Quotulatiousness

October 4, 2010

A cameo economic round-up by Monty

Filed under: Economics, USA — Tags: , , , — Nicholas @ 13:11

One of the most interesting features over at Ace of Spades HQ used to be the daily economic round-ups by Monty. Unfortunately, he had to take a breather, but we’re able to get an occasional update like this one:

[In which Monty, long away from the neighborhood, returns to save the local mom-n-pop bank from a hostile takeover through a stylish melange of breakdancing, infectious urban beats, and the rap music that all the youngsters seem to be so fond of. Thrill to the parachute pants, Jheri curls, and mirrored wraparound sunglasses! (The soundtrack, “Monty Raps! Funky Accordion and Theremin Music For These Troubled Modern Times”, now available in fine discout outlets nationwide!)]

[. . .]

I just wouldn’t be me if I didn’t point out that gold is now $1314/oz as I write this. I bought some gold five years back at about $500/oz; that’s a pretty damned good rate of return for something that’s just supposed to be an inflation hedge. The naysayers can continue mumbling that I can’t eat gold, that I will be crucified on a cross of gold, the gold is just metal and has no innate value — I will simply point to the fact that it has outperformed every other investment in my portfolio, and by quite a large margin. And as a long-term store of value, I trust it a hell of a lot more than Treasuries. (Silver has done even better in absolute terms.)

Ah, but what about those safe-haven darlings of investors, municipal bonds? The romance may be on the rocks. I’ve thought for a long time that municipal debt is the next big shoe to drop in this recession/depression/worker’s paradise that we’re living in. Harrisburg, PA made the news recently when they barely escaped having to declare bankruptcy, but Harrisburg is only one of tens or even hundreds of muncipalities in the nation in dire financial straits. There seems to be a belief that the feds will bail them out before things get too grim, but this ignores two facts: a) the appetite for another trillion-dollar bailout is at subzero levels, and b) it’s not clear that taxpayers of one state will be willing to bail out the profligate citizenry of another. Prudent residents of Lincoln, NE or Minot, ND may not wish to fund the rather more lavish lifestyles of a San Diego or Miami. However much we “feel” the federal and state debt, we’d feel a municipal crash a lot harder because it hits us right where we live (literally): trash collection, sewer, water, road repair, snow removal, all the rest. You pay more and more and get less and less from it. (Oh, and guess what the major financial burden on municipal governments is these days? If you said “public-employee pension and health benefits”, give yourself a gold star and then a smack upside the head for being an insufferable know-it-all.)

September 30, 2010

Censorship and blocking ineffective, says AK Zensur

Filed under: Britain, Europe, Germany, Law, Technology — Tags: , , , , — Nicholas @ 07:41

Attempts to block websites showing child pornography don’t appear to be as effective as direct action, according to a press release from the German Working Group against Access Blocking and Censorship (AK Zensur):

Internet blocking is advocated as an allegedly effective measure against the proliferation of child abuse images. Countries such as the United Kingdom, Sweden and Denmark have been using this technology for years. But a practical test by the German Working Group against Access Blocking and Censorship (AK Zensur) in cooperation with European civil rights advocacy groups has shown: Internet blocking does not fight abuse, in practice it only serves to conceal the failures of politics and police. Websites can remain on blocking lists for years even though they have either been deleted or could be deleted easily and quickly.

How is this possible, and what could be done against illegal sites? Answers are given by a new analysis of current blocking lists from Sweden and Denmark by the Working Group against Access Blocking and Censorship. The group developed software to select, categorise and geo-locate 167 blocked Internet domains as a representative sample of websites blocked in Denmark at the time of the investigation. “The result is a smack in the face of law enforcement authorities”, says Alvar Freude of the Working Group. “Of the 167 listed sites, only three contained material that could be regarded as child pornography.” Two of these three sites had been blocked in Denmark since 2008, and these are, or least were, blocked in Sweden, Norway and Finland as well. These sites were therefore known for at least two years in several countries, and apparently law enforcement authorities did nothing to try and get this illegal content removed.

