Quotulatiousness

August 24, 2015

QotD: Air conditioning

Filed under: Europe, Quotations, Technology, USA — Tags: , — Nicholas @ 01:00

Thing is, since we don’t live in the far off frozen wastelands like you, it’s not “sweating for a few days”; here it would be sweating for a few months. Or practically the whole year in places like Miami, New Orleans, or Houston.

There’s a reason the population of our industrialized North massively outnumbered that of the South in our Civil War: Because before air conditioning, not many people chose to live in places where the summertime climate can kill you dead. It’s certainly not conducive to industry or a modern economy.

Why is there a stereotype of Southerners talking slowly and ambling languidly, rather than hurrying about like chattering New Yorkers? Because acting like that between May and September down around Atlanta or Birmingham is courting heatstroke.

Air conditioning didn’t just help the modern Sun Belt economy, it’s practically solely responsible for it. Twelve US states are partially or entirely located below the 35th parallel north; the only parts of Europe that far south are Crete and Cyprus, which are not areas known for contributing to the industry of the continent.

Conversely, only our northernmost tier of states is above the 45th parallel: Oregon and Washington, Montana, the Dakotas, parts of Minnesota and Wisconsin and Michigan, a bit of New England… You know what I noticed in Washington state? Neither of the houses I visited had A/C. Nor did the abode of friends in New Hampshire, until they added a window unit upstairs recently to make the occasional summer heat wave more bearable in the loft bedroom. Do you know where the 45th parallel crosses Europe? The French Riviera. Balmy Lombardy. The pleasant Piedmont.

Tam K. “Heavy Smug Emissions”, View From The Porch, 2015-08-13.

August 23, 2015

The chemistry of ice cream

Filed under: Food, Science, Technology — Tags: — Nicholas @ 02:00

Compound Interest on the chemical structure of ice cream:

Click to see the full-sized original

Click to see the full-sized original

Ice cream is a mainstay of summer – for many, a trip to the beach would be incomplete without one. Despite its seeming simplicity, ice cream is a prime example of some fairly complex chemistry. This graphic takes a look at some of the ingredients that go into ice cream, and the important role they play in creating the finished product. There’s a lot to talk about – whilst the graphic gives an overview, read on for some in-depth ice cream science!

Initially, it might be hard to believe that ice cream could be all that complicated. After all, it’s essentially composed of three basic ingredients: milk, cream, and sugar. How complex can the mixing of three ingredients really be? As it turns out, the answer is: very! Simply mixing the ingredients together, then freezing them, isn’t enough to make a good ice cream. To understand why this is, we’re going to need to talk about each of the component ingredients in turn, and what they bring to the table.

Ice cream is a type of emulsion, a combination of fat and water that usually wouldn’t mix together without separating. However, in an emulsion, the very small droplets of fat are dispersed through the water, avoiding this separation. The manner in which this is accomplished is a result of the chemical properties of molecules in the emulsion.

The fat droplets in ice cream come from the cream used to make it. Fats are largely composed of a class of molecules called triglycerides, with very small amounts (less than 2%) of other molecules such as phospholipids and diglycerides. The triglycerides are made up of a glycerol molecule combined with three fatty acid molecules, as shown in the graphic. The melting temperature of the fats used in ice cream is quite important, as fats that melt at temperatures that are too high give a waxy feel in the mouth, whilst it’s difficult to make stable ice cream with those that melt at too low a temperature. Luckily, dairy fat falls just in the right range! As it happens, you can also make ice cream with palm oil and coconut oil, as their melting temperatures are similar.

August 20, 2015

How Buildings Learn – Stewart Brand – 4 of 6 – “Unreal Estate”

Filed under: Architecture, Randomness, Technology — Tags: , , , , — Nicholas @ 03:00

Published on 10 Jun 2012

This six-part, three-hour, BBC TV series aired in 1997. I presented and co-wrote the series; it was directed by James Muncie, with music by Brian Eno.

The series was based on my 1994 book, HOW BUILDINGS LEARN: What Happens After They’re Built. The book is still selling well and is used as a text in some college courses. Most of the 27 reviews on Amazon treat it as a book about system and software design, which tells me that architects are not as alert as computer people. But I knew that; that’s part of why I wrote the book.

