Quotulatiousness

October 5, 2015

Why are women under-represented in STEM?

Filed under: Science, Technology — Tags: , , , , — Nicholas @ 03:00

Yet another link I meant to post a while back, but it got lost in the shuffle:

Readers of the higher education press and literature may be forgiven for supposing that there is more research on why there are not more women in STEM fields than there is actual research in the STEM fields themselves. The latest addition to this growing pile of studies appeared a few months ago in Science, and now Science has just published a new study refuting the earlier one.

In the earlier study, “Expectations of Brilliance Underlie Gender Distributions Across Academic Disciplines,” Sarah-Jane Leslie, a philosophy professor at Princeton, and several co-authors surveyed more than 1800 academics across 30 disciplines — graduate students, postdocs, junior and senior faculty — to determine the extent of their agreement with such statements as, “Being a top scholar of [your field] requires a special aptitude that just can’t be taught” and whether “men are more often suited than women to do high-level work in [your field.]”

Fields that believe innate brilliance is essential to high success, such as physics and philosophy, have a significantly smaller proportion of women than fields that don’t, such as Psychology and Molecular Biology.

[…]

What Ginther and Kahn found, in short, is that it was not “expectations of brilliance” that predicted the representation of women in various fields “but mathematical ability, especially relative to verbal ability…. While field-specific ability beliefs were negatively correlated with the percentage of female Ph.D.s in a field, this correlation is likely explained by women being less likely than men to study these math-intensive fields.”

Ginther’s and Kahn’s argument was anticipated and developed even beyond theirs by psychiatrist Scott Alexander in a brilliant long entry on his widely read Slate Codex blog, “Perceptions of Required Ability Act As A Proxy For Actual Required Ability In Explaining The Gender Gap.” His criticism of Leslie et al. is even more devastating:

    Imagine a study with the following methodology. You survey a bunch of people to get their perceptions of who is a smoker (“97% of his close friends agree Bob smokes.”) Then you correlate those numbers with who gets lung cancer. Your statistics program lights up like a Christmas tree with a bunch of super-strong correlations. You conclude, “Perception of being a smoker causes lung cancer,” and make up a theory about how negative stereotypes of smokers cause stress which depresses the immune system. The media reports that as “Smoking Doesn’t Cause Cancer, Stereotypes Do.”

    This is the basic principle behind Leslie et al.

Like Ginther and Kahn, who did not cite his work, Alexander disaggregated the quantitative from the verbal GRE scores and found that the correlation between quantitative GRE score and percent of women in a discipline to be “among the strongest correlations I have ever seen in social science data. It is much larger than Leslie et al’s correlation with perceived innate ability. Alexander’s piece, and in fact his entire blog, should be required reading.

October 3, 2015

Great Britons: Isambard Kingdom Brunel Hosted by Jeremy Clarkson – BBC Documentary

Filed under: Britain, History, Railways, Technology — Tags: , , , — Nicholas @ 02:00

Published on 16 Jul 2014

Jeremy Clarkson follows in the footsteps of the great engineer Isambard Kingdom Brunel whose designs for bridges, railways, steamships, docks and buildings revolutionised modern engineering. But his boldness and determination to succeed often led him to repeatedly risk his own life. Jeremy Clarkson, discovers for himself just how terrifying that was.

H/T to Ghost of a Flea for the link.

September 30, 2015

Russia’s “bounty” on TOR

Filed under: Liberty, Russia, Technology — Tags: , , , , — Nicholas @ 05:00

Strategy Page on the less-than-perfect result of Russia’s attempt to get hackers to crack The Onion Router for a medium-sized monetary prize:

Back in mid-2014 Russia offered a prize of $111,000 for whoever could deliver, by August 20th 2014, software that would allow Russian security services to identify people on the Internet using Tor (The Onion Router), a system that enables users to access the Internet anonymously. On August 22nd Russia announced that an unnamed Russian contractor, with a top security clearance, had received the $111,000 prize. No other details were provided at the time. A year later is was revealed that the winner of the Tor prize is now spending even more on lawyers to try and get out of the contract to crack Tor’s security. It seems the winners found that their theoretical solution was too difficult to implement effectively. In part this was because the worldwide community of programmers and software engineers that developed Tor is constantly upgrading it. Cracking Tor security is firing at a moving target and one that constantly changes shape and is quite resistant to damage. Tor is not perfect but it has proved very resistant to attack. A lot of people are trying to crack Tor, which is also used by criminals and Islamic terrorists was well as people trying to avoid government surveillance. This is a matter of life and death in many countries, including Russia.