This is even more disturbing because the Working Group managed to take down the remaining sites just by sending a few emails. Two of the sites were hosted in the USA, and even during the weekend (Friday, ca. 10 p.m. EDT) they were removed by the hosters within 30 minutes. On the following Tuesday, the third website was taken down by its registry in India, three hours after notification. The content was stored on a server in the Netherlands. “The removal of this dehumanising content and the pursuit of the perpetrators must have absolute priority. Internet Blocking leads to the exact opposite”, says Alvar Freude, who sent the take-down requests.

H/T to BoingBoing for the link.

Chopping off the “long tail” of Google searches?

Filed under: Economics, Technology — Tags: , , — Nicholas @ 07:29

For your daily contrarian view of the wonderfulness of Google’s new Instant Search feature, we turn to SmoothSpan:

The Internet is a Mighty Echo Chamber, and with one fell swoop, Google Instant Search has added a big ole’ Marshall Stack to turn the Echo levels all the way up to 11.

Google reports that Instant Search will save 350 million hours of user time per year. What isn’t reported is how it will cut off the Long Tail where it starts by promoting banal sameness for searchers. This is great for Google. After all, keeping up with every last oddball search someone may want to do costs them more infrastructure money. At their scale, it is significant. So, corralling everyone into fewer more common searches is a good thing.

[. . .]

How does Google Instant Search contribute to the Echo Chamber? Well anyone who has bothered to look through keyword information on their website will see that people find sites through a bewildering array of queries. Some might even say much of it is accidental, but looking over these lists gives a wonderful window onto how your content is found and perceived by others. How often do we get to commit such telepathy with our followers? Rarely. Yet, Instant Search will substitute popular searches for those individually created. More people will be driven off the back roads search trails and onto the superhighways that lead to whomever controls the first few search results connected to the Instant Searches Google is recommending at the time.

Oddly enough, I was talking about Google searches the other day with DarkWaterMuse (whose blog is offline at the moment), but it was more in the context of “how often are the sponsored links actually useful to you?” We both agreed that the correct answer fell somewhere in the range of “rarely” to “never”.

September 29, 2010

QotD: “Never attribute to malice that which can be explained by malice and incompetence”

Filed under: Media, Quotations — Tags: , , , , — Nicholas @ 13:11

I used to publish in the National Post back in the day Conrad Black ran the show. It was a business run with integrity. The last time I had a call from their editorial board I had to explain the Post paid me 40 cents a word. The man was genuinely scandalized — I mean audibly taken aback and offended — when I told him I would not hand my work over to him for free (btw, Adam, how did selling your integrity work out for you? Looks like you got what it was worth).

These days they don’t bother to call. Last week, they took my Margaret Atwood story and ran with it uncredited. They lacked the decency to do something that would have cost them nothing.

[. . .]

I am a writer. I don’t expect to get paid much. But I do expect to get paid. If this country aspired to be something more than a grasping, pissant kleptocracy celebrating third-raters and UCC school ties my work — this blog and others like it — would be understood as part of the real Canadian cultural establishment.

Fortunately, I don’t require their acknowledgement.

Nicholas Packwood, “Neither honour nor courage: The National Post”, Ghost of a Flea, 2010-09-29

Austin Bay summarizes the demographic problems China is facing

Filed under: China, Economics, Environment — Tags: , , , — Nicholas @ 09:11

This is all old hat if you’ve been reading the blog for a while, but it’s always good to see a good summary of key points, like this list by Austin Bay:

Internal Disorder: China’s primary threat is not the United States, or any other foreign power, but internal disorder. There are more angry people in China every day, and the government knows that this could blossom into widespread uprisings. It has happened so many times before in Chinese history. Protesting factory workers are an indicator.

Corruption: Corruption is the biggest complaint among China’s discontented; government officials, who are more interested in enriching themselves than in taking care of “the people” are particular targets. Many of the demonstrations and labor disruptions are the result of corruption among local officials, including the police.