Anybody is welcome to use anything from this series in any way they like. Please don’t bug me with requests for permission. Hack away. Do credit the BBC, who put considerable time and talent into the project.

Historic note: this was one of the first television productions made entirely in digital— shot digital, edited digital. The project wound up with not enough money, so digital was the workaround. The camera was so small that we seldom had to ask permission to shoot; everybody thought we were tourists. No film or sound crew. Everything technical on site was done by editors, writers, directors. That’s why the sound is a little sketchy, but there’s also some direct perception in the filming that is unusual.

August 17, 2015

Common metal alloys

Filed under: Science, Technology — Tags: — Nicholas @ 02:00

Compound Interest looks at the chemical composition of some common metal alloys:

Click to see the full-sized original

Click to see the full-sized original

Today’s post looks at an aspect of chemistry we come across every day: alloys. Alloys make up parts of buildings, transport, coins, and plenty of other objects in our daily lives. But what are the different alloys we use made up of, and why do we use them instead of elemental metals? The graphic answers the first of these questions, and in the post we’ll try and answer the second.

First, a little on what alloys are, for anyone unfamiliar with the term. Alloys are a mixture of elements, where at least one of the elements is a metal. There are over 80 metals in the periodic table of elements, and we can mix selections of these different metals in varying proportions, sometimes with non-metals too, to create alloys. Note the use of the word mixture: in the vast majority of cases, alloys are simply intermixed elements, rather than elements that are chemically bonded together.

August 12, 2015

How Buildings Learn – Stewart Brand – 3 of 6 – “Built for Change”

Filed under: Architecture, Randomness, Technology — Tags: , , — Nicholas @ 02:00

Published on 10 Jun 2012

This six-part, three-hour, BBC TV series aired in 1997. I presented and co-wrote the series; it was directed by James Muncie, with music by Brian Eno.

The series was based on my 1994 book, HOW BUILDINGS LEARN: What Happens After They’re Built. The book is still selling well and is used as a text in some college courses. Most of the 27 reviews on Amazon treat it as a book about system and software design, which tells me that architects are not as alert as computer people. But I knew that; that’s part of why I wrote the book.

Anybody is welcome to use anything from this series in any way they like. Please don’t bug me with requests for permission. Hack away. Do credit the BBC, who put considerable time and talent into the project.

Historic note: this was one of the first television productions made entirely in digital — shot digital, edited digital. The project wound up with not enough money, so digital was the workaround. The camera was so small that we seldom had to ask permission to shoot; everybody thought we were tourists. No film or sound crew. Everything technical on site was done by editors, writers, directors. That’s why the sound is a little sketchy, but there’s also some direct perception in the filming that is unusual.

August 8, 2015

Tom Kratman on “killer ‘bots”

Filed under: Military, Technology, Weapons — Tags: , , , — Nicholas @ 03:00

SF author (and former US Army officer) Tom Kratman answers a few questions about drones, artificial intelligence, and the threat/promise of intelligent, self-directed weapon platforms in the near future:

Ordinarily, in this space, I try to give some answers. I’m going to try again, in an area in which I am, at least at a technological level, admittedly inexpert. Feel free to argue.

Question 1: Are unmanned aerial drones going to take over from manned combat aircraft?

I am assuming here that at some point in time the total situational awareness package of the drone operator will be sufficient for him to compete or even prevail against a manned aircraft in aerial combat. In other words, the drone operator is going to climb into a cockpit far below ground and the only way he’ll be able to tell he’s not in an aircraft is that he’ll feel no inertia beyond the bare minimum for a touch of realism, to improve his situational awareness, but with no chance of blacking out due to high G maneuvers..

Still, I think the answer to the question is “no,” at least as long as the drones remain under the control of an operator, usually far, far to the rear. Why not? Because to the extent the things are effective they will invite a proportional, or even more than proportional, response to defeat or at least mitigate their effectiveness. That’s just in the nature of war. This is exacerbated by there being at least three or four routes to attack the remote controlled drone. One is by attacking the operator or the base; if the drone is effective enough, it will justify the effort of making those attacks. Yes, he may be bunkered or hidden or both, but he has a signal and a signature, which can probably be found. To the extent the drone is similar in size and support needs to a manned aircraft, that runway and base will be obvious.