Similar to anonymizer software, Tor was even more untraceable. Unlike anonymizer software, Tor relies on thousands of people running the Tor software, and acting as nodes for email (and attachments) to be sent through so many Tor nodes that it was believed virtually impossible to track down the identity of the sender. Tor was developed as part of an American government program to create software that people living in dictatorships could use to avoid arrest for saying things on the Internet that their government did not like. Tor also enabled Internet users in dictatorships to communicate safely with the outside world. Tor first appeared in 2002 and has since then defied most attempts to defeat it. The Tor developers were also quick to modify their software when a vulnerability was detected.

But by 2014 it was believed that NSA had cracked TOR and others may have done so as well but were keeping quiet about it so that the Tor support community did not fix whatever aspect of the software that made it vulnerable. At the same time there were alternatives to Tor, as well as supplemental software that were apparently uncracked by anyone.

September 22, 2015

Volkswagen’s software DRM enabled the scam to fake emission data

Filed under: Business, Germany, Technology, USA — Tags: , , , , — Nicholas @ 04:00

At Boing Boing, Cory Doctorow points the finger of blame at VW’s DRM in their automobile software suite:

The EPA has accused Volkswagen of rigging its software to cheat the agency’s diesel emissions standards so that its cars could be on the road while spewing 40 times the legal limit for diesel emissions.

Volkswagen, like most auto manufacturers, uses digital rights management in its informatic systems. Under section 1201 of the Digital Millennium Copyright Act, it is a felony to tamper with that DRM, punishable by five years in prison and a $500,000 fine for a first offense. The company uses this legal regime to limit which mechanics can service its cars, ensuring that only “official” mechanics, who are bound by nondisclosure agreements — and covenants to only buy their parts from VW and not an aftermarket competitor — can effectively service their cars.

This year, the US Copyright Office held its triennial hearings into possible exceptions to this rule, and one petition asked it to grant an exemption for jailbreaking cars. The car manufacturers intervened to oppose this, but so did the EPA, fearing that drivers would modify their firmware in ways that increased emissions.

But by banning independent scrutiny of cars, the EPA and the Copyright Office have made possible for terrible, criminal frauds like this one to go undetected for long periods, turning cars into long-lived reservoirs of dirty secrets that can’t be reported without risking criminal sanction.

Jazz Shaw has more:

This isn’t a case of any sort of trick carburetor or jury rigged catalytic converter. The vehicle’s onboard computer could sense when it was hooked up to a diagnostics machine for an emissions test and would conveniently turn on all of its emission control features. (It’s being referred to as a “defeat device.”) Then, when the test was completed and it was unhooked from the computer it would simply shut them off again, boosting performance but also increasing emissions. You almost have to admire the sheer audacity assuming this is true. And given the initial responses from the company they don’t seem to be claiming that they didn’t do it.

[…]

So far Volkswagen seems to be taking the line of assuring everyone that they will work to recall the cars and “fix” them to eliminate this problem. It likely won’t bankrupt a company that size, but it’s one heck of an expensive piece of humble pie to eat. If they contest the fines and go to court, however, I’m wondering if they will actually lose. This was some mischief designed to short sheet the system no doubt, but would they have an out if the case goes before a judge? I was looking over some of the state level requirements for the testing of vehicles and the boundaries to be followed are rather bare bones at best. Each vehicle in the qualifying categories which was manufactured after 1996 has to be equipped with an On-Board Diagnostics Generation II (OBDII) system. The emissions portion of this is heavily tied into your annoying “check engine” light.