The Communications Dilemma: In 2007, Chinese Internet use grew to over 210 million users. Cell phones are also increasingly available. China is the world’s largest cell phone market. The Internet is an economic and educational tool. However, it also undermines an authoritarian government’s ability to control (deny and spin) information. China’s 2010 “war with Google.com” illustrated this dilemma.

Ethnic Minorities and Language: China has a population of 1.4 billion. Han Chinese (“ethnic Han”) constitute approximately 92 percent of China’s population. China also has 55 “minority nationalities,” however, amounting to 100 million people. The 2009 Uighur riots in Xinjiang province (western China) and resistance in Tibet are symptomatic of the problem. They are resisting “Hanicization.”

Pollution and Water: In early 2008, China began shutting down “high pollution” factories. The reason? To clear the air for the 2008 Beijing Olympics. The growing wealth of the Chinese people is causing enormous pollution problems and water shortages. Effective pollution controls mean more expensive production methods. That makes Chinese goods less competitive.

The Marriage Gap: China’s “one child” policy crimped population growth, all right. More boys were born than girls; Chinese culture “favors” sons. As a result, there is a serious imbalance between men and women. In some places, there are 120 men per 100 women. Marriageable daughters are, reportedly, going largely to the upper social groups within each village or district. The sons of the poorest families are, to an extent, not finding wives. This is an indicator of future social trouble.

As I’ve said several times before, I’m not anti-Chinese: China has accomplished economic marvels in amazingly short time spans . . . but not without serious costs. Urban and coastal dwellers have benefitted disproportionally from the growth: rural and inland Chinese have suffered to provide the means for that growth. China is still not a free economy, and still represses dissent, imprisons critics, and controls far too much of the country’s economy both directly and indirectly. Corruption is rife, despite the savage punishment meted out to (some of) the (accused) perpetrators.

China’s miracle can’t continue for much longer unless the government starts to address these problems with the same kind of single-mindedness that they’ve brought to other problems. Introducing the rule of law would be an excellent first step, but it would directly challenge too many powerful men, some of whom (literally) have armies.

September 23, 2010

Meh. Civ V isn’t that addictive . . . is it really 2am?

Filed under: Gaming, Randomness, Technology — Tags: , — Nicholas @ 08:58

I received my copy of Civilization V from Amazon.ca yesterday, but I was in town all evening, so I didn’t sit down to start installing it until 10:30. I figured I could install it, twiddle about with the new UI, and still get to sleep by midnight. I probably could have, except you can’t play Civ V without registering an account with Steam. After creating the account, you apparently have to download the whole game (no idea why, as there’s a DVD-ROM in the package), and because I was online at peak hour for west coast gamers, the connection speed left more than a bit to be desired.

At around 11:30, the game finished downloading and I was able to actually start. “Oh,” I said to myself, “they’ve included tutorials. That’s nice of them. I guess that’ll cover the changed UI elements. I’ll try ’em.” I spent the next two hours just playing the tutorial scenarios.

It certainly does have the “gotta play just one more turn” thing down pat. It’ll do nicely to cover the gap until Guild Wars 2 is released.

September 22, 2010

Boom de yada, boom de yada

Filed under: Humour, Media, Technology — Tags: , , — Nicholas @ 07:29

H/T to Maggie Koerth-Baker for the link.

September 13, 2010

QotD: An alternate history we might have suffered

Thought experiment: imagine an Internet in which email and web addresses were centrally issued by government agencies, with heavy procedural requirements and no mobility — even, at a plausible extreme, political patronage footballs. What kind of society do you suppose eventually issues from that?

I was there in 1983 when a tiny group called the IETF prevented this from happening. I had a personal hand in preventing it and yes, I knew what the stakes were. Even then. So did everyone else in the room.

Thought experiment: imagine a future in which everybody takes for granted that all software outside a few toy projects in academia will be closed source controlled by managerial elites, computers are unhackable sealed boxes, communications protocols are opaque and locked down, and any use of computer-assisted technology requires layers of permissions that (in effect) mean digital information flow is utterly controlled by those with political and legal master keys. What kind of society do you suppose eventually issues from that?