The second target of attack is the drone itself. Both of these targets, base/operator and aircraft, are replicated in the vulnerabilities of the manned aircraft, itself and its base. However, the remote controlled drone has an additional vulnerability: the linkage between itself and its operator. Yes, signals can be encrypted. But almost any signal, to include the encryption, can be captured, stored, delayed, amplified, and repeated, while there are practical limits on how frequently the codes can be changed. Almost anything can be jammed. To the extent the drone is dependent on one or another, or all, of the global positioning systems around the world, that signal, too, can be jammed or captured, stored, delayed, amplified and repeated. Moreover, EMP, electro-magnetic pulse, can be generated with devices well short of the nuclear. EMP may not bother people directly, but a purely electronic, remote controlled device will tend to be at least somewhat vulnerable, even if it’s been hardened,

Question 2: Will unmanned aircraft, flown by Artificial Intelligences, take over from manned combat aircraft?

The advantages of the unmanned combat aircraft, however, ranging from immunity to high G forces, to less airframe being required without the need for life support, or, alternatively, for a greater fuel or ordnance load, to expendability, because Unit 278-B356 is no one’s precious little darling, back home, to the same Unit’s invulnerability, so far as I can conceive, to torture-induced propaganda confessions, still argue for the eventual, at least partial, triumph of the self-directing, unmanned, aerial combat aircraft.

Even, so, I’m going to go out on a limb and go with my instincts and one reason. The reason is that I have never yet met an AI for a wargame I couldn’t beat the digital snot out of, while even fairly dumb human opponents can present problems. Coupled with that, my instincts tell me that that the better arrangement is going to be a mix of manned and unmanned, possibly with the manned retaining control of the unmanned until the last second before action.

This presupposes, of course, that we don’t come up with something – quite powerful lasers and/or renunciation of the ban on blinding lasers – to sweep all aircraft from the sky.

August 7, 2015

Warsaw Falls – The Fokker Scourge Begins I THE GREAT WAR Week 54

Filed under: Europe, Germany, History, Military, Russia, Technology, WW1 — Tags: , , — Nicholas @ 05:00

Published on 6 Aug 2015

After the Russian defeats on the Eastern Front, Warsaw falls. The first time in over 100 years a foreign power occupies the city. The German onslaught in the East seems to be unstoppable. Also on the Western Front the Germans are causing havoc with the new Fokker-Eindecker planes which start the so called Fokker Scourge. The British pilots even start to call their airplanes Fokker-Fodder. At the same time, the battle in Gallipoli continues with ever more troops landing while neither the Ottomans nor the ANZAC troops can gain any advantage.

Looking back at April’s 7.8 earthquake in Nepal

Filed under: Asia, Science, Technology — Tags: , , — Nicholas @ 04:00

At Ars Technica, Scott K. Johnson what has been learned about the devastating earthquake that struck Nepal earlier this year:

The mighty Himalayas have been driven up into the sky by the collision of Eurasia and India, which has migrated north like a tectonic rocket over the last 100 million years. The Indian plate is being crammed beneath the crumpled Himalayan rocks along a dangerous fault that ramps downward to the north.

Lots of GPS sensors and seismometers have been deployed in the area to help seismologists study earthquakes here. Combined with precise satellite measurements of surface elevation changes, researchers have the means to work out where the movement on the fault must have occurred.

The earthquake began about 80 kilometers northwest of Kathmandu and about 15 kilometers beneath the surface. Geologists like to talk about faults “unzipping,” which is a helpful way to visualize what’s going on. A small patch of the fault plane slips, and then expands outward along the fault. In this case, the patch unzipped about 140 kilometers to the east in under a minute, traveling horizontally along the fault plane. Within that patch, the rocks slipped as much as six meters past each other.

Although it’s the seismic energy released by that sudden motion that causes the damage, the surface changes are still eye-catching — some of the GPS stations ended up two meters south of where they had been before the earthquake.

As for that seismic shaking, the pattern of building damage in Kathmandu was partly the result of the geology beneath the city. It sits on a roughly 500-meter-thick stack of lake and river sediment filling a bedrock bowl. The reverberation of seismic waves in that bowl produced a resonance, building stronger waves with a period of 4 to 5 seconds. While fewer homes were actually damaged than expected, taller buildings — which can sway at about that same frequency — didn’t fare as well. (A similar thing happened in the 1985 Mexico City earthquake, when buildings between 6 and 15 stories bore the brunt.)