The way most of the regulations are written seems to indicate that the vehicle must have a functional system of this type which is accurately monitoring system performance and meets the maximum emissions requirements at the time of testing. Obviously the VW vehicles in question were doing just that. But cars today have all sorts of bells and whistles which drivers can use to customize their driving experience. They can switch from “performance” mode to “economy” mode with the push of a button. Things like that obviously affect the vehicle’s emissions. Other such options are available. And when you think about it, the “disable device” was really just putting the car into a different mode of operation which includes heavy emissions control. When it was disconnected and ready to head back out on the road it was switching back to a different mode with a bit more performance. None of that changes the fact that the emissions were within the required limits at the time of testing.

September 21, 2015

Xerox printer fail with extra-special DRM sauce

Filed under: Business, Technology — Tags: , — Nicholas @ 03:00

At Techdirt, Tim Cushing explains how Xerox is going the extra distance to extort even more money from their customers over toner ink:

Everyone likes buying stuff with a bunch of built-in restrictions, right? The things we “own” often remain the property of the manufacturers, at least in part. That’s the trade-off we never asked for — one pushed on us by everyone from movie studios to makers of high-end cat litter boxes and coffee brewers. DRM prevents backup copies. Proprietary packets brick functions until manufacturer-approved refills are in place.

Here’s another bit of ridiculousness, via Techdirt reader techflaws. German news outlet c’t Magazin is reporting that Xerox printers are going further than the normal restrictions we’ve become accustomed to. For years, printer companies have made sure users’ printers won’t run without every single slot being filled with approved cartridges. This includes such stupidity as disabling every function (including non-ink-related functions like scanning) in all-in-one printers until the printer is fed.

Xerox is going further. Not only do you need to refill the ink, but you have to fill it with local ink. techflaws paraphrases the paywalled, German-language article.

    Xerox uses region coding on their toner catridges AND locks the printer to the first type used. So if you use an NA (North America) cartridge you can’t use the cheaper DMO (Eastern Europe) anymore. The printer’s display does NOT show this, nor does the hotline know about it. When c’t reached out to Xerox, the marketing drone claimed, this was done to serve the customer better, I kid you not.

Ah, the old “serve the customer better by limiting his/her options,” as seen everywhere DRM/DRM-esque restrictions are applied.

[…]

Nearly every major printer manufacturer is in on the scam. HP saw an opportunity to increase incremental sales and staked out this territory in 2004. This brave new world of customer-screwing was followed by Lexmark, Canon, Epson and Xerox — none of which saw anything wrong with illogically restricting ink cartridges to certain regions.

Region coding for DVDs and videogames makes a certain amount of sense, provided you’re willing to make a small logic buy-in on windowed releases. But ink? It’s not like Australians need to wait six weeks for HP to cut loose ink cartridges so as not to sabotage the US release. The only reason to do this is to tie paying customers into the most expensive ink and toner. This lock-in is cemented by many printers’ refusal to recognize third-party replacement cartridges and/or allow refills of existing manufacturer cartridges.

The excuses made for this mercenary behavior would be hilarious if they weren’t so transparently dismissive of customers. Every flowery ode to customers’ best interests by PR flacks boils down to nothing more than, “Fuck ’em. It’s not like they have a choice.”

September 17, 2015

The rise of the Millennials Snake People

Filed under: Humour, Technology — Tags: , — Nicholas @ 04:00

Earlier this year, Eric Bailey released a Chrome extension that replaces the word “Millennials” with “Snake People”. I was reminded of this in an article I read the other day where the author had struck out the phrase “Baby Boomers” and replaced it with “Locust Generation“:

The Internet has been saturated for years with videos and photos of cats. This summer, it is also filled with snake people.

For the thousands of Internet users who have downloaded a browser extension called “Millennials to Snake People,” any online use of the word “millennial,” a common term for people born in the 1980s and 1990s, is automatically changed to “snake person.” An extension is a small software program that modifies an Internet browser such as Google ’s Chrome or Mozilla’s Firefox. Related terms are also altered: “Great recession” becomes “time of shedding and cold rocks,” and “Occupy Wall Street” turns into “Great Ape-Snake War.”

Web designer Eric Bailey, 33 years old, said he created the extension to amuse himself. “I saw one crazy-titled headline too many,” he said. “A lot of these articles speak of [millennials] in terms of this weird, dehumanized, alien phenomenon.”

