Warning: Invalid argument supplied for foreach() in /hermes/bosoraweb175/b2542/ipw.ratcliffeblog/public_html/wp-content/plugins/wordpress-flickr-manager/FlickrManager.php on line 457
Category Archives: Technic
Reading with interest about the Sandia National Labs’ Z machine, an electromagnetic fusion reaction generator, if it every works. More than a decade behind schedule, the project is the least heavily funded of the various fusion projects in the U.S. and Europe. Someone will make fusion work, and it will be a tremendous step forward toward sustainability. Check out how the Z uses a ring of supermagnets and tuned laser burst to compress and, hopefully ignite, a fusion reaction. It’s simplistic in its design, essentially a containment field. Let’s hope we keep funding this kind of small project instead of defaulting to one big bang approach to fusion. It will yield more results we can learn from.
There’s a discussion the VRM project mailing list (home page here), hosted by Doc Searls and Harvard University that suggests that the erosion of personal privacy may have been planned by our government or, at least, the National Security Agency. Of course it was planned. Here’s my response to the list:
Agreed, the fingerprint reader doesn’t require nightmare scenarios involving severed fingers to justify outrage. The simple fact is that a thief could walk up to you on the street and point a gun at you, demanding that you unlock your phone. That’s a variation on the kidnapping-for-ATM-access scheme that is used in some U.S. cities and many cities in the developing world as the most convenient way to kidnap someone. The fingerprint reader simply makes that easier to do. It’s not a new threat to privacy as much as evidence of the continuing consolidation of the destruction of privacy we’ve allowed to happen.
Point of information, since I broke the original Clipper Chip story (learn more) for MacWEEK (a day before the Times): The NSA had several concurrent efforts to intrude on public crypto standards in the early 90s. They had established an advisory role with NIST (National Institute of Standards and Technology) in the late 80s with the plan of driving backdoors into all potential public crypto standards. It wasn’t a fallback strategy after Clipper was outed for its NSA backdoor, but part of a campaign on many fronts that was largely ignored by public policy people and despite complaints from privacy advocates, who do not all wear tin hats.
At the same time as Clipper, NSA was imposing its advice on NIST for the MD-5 message-digest hash algorithm that is used to generate 128-bit keys, which opened the door to what we are living with today. The NYT’s John Markoff and I both reported that, too, though our publications’ archives don’t seem to be accessible for free access. National cryptography policy has resided in the armed forces for far too long, to the point where it is negatively impacting U.S. technical competitiveness. This does not happen by accident; it was planned and abetted by both political parties.
I think it is well past time to refer to privacy advocates as shouting cranks. It trivializes legitimate citizen concern and, because of the intrusion into public communication, marginalizes consumer complaints. Customers have been waving companies like Apple and Microsoft off supporting Fort Meade for years. But these companies, both of which resisted NSA suggestions that they compromise their security in the 1990s, have continually heard their privacy-concerned customers described as cranks and edge-cases. We eroded our own privacy and sacrificed the economic power in personal information willingly.
We got here by not being activist enough, not by being too crazy to make the case that our security in the knowledge that we speak in private in our homes and papers is a 21st Century human necessity, and certainly a U.S. necessity.
Amazon Cloud Drive: Learn More. Click the link and consult the pricing table at the bottom of the page. Go ahead, I will wait. All future media purchased from Amazon will be stored free on the service, but it is the migration costs I’m looking at here.
Cloud Drive is “free” — that is you can store 5 GB of music, about 1,000 songs or 20 minutes worth of HD video before paying for additional storage. I looked up what it would cost to store my 1.6TB iTunes library: $1,600 a year.
My Zune library files, both the music I’ve purchased and the albums I listen to, are stored and accessible as part of the music subscription service.
If I were to embrace Cloud Drive as my media storage service, I’d be adding about $1,900 a year to my media costs in order to migrate my current collection to the Amazon service.
The everywhere-access of cloud storage is a great user experience, but not if you have to count storage costs by increments of hundreds of dollars a year. Amazon needs to assess the value of a heavy media buyer over their lifetime and recognize that zero-cost migration is the price they will pay to get a shot at a new customer in in this environment.
Reading this article, you’d get the impression that a 10-million times increase in radiation could possibly be bad for you. Radiation in reactor’s building tests 10 million times above normal – CNN.com.
This exponentially dwindling amount of radiation means, according to Nishiyama, that it’s unlikely that sealife — and, several steps down the line, humans who might eat once contaminated seafood — will suffer greatly from the iodine-134 exposure.
Exponentially dwindling radiation levels mean that the radiation level started exponentially above normal radiation levels.
“Fry me to the moon,” is the lyric that comes to mind.
Here is a test of an iPad blogging tool, BlogPress. And it seems to work pretty well. Would like to be able to link my Bit.ly account to the posting sent to Twitter.