Quotulatiousness

August 17, 2013

Delays in India’s submarine program

Filed under: India, Military, Technology — Tags: , , , — Nicholas @ 10:21

In the Times of India, Rajat Pandit reviews the state of the Indian Navy’s submarine fleet:

Is India’s aging fleet of conventional submarines threatening to go the MiG-21 way? The Tejas light combat aircraft (LCA), already 30 years in the making, was slated to replace the obsolete MiG-21 in the 1990s but is still at least two years away from becoming fully-operational.

Similarly, the Navy too was to induct 12 new diesel-electric submarines by last year, with another dozen to follow in the 2012-2030 timeframe. This was the 30-year submarine building plan approved by the Cabinet Committee on Security (CCS) way back in July, 1999. But the Navy has not inducted even one of the 24 planned submarines till now, and is forced to soldier on with just 14 aging conventional vessels.

“The Navy is steadily modernizing in the surface warship and aircraft arenas. But our aging and depleting underwater combat arm is a big worry. But it also must be kept in mind that INS Sindhurakshak‘s accident is the first such incident we have had in over four decades of operating submarines,” said a senior officer.

Sources said INS Sindhurakshak, after Wednesday’s accident, is “a clear write-off”. Of the 13 submarines left now, as many as 11 are over 20 years old. The setback comes when China and Pakistan are systematically bolstering their underwater combat capabilities, with the former being armed with over 55 submarines.

Update: MarineLink reports on the investigation into the INS Sindhurakshak explosion.

The Indian Navy diving teams have been working nonstop to reach into the compartments of the submarine since rescue operations commenced early noon of August 14. The boiling waters inside the submarine prevented any entry until noon that day. Access to the inner compartments of the submarine was made almost impossible due to jammed doors and hatches, distorted ladders, oily and muddy waters inside the submerged submarine resulting in total darkness and nil visibility within the submarine even with high power underwater lamps. Distorted and twisted metal within very restricted space due extensive internal damage caused by the explosion further worsened conditions for the divers. This resulted in very slow and labored progress. Only one diver could work at a time to clear the path to gain access. After 36 hours of continuous diving effort in these conditions, Navy divers have finally reached the second compartment behind the conning tower in the early hours of August 16.

Three bodies have been located and extricated from the submarine from this compartment. The bodies are severely disfigured and not identifiable due to severe burns. The bodies have been sent to INHS Asvini, the naval hospital, for possible DNA identification which is likely to take some more time.

The state of these two bodies and conditions within the submarine leads to firm conclusion that finding any surviving personnel within the submarine is unlikely.

Fracking and the environment

Filed under: Environment, Media, Technology — Tags: , , , , — Nicholas @ 09:03

Matt Ridley debunks five common myths about environmental issues with fracking:

The movie Gasland showed a case of entirely natural gas contamination of water and the director knew it, but he still pretended it might have been caused by fracking. Ernest Moniz, the US Energy Secretary, said earlier this month: “I still have not seen any evidence of fracking per se contaminating groundwater.” Tens of thousands of wells drilled, two million fracking operations completed and not a single proven case of groundwater contamination. Not one. It may happen one day, of course, but there’s few industries that can claim a pollution record that good.

Next comes the claim that shale gas production results in more methane release to the atmosphere and hence could be as bad for climate change as coal. (Methane is a more powerful greenhouse gas than carbon dioxide, but stays in the atmosphere for a shorter time and its concentration is not currently rising fast.) This claim originated with a Cornell biology professor with an axe to grind. Study after study has refuted it. As a team from Massachusetts Institute of Technology put it: “It is incorrect to suggest that shale gas-related hydraulic fracturing has substantially altered the overall [greenhouse gas] intensity of natural gas production.”

Third comes the claim that fracking uses too much water. The Guardian carried a report this week implying that a town in Texas is running dry because of the water used for fracking. Yet in Texas 1% of water use is for fracking, in the United States as a whole 0.3% — less than is used by golf courses. If parts of Texas run out of water, blame farming, by far the biggest user.