The joke caught on quickly. Mr. Bailey launched the extension for Chrome in April, and others later adapted it for download in Firefox and Apple’s Safari. The Chrome extension has nearly 12,000 users, while a competing extension that turns “millennial” into “pesky whipper-snapper” has about 2,000.

September 14, 2015

“Edge is advertiser friendly, not User friendly”

Filed under: Technology — Tags: , , , — Nicholas @ 05:00

Jerry Pournelle talks about his differing browser experiences on the Microsoft Surface:

Apple had their announcements today, but I had story conferences so I could not watch them live. I finished my fiction work about lunch time, so I thought to view some reports, and it is time I learned more about the new Windows and get more use to my Surface 3 Pro; a fitting machine to view new Apple products, particularly their new iPad Pro which is I expect their answer to the Surface Pro and Windows 10.

My usual browser is Firefox, which has features I don’t love but by and large I get along with it; but with the Surface it seemed appropriate to make a serious effort to use Edge, the new Microsoft Browser. Of course it has Microsoft Bing the default search engine. It also doesn’t really understand the size of the Pro. It gave me horizontal scrolling, even though I had Edge full screen. I looked up Apple announcements, and Bing gave me a nice list. Right click on the nice bent Microsoft pocket wireless mouse, and open a repost in a new screen. Lo, I have to do horizontal scrolling; Edge makes sure there are ads on screen at all times, so you have to horizontal screen the text to see all of it. Line by line. But I can always see some ads. Edge makes sure I don’t miss ads. It doesn’t care whether I can read the text I was looking for, but it is more careful about the ads. I’m sure that makes the advertisers happy, but I’m not so sure about the users. I thought I went looking for an article, not for ads.

Edge also kept doing things I hadn’t asked it to, and I’d lose the text. Eventually I found if I closed the window and went back to the Bing screen and right clicked to open that same window in a new tab, I was able to – carefully – screen through the text, and adjust the screen so all the text was on screen even though there was still horizontal scrolling possible. This is probably a function of inexperience, but using a touch screen and Edge is a new experience.

Even so it was a rough read. I gave up and went to Firefox on the Surface Pro. Firefox has Google as its default browser, and the top selections it offered me – all I could see on one screen – were different from the ones I saw with Bing. I had to do a bit of scrolling to find the article I had been trying to read, but eventually I found it. Right click to open it in a new Tab. Voila. All my text in the center. I could read it. Much easier. For the record: same site, adjusted to width in Firefox on the Surface Pro, horizontal scrolling of the same article viewed in Edge. Probably my fault, but I don’t know what I did wrong.

Now in Microsoft’s defense, I don’t know Edge very well; but if you are going to a Surface Pro, you may well find Firefox easier to use than Edge. A lot easier to use.

As to Google vs. Bing, in this one case I found Bing superior; what it offered me had more content. But Edge is advertiser friendly, not User friendly.

September 11, 2015

How about creating a truly open web?

Filed under: Liberty, Technology — Tags: , , , , , — Nicholas @ 02:00

Brewster Kahle on the need to blow up change the current web and recreate it with true open characteristics built-in from the start:

Over the last 25 years, millions of people have poured creativity and knowledge into the World Wide Web. New features have been added and dramatic flaws have emerged based on the original simple design. I would like to suggest we could now build a new Web on top of the existing Web that secures what we want most out of an expressive communication tool without giving up its inclusiveness. I believe we can do something quite counter-intuitive: We can lock the Web open.

One of my heroes, Larry Lessig, famously said “Code is Law.” The way we code the web will determine the way we live online. So we need to bake our values into our code. Freedom of expression needs to be baked into our code. Privacy should be baked into our code. Universal access to all knowledge. But right now, those values are not embedded in the Web.

It turns out that the World Wide Web is quite fragile. But it is huge. At the Internet Archive we collect one billion pages a week. We now know that Web pages only last about 100 days on average before they change or disappear. They blink on and off in their servers.