Hacking a Tesla Model S

Filed under: Technology — Tags: , , , — Nicholas @ 03:00

At The Register, John Leyden talks about the recent revelation that the Tesla Model S has known hacking vulnerabilities:

Security researchers have uncovered six fresh vulnerabilities with the Tesla S.

Kevin Mahaffey, CTO of mobile security firm Lookout, and Cloudflare’s principal security researcher Marc Rogers, discovered the flaws after physically examining a vehicle before working with Elon Musk’s firm to resolve security bugs in the electric automobile.

The vulnerabilities allowed the researchers to gain root (administrator) access to the Model S infotainment systems.

With access to these systems, they were able to remotely lock and unlock the car, control the radio and screens, display any content on the screens (changing map displays and the speedometer), open and close the trunk/boot, and turn off the car systems.

When turning off the car systems, Mahaffey and Rogers discovered that, if the car was below five miles per hour (8km/hr) or idling they were able to apply the emergency hand brake, a minor issue in practice.

If the car was going at any speed the technique could be used to cut power to the car while still allowing the driver to safely brake and steer. Consumer’s safety was still preserved even in cases, like the hand-brake issue, where the system ran foul of bugs.

Despite uncovering half a dozen security bugs the two researcher nonetheless came away impressed by Tesla’s infosec policies and procedures as well as its fail-safe engineering approach.

“Tesla takes a software-first approach to its cars, so it’s no surprise that it has key security features in place that minimised and contained the risk of the discovered vulnerabilities,” the researchers explain.

August 5, 2015

A report on phasing out nuclear power in Sweden

It may make politicians and activists feel empowered and righteous, but it has negative aspects that don’t seem to get the same level of attention as the “feel good” rhetoric does:

Nuclear power faces an uncertain future in Sweden. Major political parties, including the Green party of the coalition-government have recently strongly advocated for a policy to decommission the Swedish nuclear fleet prematurely. Here we examine the environmental, health and (to a lesser extent) economic impacts of implementing such a plan. The process has already been started through the early shutdown of the Barsebäck plant. We estimate that the political decision to shut down Barsebäck has resulted in ~2400 avoidable energy-production-related deaths and an increase in global CO2 emissions of 95 million tonnes to date (October 2014). The Swedish reactor fleet as a whole has reached just past its halfway point of production, and has a remaining potential production of up to 2100 TWh. The reactors have the potential of preventing 1.9–2.1 gigatonnes of future CO2-emissions if allowed to operate their full lifespans. The potential for future prevention of energy-related-deaths is 50,000–60,000. We estimate an 800 billion SEK (120 billion USD) lower-bound estimate for the lost tax revenue from an early phase-out policy. In sum, the evidence shows that implementing a ‘nuclear-free’ policy for Sweden (or countries in a similar situation) would constitute a highly retrograde step for climate, health and economic protection.

How Buildings Learn – Stewart Brand – 2 of 6 – “The Low Road”

Filed under: Architecture, Randomness, Technology — Tags: , , — Nicholas @ 03:00

Published on 10 Jun 2012

This six-part, three-hour, BBC TV series aired in 1997. I presented and co-wrote the series; it was directed by James Muncie, with music by Brian Eno.

The series was based on my 1994 book, HOW BUILDINGS LEARN: What Happens After They’re Built. The book is still selling well and is used as a text in some college courses. Most of the 27 reviews on Amazon treat it as a book about system and software design, which tells me that architects are not as alert as computer people. But I knew that; that’s part of why I wrote the book.

Anybody is welcome to use anything from this series in any way they like. Please don’t bug me with requests for permission. Hack away. Do credit the BBC, who put considerable time and talent into the project.

Historic note: this was one of the first television productions made entirely in digital — shot digital, edited digital. The project wound up with not enough money, so digital was the workaround. The camera was so small that we seldom had to ask permission to shoot; everybody thought we were tourists. No film or sound crew. Everything technical on site was done by editors, writers, directors. That’s why the sound is a little sketchy, but there’s also some direct perception in the filming that is unusual.