Fourth, the ever-so-neutral BBC in a background briefing this week described fracking as releasing “hundreds of chemicals” into the rock. Out by an order of magnitude, Auntie. Fracking fluid is 99.51% water and sand. In the remaining 0.49% there are just 13 chemicals, all of which can be found in your kitchen, garage or bathroom: citric acid (lemon juice), hydrochloric acid (swimming pools), glutaraldehyde (disinfectant), guar (ice cream), dimethylformamide (plastics), isopropanol (deodorant), borate (hand soap); ammonium persulphate (hair dye); potassium chloride (intravenous drips), sodium carbonate (detergent), ethylene glycol (de-icer), ammonium bisulphite (cosmetics), petroleum distillate (cosmetics).

As for earthquakes, Durham University’s definitive survey of all induced earthquakes over many decades concluded that “almost all of the resultant seismic activity [from fracking] was on such a small scale that only geoscientists would be able to detect it” and that mining, geothermal activity or reservoir water storage causes more and bigger tremors.

(more…)

August 14, 2013

The “Indie Web” is the very definition of a fringe project

Filed under: Media, Technology — Tags: , , , , , — Nicholas @ 08:55

Wired‘s Klint Finley wants you to meet the indie hackers who want to jailbreak the internet (among other things):

One guy is wearing his Google Glass. Another showed up in an HTML5 t-shirt. And then there’s the dude who looks like the Mad Hatter, decked out in a top hat with an enormous white flower tucked into the brim.

At first, they look like any other gaggle of tech geeks. But then you notice that one of them is Ward Cunningham, the man who invented the wiki, the tech that underpins Wikipedia. And there’s Kevin Marks, the former vice president of web services at British Telecom. Oh, and don’t miss Brad Fitzpatrick, creator of the seminal blogging site LiveJournal and, more recently, a coder who works in the engine room of Google’s online empire.

Packed into a small conference room, this rag-tag band of software developers has an outsized digital pedigree, and they have a mission to match. They hope to jailbreak the internet.

They call it the Indie Web movement, an effort to create a web that’s not so dependent on tech giants like Facebook, Twitter, and, yes, Google — a web that belongs not to one individual or one company, but to everyone. “I don’t trust myself,” says Fitzpatrick. “And I don’t trust companies.” The movement grew out of an egalitarian online project launched by Fitzpatrick, before he made the move to Google. And over the past few years, it has roped in about 100 other coders from around the world.

August 13, 2013

Apple – dead fruit walking, says Larry Ellison

Filed under: Business, Technology — Tags: , , — Nicholas @ 10:27

At The Register, Jasper Hamill reports on the latest oracular pronunciamento from Larry Ellison:

Oracle supremo Larry Ellison has told Apple that it doesn’t stand a chance of success without Steve Jobs at the helm.

In an interview with CBS, the multibillionaire performed a bizarre dance routine meant to illustrate what chance Apple has in the post-Jobs era. Just like the oracles of old, Ellison’s predictions take a bit of interpretation.

The Oracle was asked what he thought of Jobs, to which he replied: “He was brilliant, he was our Edison, he was our Picasso. He was an incredible inventor.”

But then came a question about how the fruity firm is likely to fare without their godhead on the throne.

“Well, we already know,” Ellison said, before embarking upon a simple piece of interpretive dance to illustrate his thoughts.

Blacksoft or Microberry … will Microsoft scoop up Blackberry?

Filed under: Business, Cancon, Technology — Tags: , , , , — Nicholas @ 10:21

In Maclean’s, Peter Nowak wonders why Microsoft hasn’t already purchased Blackberry:

The logic is pretty solid. Android and Apple have run away with the smartphone market, with the Canadian company clutching at a distant and declining third-place slice. The latest numbers say the company has indeed lost that spot to Microsoft and its Windows Phone.

That’s not cause for any excitement — these are low, single-digit scraps we’re talking about. Android and Apple have about 80 and 13 per cent of the market, respectively. (As an aside, it’s funny how those numbers are starting to look like the historical division between Windows and Mac computers, huh?)

So what’s the fastest and easiest way for a company to make its anemic market share bigger? It doesn’t take a mathematician to figure out the answer: combine it with somebody else’s equally anemic share into something with a little more meat on its bones. Putting BlackBerry and Microsoft’s Windows phones together would amount to almost seven-per-cent share. That’s still small, but it’s almost within striking distance of Apple.