And the Web is massively accessible – unless you live in China. The Chinese government has blocked the Internet Archive, the New York Times, and other sites from its citizens. And other countries block their citizens’ access as well every once in a while. So the Web is not reliably accessible.

And the Web isn’t private. People, corporations, countries can spy on what you are reading. And they do. We now know, thanks to Edward Snowden, that Wikileaks readers were selected for targeting by the National Security Agency and the UK’s equivalent just because those organizations could identify those Web browsers that visited the site and identify the people likely to be using those browsers. In the library world, we know how important it is to protect reader privacy. Rounding people up for the things that they’ve read has a long and dreadful history. So we need a Web that is better than it is now in order to protect reader privacy.

September 10, 2015

Making it easy for governments to monitor texts, emails, and other messages

Filed under: Law, Liberty, Technology, USA — Tags: , , , , , — Nicholas @ 03:00

Megan McArdle explains that while it’s quite understandable why governments want to maintain their technological ability to read private, personal communications … but that’s not sufficient justification to just give in and allow them the full access they claim that they “need”:

Imagine, if you will, a law that said all doors had to be left unlocked so that the police could get in whenever they needed to. Or at the very least, a law mandating that the government have a master key.

That’s essentially what some in the government want for your technology. As companies like Apple and Google have embraced stronger encryption, they’re making it harder for the government to do the kind of easy instant collection that companies were forced into as the government chased terrorists after 9/11.

And how could you oppose that government access? After all, the government keeps us safe from criminals. Do you really want to make it easier for criminals to evade the law?

The analogy with your home doors suggests the flaw in this thinking: The U.S. government is not the only entity capable of using a master key. Criminals can use them too. If you create an easy way to bypass security, criminals — or other governments — are going to start looking for ways to reproduce the keys.

[…]

Law enforcement is going to pursue strategies that maximize the ability to catch criminals or terrorists. These are noble goals. But we have to take care that in the pursuit of these goals, the population they’re trying to protect is not forgotten. Every time we open more doors for our own government, we’re inviting other unwelcome guests to join them inside.

I don’t really blame law enforcement for pushing as hard as possible; rare is the organization in history that has said, “You know, the world would be a better place if I had less power to do my job.” But that makes it more imperative that the rest of us keep an eye on what they’re doing, and force the law to account for tradeoffs, rather than the single-minded pursuit of one goal.

September 5, 2015

QotD: The existential problem facing Reddit

Filed under: Business, Liberty, Media, Politics, Technology — Tags: , , — Nicholas @ 01:00

Network effects are wonderful for a technology firm when it’s growing. Early movers can gain an advantage that is very hard to displace, because once everyone else is using Microsoft Word or a Playstation, there’s a cost to switching away. On the other hand, investors (and antitrust lawyers) often assume that network effects are more durable than they actually are. In fact, they can be quite fickle. Once your network starts shrinking, the collapse can be sudden, because every node that gets subtracted from your network makes it less valuable to the people who remain. Networks that start growing often start shrinking — and a modest decline can quickly prompt a stampede for the exits. Anyone remember MySpace?

And so the problem that Reddit has is this: Having attracted a bunch of people on the promise that they could say anything they wanted, the company risks alienating those people, shrinking the network and shrinking itself right out of existence. Reddit would probably be a better place if the fat-shaming hobbyists and racist trolls were surgically excised. But they won’t be; they’ll be forced out bluntly, along with others, and that will drive away many of the users Reddit would like to keep.

Deciding what is offensive is inherently a political act, because one man’s deep truth is often another person’s deep offense. To take one obvious example, do you treat conservative Christians who say terrible things about gay rights activists the same as gay rights activists who say terrible things about conservative Christians? Men’s rights activists the same as feminists?

We are all more attuned to the offenses against our own beliefs than we are to what may seem terribly offensive to others. And with the culture war raging hot, it is going to be very hard to make choices that don’t look as if you’re taking sides. Even if you try to be scrupulously fair, chances are that you will miss something, causing one side to understandably point out: “See, they crack down on us, but not on those equally offensive other people!”

