSH networking tool to transport data to attacker-controlled servers. To obtain the administrative privileges necessary to do these things, the attackers also relied on Mimikatz. To reduce the evidence left in logs or hard drives, the attackers stashed the PowerShell commands into the Windows registry.
|Lt. Robert Carl, USN (Acting)||1950||1950|
|Maj. Oval Jones, USAF||1950||1952|
|LCdr. Arthur Conant, USN||1952||1953|
|Maj. Robert Morin, USAF||1953||1955|
|Maj. Ralph Barch, USA||1955||1958|
|LCol. Robert Maurer, USA||1958||1960|
|Donna Marie Barbano||2008||2011|
Battleship was a great game. It was fun, simple, portable, and inexpensive. Then they improved it.
I remember the first time I saw “Electronic Battleship.” The game board was a big, bulky, and heavy, and programming it to play a game was more challenging than the game itself.
On a more positive note, to this day, when trying to psyche myself up for things, I will still mutter “Eye of the tiger. Hungry like the wolf. Walk like an Egyptian.”
This week’s BSDNow has notes about the FOSDEM BSD Devroom, and a triple-shot of Brian Cantrill – all three interviews with him. If you’ve been watching BSDNow for a very long time, you may have seen one or several of them, but this is one long replay of all the interviews of an opinionated and lively speaker. (The first interview’s original episode is titled “Ubuntu Slaughters Kittens” for a reason.)
Reuters photographer Christinne Muschi recently spent time at the end of a small country road in Hemmingford, Quebec, that dead-ends at the U.S.-Canada border, just across from another dead-end road near Champlain, New York. She was photographing refugees, traveling alone or in small groups, who had taken taxis to the end of the road in the U.S., then walked across the border into Canada, into the custody of the RCMP. While the location is not an official border crossing, it is one of several spots that have become informal gateways to an increasing number of refugees choosing to leave the United States. Muschi reports that “in Quebec, 1,280 refugee claimants irregularly entered between April 2016 and January 2017, triple the previous year's total.” and that “the Canada Border Services Agency said in January that 452 people made a refugee claim at Quebec land border crossings.” Canadian advocacy groups say they are preparing for even more asylum-seekers, following increased anti-Muslim rhetoric in the U.S., and public expressions of welcome made by Canadian Prime Minister Justin Trudeau.