More importantly, Microsoft — through an acquisition — would eliminate its biggest obstacle. In some countries, especially Canada. BlackBerry still enjoys decent success as the de facto third brand that buyers gravitate to because they’re loyal and/or hate Android and Apple. By most accounts, Windows Phone sales are extra anemic to non-existent in these markets as a result.

August 12, 2013

Online privacy and habitual oversharing

Filed under: Liberty, Media, Technology — Tags: , , , , — Nicholas @ 09:47

Cory Doctorow explains why so many of us have gotten into the habit of oversharing personal details in our social media activities:

Whenever government surveillance is debated, someone inevitably points out that it is no cause for alarm, since people already overshare sensitive personal information on Facebook. This means there’s hardly anything to be gleaned from state surveillance that isn’t already there for the taking on social media.

It’s true people overshare on social networks, providing information in ways that they later come to regret. The consequences of oversharing range widely, from losing a job to being outed for your sexual orientation. If you live in a dictatorship, intercepted social media sessions can be used by those in charge to compile enemies lists, determining whom to arrest, whom to torture, and – potentially – whom to murder.

The key reason for oversharing is that cause and effect are separated by volumes of time and space, so understanding the consequences can be difficult. Imagine practising penalty kicks by kicking the ball and then turning around before it lands; two years later, someone visits you and tells you where your kicks ended up. This is the kind of feedback loop we contend with when it comes to our privacy disclosures.

In other words, you may make a million small and large disclosures on different services, with different limits on your sharing preferences, and many years later, you lose your job. Or your marriage. Or maybe your life, if you’re unlucky enough to have your Facebook scraped by a despot who has you in his dominion.

August 10, 2013

3D printing using durable materials

Filed under: Technology — Tags: , , — Nicholas @ 09:32

At TechHive, Kevin Lee reports on a different kind of 3D printing effort:

I sat on a 3D-printed bench.

“Durability” and “strength” are about the last words I would ever associate with 3D printing. But I’m not talking about the small, plastic trinkets you would print out with your MakerBot. This is Emerging Objects, a small fabrication studio in Oakland, CA that’s researching how to 3D-print using materials like wood, ceramic, newspaper, concrete, and salt.

Some 3D-printed art pieces made from newspaper, salt, and maple wood.

Some 3D-printed art pieces made from newspaper, salt, and maple wood.

“Everyone is focusing on machines, and we’re interested in what machines can make,” Emerging Objects co-founder Ronald Rael explained to TechHive. “We saw a limitation in what a machine can make because of the medium, and so we wondered if we could reformulate that media to suit our own architectural agendas to print big.”

As with the report last week about the chap 3D-printing his own Aston Martin replica, the small size of the individual printed units is a bottleneck for producing larger objects. Using a 3D printer to produce key components while using ordinary production methods for larger pieces is the economical way to work right now. That is bound to change as the technology improves, but practical limits on size and cost will continue at the “consumer” end of the 3D printer market.

According to Rael, powder-based 3D printing was one of the very first 3D printing technologies to come into being. It hasn’t really caught on, however, because the machines are so much more expensive than other types of 3D printers. On the other hand, the fused deposition modeling (FDM) method, which lays down thin layers of hot extruded plastic to create objects, has become popular among makers thanks to its accessibility and relative affordability.

All that said, Rael still sees a promising future for powder-based 3D printing.

“We have a [powder] printing technology that I think is very open-ended in terms of the kind of materials that can be in it. Then we have [a FDM] one that’s very closed and that’s the much more popular version,” he explained. “While I like those kinds of printers, […] I think the big future is in store for powder printing.”

August 9, 2013

The cult of Apple

Filed under: Business, Media, Religion, Technology — Tags: , , — Nicholas @ 08:24

In Wired, Brett T. Robinson talks about the similarities of the “Apple cult” to religious beliefs:

Technology ads provide parables and proverbs for navigating the complexities of the new technological order. They instruct the consumer on how to live the “good life” in the technological age.

Like all advertising, Apple’s ads perform a vital educational function in consumer society. The advertisements are allegorical, rhetorical attempts to domesticate foreign and abstract concepts, making them accessible and attractive to everyday adherents.