August 2, 2015

Thinking about realistic security in the “internet of things”

Filed under: Technology — Tags: , , , , , — Nicholas @ 02:00

The Economist looks at the apparently unstoppable rush to internet-connect everything and why we should worry about security now:

Unfortunately, computer security is about to get trickier. Computers have already spread from people’s desktops into their pockets. Now they are embedding themselves in all sorts of gadgets, from cars and televisions to children’s toys, refrigerators and industrial kit. Cisco, a maker of networking equipment, reckons that there are 15 billion connected devices out there today. By 2020, it thinks, that number could climb to 50 billion. Boosters promise that a world of networked computers and sensors will be a place of unparalleled convenience and efficiency. They call it the “internet of things”.

Computer-security people call it a disaster in the making. They worry that, in their rush to bring cyber-widgets to market, the companies that produce them have not learned the lessons of the early years of the internet. The big computing firms of the 1980s and 1990s treated security as an afterthought. Only once the threats—in the forms of viruses, hacking attacks and so on—became apparent, did Microsoft, Apple and the rest start trying to fix things. But bolting on security after the fact is much harder than building it in from the start.

Of course, governments are desperate to prevent us from hiding our activities from them by way of cryptography or even moderately secure connections, so there’s the risk that any pre-rolled security option offered by a major corporation has already been riddled with convenient holes for government spooks … which makes it even more likely that others can also find and exploit those security holes.

… companies in all industries must heed the lessons that computing firms learned long ago. Writing completely secure code is almost impossible. As a consequence, a culture of openness is the best defence, because it helps spread fixes. When academic researchers contacted a chipmaker working for Volkswagen to tell it that they had found a vulnerability in a remote-car-key system, Volkswagen’s response included a court injunction. Shooting the messenger does not work. Indeed, firms such as Google now offer monetary rewards, or “bug bounties”, to hackers who contact them with details of flaws they have unearthed.

Thirty years ago, computer-makers that failed to take security seriously could claim ignorance as a defence. No longer. The internet of things will bring many benefits. The time to plan for its inevitable flaws is now.

July 31, 2015

Sarah Hoyt on being a time-traveller

Filed under: Europe, Technology — Tags: , , , — Nicholas @ 02:00

Earlier this month, Sarah Hoyt explained how a time-traveller from the (recent) past might be able to handle the changes encountered on visiting our modern world:

Yesterday some point was raised about how an early twentieth century person would react to the modern day.

Well, give them some years to adapt. I know. You see, I am a time traveler.

I think I have mentioned in the past that I was reading a book on the Middle Ages (the Time Traveler’s Guide to the Middle Ages, I think) and kept coming across things that I went “so?” on. Because they were the same conditions I grew up in.

It’s hard to explain, truly, because we had buses and cars (not many cars. For instance there were two vans and one car in the village. When I had a breathing crisis in the middle of the night (every few months or so till I was six) we had to knock on the door of the grocer across the street who — poor man, may he rest in peace, he died with Alzheimer’s — is as responsible as my parents for my still being here. He would throw on clothes at any hour of the day or night and drive us to emergency in the city, then wait with my parents until he found out if I’d be sent back home or kept on oxygen.

We also had telephones. In the grocery store. If something dire happened to one of the relatives overseas, they’d call, and so when we got the knock on the door and “call for” we knew it was bad news. Only worse news was a telegram. Mind you, my brother used that phone to call in song requests to request programs on the radio. (Programa de pedidos.)

Oh, yeah, we had radios. Everyone had a radio, even my grandparents, and had had them from the beginning of the century. There were dead tube radios in the attics, which is how I built myself my first radio. (“Dad, I want a radio.” “Good, you can have one.” And then he went back to reading Three Men In A Boat. I’m not actually joking.)

And then there were televisions. Well, every coffee shop had a TV, which is how they attracted the after-dinner crowd who, for cultural reasons, were mostly male. Then again the nearest coffee shop was a mile away. Through ill-lit streets. So, yeah.

My godmother and the housekeeper for the earl’s “farm house” catercorner from us had TVs. We often went to watch TV with the housekeeper, when the earl and his family wasn’t in (which was 99% of the time.) And all I have to say about my godmother’s door pane is that she really shouldn’t have gone on vacation at the time of the moon landing. And besides we cleaned up and left her money for the replacement. (Sheesh.)

[…]

I not only didn’t see a dishwasher till I was 12 (I think) but, having heard of them, I imagined them kind of like the robot diners in Simak. Arms come out the wall and wash dishes.