Reddit is trying to avoid this by splitting the baby in half: designating much of the worst content as questionable, and then segregating it, but not banning it. It’s far from clear, however, that this compromise will work. I don’t think a lot of people are going to mourn when the racist subreddits are segregated. But those are among the most notorious cases precisely because most people can agree that racist epithets are not okay. The border cases are likely to be more numerous, and the decisions will convince some users that Reddit is not for them.

Megan McArdle, “Policing Reddit Could Kill Reddit”, Bloomberg View, 2015-07-17.

September 3, 2015

How Buildings Learn – Stewart Brand – 6 of 6 – “Shearing Layers”

Filed under: Architecture, History, Randomness, Technology — Tags: , — Nicholas @ 05:00

Published on 10 Jun 2012

This six-part, three-hour, BBC TV series aired in 1997. I presented and co-wrote the series; it was directed by James Muncie, with music by Brian Eno.

The series was based on my 1994 book, HOW BUILDINGS LEARN: What Happens After They’re Built. The book is still selling well and is used as a text in some college courses. Most of the 27 reviews on Amazon treat it as a book about system and software design, which tells me that architects are not as alert as computer people. But I knew that; that’s part of why I wrote the book.

Anybody is welcome to use anything from this series in any way they like. Please don’t bug me with requests for permission. Hack away. Do credit the BBC, who put considerable time and talent into the project.

Historic note: this was one of the first television productions made entirely in digital — shot digital, edited digital. The project wound up with not enough money, so digital was the workaround. The camera was so small that we seldom had to ask permission to shoot; everybody thought we were tourists. No film or sound crew. Everything technical on site was done by editors, writers, directors. That’s why the sound is a little sketchy, but there’s also some direct perception in the filming that is unusual.

August 28, 2015

The insecurity of the “internet of things” is baked-in right from the start

Filed under: Technology — Tags: , — Nicholas @ 02:00

At The Register, Richard Chirgwin explains why every new “internet of things” release is pretty much certain to be lacking in the security department:

Let me introduce someone I’ll call the Junior VP of Embedded Systems Security, who wears the permanent pucker of chronic disappointment.

The reason he looks so disappointed is that he’s in charge of embedded Internet of Things security for a prominent Smart Home startup.

Everybody said “get into security, you’ll be employable forever on a good income”, so he did.

Because it’s a startup he has to live in the Valley. After his $10k per month take-home, the rent leaves him just enough to live on Soylent plus whatever’s on offer in the company canteen where every week is either vegan week or paleo week.

Nobody told him that as Junior VP for Embedded Systems Security (JVPESS), his job is to give advice that’s routinely ignored or overruled.

Meet the designer

“All we want to do is integrate the experience of the bedside A.M. clock-radio into a fully-social cloud platform to leverage its audience reach and maximise the effectiveness of converting advertising into a positive buying experience”, the Chief Design Officer said (the CDO dresses like Jony Ive, because they retired the Steve Jobs uniform like a football club retiring the Number 10 jumper when Pele quit).

For his implementation, the JVPESS chose a chip so stupid the Republicans want to field it as Trump’s running-mate, wrote a communications spec that did exactly and only what was in the requirements, and briefed the embedded software engineer.

The embedded software engineer only makes stuff actually work, so he earns about one-sixth that of the User Experience Ninja that reports to Jony Ive’s Style Slave and has to live in Detroit. But he’s boring and conscientious and delivers the code.

Eventually, the JVPESS hands over a design to Jony Ive’s Outfit knowing it’ll end in tears.

Two weeks later, Jony Ive’s Style Slave returns to request approval for “just a couple of last minute revisions. We have to press ‘go’ on the project by close-of-business today so if you could just look this over”.

QotD: The unusually lucky 20th century, meteorologically speaking

Filed under: Environment, History, Quotations, Technology — Tags: , , , — Nicholas @ 01:00

… I read a lot of history and thus know a fair bit about how weather impact has been perceived by humans over time. It is a fact that the 20th century was an abnormally lucky hundred years, meteorologically speaking. The facts I managed to jam into tweets included (a) the superstorm that flooded 300 square miles of the Central Valley in California in the 1860s, (b) rainfall levels we’d consider drought conditions were normal in the U.S. Midwest before about 1905, and (c) storms of a violence we’d find hard to believe were commonly reported in the 1800s. I had specifically in mind something I learned from the book Wicked River: The Mississippi When It Last Ran Wild, which relays eyewitness accounts of thunderstorms so intense that travelers had to steeple their hands over their noses in order to breathe air instead of water; but a sense that storms of really theatrical violence were once common comes through in many other histories.