In fact, they resemble medieval morality plays in their personification of good (Mac) and evil (PC). As such, the ads contain a moral — or, more explicitly, they propose a morality customized for the conditions of the age.

Media technology has acquired a moral status because it has become part of the natural order of things. Luddites, those who have sworn off new technologies, are the new heretics and illiterates. Technology is an absolute. There is no turning back or imagining a different social order. Challenge is acceptable as long as it remains within the confines of the technological order. Apple may challenge Microsoft. Samsung may challenge Apple. But the order must not be challenged.

The impact of digital culture, then, is epistemic; it insinuates a moral system based on its own internal logic.

[…]

In the Apple story, the brand cult began offline, with users meeting in real, physical locations to swap programs and ideas. Now, the Apple community is more diffuse, concentrated in online discussion groups and support forums. However, Apple product launches and conferences remain sacred pilgrimages where Apple fans can congregate, camp, and live together for days at a time to revel in the communal joy of witnessing the transcendent moment of the new product launch.

The reverence once reserved for holy relics and liturgy has reemerged in the technology subculture. The shared experience of living in a highly technological era provides a universal ground for a pluralistic society. There may be many different devices, but only one Internet.

Technology has become the new taken-for-granted order that requires our fidelity. Obedience to the new order is expressed in the communication rituals that take place every day in the use of computers, music players, and smartphones — devices that bind individuals together. From the farthest satellite to the nearest cellphone, the mystical body of electricity connects us all. Personal technology has become “the very atmosphere and medium” through which we mediate our daily lives.

Locking the (electronic) barn door

Filed under: Law, Media, Technology — Tags: , , , — Nicholas @ 08:03

The encrypted email service that was reportedly used by Edward Snowden just announced that it will be shutting down:

Today, Lavabit announced that it would shut down its encrypted email service rather than “become complicit in crimes against the American people.” Lavabit did not say what it had been asked to do, only that it was legally prohibited from sharing the events leading to its decision.

Lavabit was an email provider, apparently used by Edward Snowden along with other privacy sensitive users, with an avowed mission to offer an “e-mail service that never sacrifices privacy for profits” and promised to “only release private information if legally compelled by the courts in accordance with the United States Constitution.” It backed up this claim by encrypting all emails on Lavabit servers such that Lavabit did not have the ability to access a user’s email (Lavabit’s white paper), at least without that user’s passphrase, which the email provider did not store.

Given the impressive powers of the government to obtain emails and records from service providers, both with and without legal authority, it is encouraging to see service providers take steps to limit their ability to access user data, as Lavabit had done.

[…]

Lavabit’s post indicates that there was a gag order, and that there is an ongoing appeal before the Fourth Circuit. We call on the government and the courts to unseal enough of the docket to allow, at a minimum, the public to know the legal authority asserted, both for the gag and the substance, and give Lavabit the breathing room to participate in the vibrant and critical public debates on the extent of email privacy in an age of warrantless bulk surveillance by the NSA.

August 8, 2013

A home-made Gauss gun

Filed under: Technology, Weapons — Tags: , , — Nicholas @ 08:14

It may not be the most functional weapon in the world, but it does show that there might be a niche for this kind of development:

While it may only be able to shoot a few cans right now, we certainly wouldn’t want to be in front of [Jason]‘s fully automatic Gauss gun capable of firing 15 steel bolts from its magazine in less than two seconds.

The bolts are fired from the gun with a linear motor. [Jason] is using eight coils along the length of his barrel, each one controlled by an IGBT. These are powered by two 22 Volt 3600mAh LiPo battery packs.

As for the mechanical portion of the build, the bolts fired from this gun are actually 6.5mm nails, cut off and sharpened. These are chambered from a spring-loaded magazine, with each new bolt put into the breech with a small solenoid retracting for an instant.

August 4, 2013

Bruce Schneier talks about security and trust

Filed under: Business, Media, Technology — Tags: , , , — Nicholas @ 12:07

Published on 19 Jun 2013

Human society runs on trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Making sure those defectors don’t destroy the cooperative systems they’re abusing is an age-old problem, one that we’ve solved through morals and ethics, laws, and all sort of security technologies. Understanding how these all work — and fail — is essential to understanding the problems we face in today’s increasingly technological and interconnected world.

Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a “security guru,” he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier.

H/T to AVC for the link.

August 1, 2013

Stereotypes of pornography consumers

Filed under: Britain, Media, Technology — Tags: , , , — Nicholas @ 13:05

James Delingpole had far too much fun writing this column:

You may be aware that David Cameron — as part of a secret, Lynton Crosby-inspired operation codenamed Suck Up Shamelessly To The Embittered Authoritarian Killjoy Harpies At Mumsnet — has decreed that as from next year the default option when you sign a contract with your new internet provider will be ‘No porn in this household, thank you. I think it’s a disgrace.’

Superficially (and does this coalition ever think any other way?) I can see this makes a lot of sense. After all, what do a growing national debt, falling living standards, rising inflation, skyrocketing energy prices, out-of-control immigration, Weimar-style money-printing, a burgeoning new housing bubble, a failed health service and a collapsing infrastructure matter when you’ve got the most important problem of our times, so to speak, in hand, viz. blokes sneaking a quick one off the wrist while their missus has popped down to Waitrose to stock up on Mabel Pearman’s Burford Brown eggs, Isigny Ste Mere unsalted butter and that Duchy Originals cider on special offer at just £1.45 a bottle?

According to James, nowadays women are about as likely to go looking for pornography on the internet as men are:

But according to some of my techie friends, this isn’t the case at all. They’re the ones who have to clear up all the viruses which you accidentally invited into your computer along when you were trying to Google the weather and mistakenly typed in ‘Romanian donkey babes xxx hardcore’ instead.

Here’s what one of them has to say: ‘The very worst I came across was a shared houseful of young ladies. It took over eight hours to do just the first pass with the antivirus software. That pass removed over 58,000 pieces of malware and spyware, and just under 2,000 viruses. It took all the next day to finish cleaning their computer. I told them it was the worst case of an infected computer I had ever come across, and one asked how it had happened for it to be so bad. Easy I said. Porn sites. They all went bright red and then the hilarity ensued, as the finger pointing started.’

[…]

I realise, of course, that there are still plenty of puritans out there who feel differently. To them I quote first Thomas Sowell: ‘What is ominous is the ease with which some people go from saying that they don’t like something to saying that the government should forbid it. When you go down that road, don’t expect freedom to survive very long.’ And second, Pastor Niemoller: ‘First they came for the wankers…’.

July 30, 2013

The real, long-term source of damage to American interests from the NSA revelations

Filed under: Business, Government, Technology, USA — Tags: , , , , , — Nicholas @ 10:10

In The Atlantic, James Fallows explains why the NSA’s digital overreach has likely harmed US long-term interests in many different ways:

In short: because of what the U.S. government assumed it could do with information it had the technological ability to intercept, American companies and American interests are sure to suffer in their efforts to shape and benefit from the Internet’s continued growth.

    American companies, because no foreigners will believe these firms can guarantee security from U.S. government surveillance;

    American interests, because the United States has gravely compromised its plausibility as world-wide administrator of the Internet’s standards and advocate for its open, above-politics goals.

Why were U.S. authorities in a position to get at so much of the world’s digital data in the first place? Because so many of the world’s customers have trusted* U.S.-based firms like Google, Yahoo, Apple, Amazon, Facebook, etc with their data; and because so many of the world’s nations have tolerated an info-infrastructure in which an outsized share of data flows at some point through U.S. systems. Those are the conditions of trust and toleration that likely will change.

The problem for the companies, it’s worth emphasizing, is not that they were so unduly eager to cooperate with U.S. government surveillance. Many seem to have done what they could to resist. The problem is what the U.S. government — first under Bush and Cheney, now under Obama and Biden — asked them to do. As long as they operate in U.S. territory and under U.S. laws, companies like Google or Facebook had no choice but to comply. But people around the world who have a choice about where to store their data, may understandably choose to avoid leaving it with companies subject to the way America now defines its security interests.