I was by no means the person from the most backward environment to become an exchange student. I certainly didn’t come from as backward a place as my host-parents expected (look, host-mom was descended from Portuguese. What she didn’t realize was that it had changed since her grandma’s stories.) They showed me how to flush the toilet…

However there were myriad culture shocks. The all-day TV, for instance. (I watched for two days solid, then decided it wasn’t my thing.) But mostly, at that time, the culture shock was the prosperity. My host mother bought a small TV for the kitchen on a whim, at a time when, in Portugal, you’d still have to save for years to buy ANY TV. Or the things considered necessary. We had patio furniture, though I don’t think anyone but me EVER went outside. (Not to blame them. Ohio has two seasons: Deep Freeze and Sauna.)

The refrigerator. When I came over we had a fridge. We got a fridge when I was ten. But a) it was the size of a dorm fridge. b) mom was still in the habit of shopping every day. So the morning was devoted to shopping for the food for lunch/dinner. The main thing we used our fridge for was ice-cubes, one per drink, because more than that might kill you.

My host family shopped once a week, and kept stuff in the deep freezer, so you didn’t need to run out to get food every day.

July 29, 2015

How Buildings Learn – Stewart Brand – 1 of 6 – “Flow”

Filed under: Architecture, Randomness, Technology — Tags: , , — Nicholas @ 05:00

Published on 10 Jun 2012

This six-part, three-hour, BBC TV series aired in 1997. I presented and co-wrote the series; it was directed by James Muncie, with music by Brian Eno.

The series was based on my 1994 book, HOW BUILDINGS LEARN: What Happens After They’re Built. The book is still selling well and is used as a text in some college courses. Most of the 27 reviews on Amazon treat it as a book about system and software design, which tells me that architects are not as alert as computer people. But I knew that; that’s part of why I wrote the book.

Anybody is welcome to use anything from this series in any way they like. Please don’t bug me with requests for permission. Hack away. Do credit the BBC, who put considerable time and talent into the project.

Historic note: this was one of the first television productions made entirely in digital — shot digital, edited digital. The project wound up with not enough money, so digital was the workaround. The camera was so small that we seldom had to ask permission to shoot; everybody thought we were tourists. No film or sound crew. Everything technical on site was done by editors, writers, directors. That’s why the sound is a little sketchy, but there’s also some direct perception in the filming that is unusual.

Apparently human ingenuity didn’t stretch as far as remote-controlled sex toys … until now!

Filed under: Health, Technology — Tags: , , , , — Nicholas @ 03:00

Who would ever have thought of combining wireless computing with sexual appliances? Nobody, right? There’s no possible way that anyone could have even imagined such a thing could happen … otherwise this patent would not have been issued:

Alright, people, strap in and keep the laughter to a minimum because we’re going to talk dildos here. Specifically, remotely operated dildos, and other sex apparatuses, including those operated by Bluetooth connections or over the internet. It seems that in 1998, a Texan by the name of Warren Sandvick applied for a patent that casts an awfully wide net over remotely controlled sexual stimulation, specifically any of the sort that involves a user interface in a location different from the person being stimulated. You can find the patent at the link, but here’s the abstract:

    An interactive virtual sexual stimulation system has one or more user interfaces. Each user interface generally comprises a computer having an input device, video camera, and transmitter. The transmitter is used to interface the computer with one or more sexual stimulation devices, which are also located at the user interface. In accordance with the preferred embodiment, a person at a first user interface controls the stimulation device(s) located at a second user interface. The first and second user interfaces may be connected, for instance, through a web site on the Internet. In another embodiment, a person at a user interface may interact with a prerecorded video feed. The invention is implemented by software that is stored at the computer of the user interface, or at a web site accessed through the Internet.

Great, except that nothing in the above is an actual invention; it’s essentially an acknowledgement that a dildo could be controlled remotely and an attempt to lay claim to that function exclusively. The description of the art outlaid in the patent rests solely on the claim that sexual stimulation devices have always been either self-stimulation devices or that any remotely operated stimulation devices still required close proximity. But it all rests on what you consider a stimulation device.

Even before this patent was filed, there was a term for this kind of thing in use: teledildonics.

« Newer PostsOlder Posts »

Powered by WordPress