We had a quiet century geophysically as well — no earthquakes even nearly as bad as the New Madrid event of 1812, which broke windows as far north as Montreal. And no solar storms to compare with the Carrington Event of 1859, which seriously damaged the then-nascent telegraph infrastructure and if it recurred today would knock out power and telecomms so badly that we’d be years recovering and casualties would number in the hundreds of thousands, possibly the millions.

(I’m concentrating on 19th-century reports because those tended to be well-documented, but earlier records tell us it was the 20th century calm that was unusual, not the 19th-century violence.)

The awkward truth is that there are very large forces in play in the biosphere, and when they wander out of the ranges we’re adapted to, we suffer and die a lot and there really isn’t a great deal we can do about it; we don’t operate at the required energy scales. For that matter, I can think of several astronomical catastrophes that could be lurking just outside our light-cone only to wipe out all multicellular life on Earth next week. Reality is like that.

Eric S. Raymond, “Heavy weather and bad juju”, Armed and Dangerous, 2011-02-03.

August 26, 2015

How Buildings Learn – Stewart Brand – 5 of 6 – “The Romance of Maintenance”

Filed under: Architecture, Randomness, Technology — Tags: , — Nicholas @ 02:00

Published on 10 Jun 2012

This six-part, three-hour, BBC TV series aired in 1997. I presented and co-wrote the series; it was directed by James Muncie, with music by Brian Eno.

The series was based on my 1994 book, HOW BUILDINGS LEARN: What Happens After They’re Built. The book is still selling well and is used as a text in some college courses. Most of the 27 reviews on Amazon treat it as a book about system and software design, which tells me that architects are not as alert as computer people. But I knew that; that’s part of why I wrote the book.

Anybody is welcome to use anything from this series in any way they like. Please don’t bug me with requests for permission. Hack away. Do credit the BBC, who put considerable time and talent into the project.

Historic note: this was one of the first television productions made entirely in digital — shot digital, edited digital. The project wound up with not enough money, so digital was the workaround. The camera was so small that we seldom had to ask permission to shoot; everybody thought we were tourists. No film or sound crew. Everything technical on site was done by editors, writers, directors. That’s why the sound is a little sketchy, but there’s also some direct perception in the filming that is unusual.

August 25, 2015

We finally find someone (not funded by Lockheed Martin) who likes the F-35

Filed under: Britain, Military, Technology, USA — Tags: , , , — Nicholas @ 03:00

Okay, I poke a bit of fun … there are defenders of the F-35 who are funded by other stakeholders … I kid, I kid! Here’s a contrarian take by Think Defence justifying the UK’s F-35 commitment:

In the 7 years I have been dribbling my thoughts into Think Defence there are a few things on which I have been consistent; the ISO container is the greatest invention since the Bailey Bridge, commonality is not a dirty word, logistics are critically important, and, the F-35B is worth it.

Yet to be discovered tribes in the middle of the Amazonian rain forest could not have failed to notice the untrammelled hype that surrounds the F-35 in general, and the STOVL F-35B in particular. The amount of coverage is staggering, some of it informed, some of it not. Being developed under the un-staring eye of social media and a long line of people who seem to live for being critical has exposed every developmental misstep to ruthless criticism. Reports are often selectively quoted, conclusions drawn without context, over-simplification of complex subjects is rife and correlation confused with causation.

It is also an extremely polarising aircraft, read anything on-line and it seems you are either a Lockheed Martin shill or thick as mince critic who knows nothing.

I suspect, the reality is somewhere between, whilst the F-35 is not the cure for cancer, it is not cancer either.

f35b-power-and-propulsion-740x428

Although I have written about the F-35B many times, including this 5 part series, this is the first for a while

Into this toxic environment I go, a look at the F-35B.

« Newer PostsOlder Posts »

Powered by WordPress