Update: Also in the aftermath of Edward Snowden’s revelations, you’d think that Senator Ron Wyden would get the credit he clearly has been deserving all this time:

For many, many years we’ve covered Senator Ron Wyden’s seemingly quixotic attempts to signal to the American public (and press) that the NSA was doing a hell of a lot more surveillance than most people believed, even those who were carefully reading the laws. Because secrecy rules meant that he couldn’t directly reveal what he’d learned while on the Senate Intelligence Committee, he had to issue vague statements, documents and speeches hinting at things that were going on that he couldn’t actually talk about. Of course, now that Ed Snowden leaked a bunch of documents, it’s shown that Wyden was absolutely correct in what was going on (and that the American public wouldn’t like it).

You’d think that would lead people to have a lot more respect for the incredible efforts he went through to alert people to these issues without breaking the secrecy laws. And, in fact, many more people are aware of those efforts. The Washington Post has a nice article about Wyden’s attempts to bring these issues out and to get a real debate going on them.

However, towards the end, the reporter talks to two different former top lawyers at the NSA, who both appear to be really, really angry about Wyden daring to suggest to the public that the NSA wasn’t playing straight with the American public. First up, we’ve got Stewart Baker, the former NSA General Counsel and top Homeland Security official, who is so anti-civil liberties and pro-surveillance that he’s almost a caricature of himself — including claiming that the Boston bombings prove that Americans need less privacy and that civil libertarians complaining about too much surveillance are the real cause for the September 11 attacks.

The return of “lawful access”

Filed under: Cancon, Law, Liberty, Media, Technology — Tags: , , , , — Nicholas @ 07:56

Michael Geist on the Canadian implications of some information that was published in a Buzzfeed article about a Utah ISP and the NSA’s installation of a “little black box” in their network:

The article describes how a Foreign Intelligence Service Act (FISA) warrant allowed the NSA to monitor the activities of an ISP subscriber by inserting surveillance equipment directly within the ISP’s network. The experience in Utah appears to have been replicated in many other Internet and technology companies, who face secret court orders to install equipment on their systems.

The U.S. experience should raise some alarm bells in Canada, since the now defeated lawful access bill envisioned similar legal powers. Section 14(4) of the bill provided:

    The Minister may provide the telecommunications service provider with any equipment or other thing that the Minister considers the service provider needs to comply with an order made under this section.

That provision would have given the government the power to decide what specific surveillance equipment must be installed on private ISP and telecom networks by allowing it to simply take over the ISP or telecom network and install its own equipment. This is no small thing: it literally means that law enforcement (including CSIS) would have had the power to ultimately determine not only surveillance capabilities but the surveillance equipment itself.

While Bill C-30 is now dead, the government may be ready resurrect elements of it. Earlier this month, a cyber-bullying report included recommendations that are lifted straight from the lawful access package.

July 29, 2013

Ten questions with Evernote CEO Phil Libin

Filed under: Business, Technology — Tags: , , , , — Nicholas @ 09:36

Wired‘s Ryan Tate sat down to talk to Phil Libin of Evernote:

Evernote is known for its eponymous note-taking app, a seemingly modest piece of software that has brought in a heap of money. Evernote has topped 10 million downloads in the iOS and Android app stores and accumulated more than 65 million users across its mobile, web, and desktop versions.

CEO and serial tech entrepreneur Phil Libin used to bristle when people would refer to Evernote as a digital notebook. He sees the product as an extension of the mind, albeit one that’s only about 5 percent complete. These days, though, he’s learned to embrace the pigeonholing. After all, it was humble note-takers who brought Redwood City, California-based Evernote to profitability in 2011 by upgrading en masse to a premium version that includes optical character recognition (handy for pictures of business cards and receipts) and collaborative note editing (great for workgroups).

This year, Evernote is in the red again as the company scales up to reach Libin’s bigger ambition — becoming something like Microsoft Office for mobile devices. Or, as Libin put it in an hourlong interview with WIRED, “like Nike for your mind.”

Evernote’s staff of 330 is divided into teams of no more than eight members — small enough, as Libin sees it, to sit around a dinner table and have a single conversation. No team project can last more than nine months, and none of the teams share any code, which is something close to sacrilege among the software priests of Silicon Valley. One recent sunny Friday, while programmers behind him raced to rewrite the iPhone and iPad versions of Evernote from scratch, we pelted Libin with questions about the past, present, and future of his company.

« Newer PostsOlder Posts »

Powered by WordPress