Remember Trusted Computing and Palladium and crypto-export restrictions? RMS and Linus Torvalds and John Gilmore and I and a few score other hackers aborted that future before it was born, by using our leverage as engineers and mentors of engineers to change the ground of debate.

[. . .]

Did we bend the trajectory of society? Yes. Yes, I think we did. It wasn’t a given that we’d get a future in which any random person could have a website and a blog, you know. It wasn’t even given that we’d have an Internet that anyone could hook up to without permission. And I’m pretty sure that if the political class had understood the implications of what we were actually doing, they’d have insisted on more centralized control. ~For the public good and the children, don’t you know.~

So, yes, sometimes very tiny groups can change society in visibly large ways on a short timescale. I’ve been there when it was done; once or twice I’ve been the instrument of change myself.

Eric S. Raymond, “Engineering history”, Armed and Dangerous, 2010-09-12

Call the president a “pr*ck”, get banned from the US for life

Filed under: Britain, Politics, USA — Tags: , , , , , — Nicholas @ 16:09

Fox News picks up an item from The Sun:

A British teenager who sent an e-mail to the White House calling President Obama a “pr*ck” was banned from the U.S. for life, The Sun reported Monday.

The FBI asked local cops to tell college student Luke Angel, 17, that his drunken insult was “unacceptable.”

Angel claims he fired off a single e-mail criticizing the U.S. government after seeing a television program about the 9/11 attacks.

He said, “I don’t remember exactly what I wrote as I was drunk. But I think I called Barack Obama a pr*ck. It was silly — the sort of thing you do when you’re a teenager and have had a few.”

Angel, of Bedford, in central England, said it was “a bit extreme” for the FBI to act.

“The police came and took my picture and told me I was banned from America forever. I don’t really care but my parents aren’t very happy,” he said.

Note that I’ve been very careful not to spell out that “unacceptable” word in the headline. No need to risk that just for reporting the news, right?

September 5, 2010

Craigslist surrenders, problem totally resolved

Filed under: Humour, Law, Liberty, Technology — Tags: , , , , , — Nicholas @ 11:26

Dan Tynan recounts the glorious moral victory scored by unhappy state legislators against the final bastion of sin and decadence, Craigslist:

Bowing to pressure from 17 state attorneys general, Craigslist has begun censoring its Adult Services ads. Visitors coming to any of the 400+ Craigslist sites will encounter a big black CENSORED tab where Adult Services used to be.

As we all know, the scourge of prostitution had been entirely eradicated from modern society before Craigslist came along. And now that Adult Service ads are banned, you can expect all those hard-working gals to pack up their condoms and lubricants and enroll in secretarial school.

Alas, we fear that — despite the best intentions of 17 state attorneys general desperately trying to get re-elected — a ban on Adult Services won’t quite put an end to adult-oriented advertising on Craigslist.

August 23, 2010

QotD: Peak Culture

Filed under: Government, Liberty, Quotations, Space, Technology — Tags: , , , , , — Nicholas @ 13:47

The height of their society peaked in 1969. They used militarism and socialism to put two guys on the Moon, they trotted out their public-private partnership (Concorde) to build exclusive supersonic transport for the rich. Max Faget and some other brilliant engineers designed a space shuttle fleet of ten vehicles capable of hundreds of flights a year to make access to low Earth orbit cheap and routine. And the Advanced Research Projects Agency had some geeks create an inter-networking protocol that could survive a nuclear war.

Obviously, they shot their wad, as it were, and no longer put guys on the Moon. They no longer fly supersonic transports. Their space shuttle is going to stop flying soon, if it hasn’t already. Those geeky guys went on to develop open source cryptography, open source software, and totally private economic transactions. The future we’re creating is going to be very, dramatically different. It is going to be decentralised to a fare thee well.

Right now, today, two people anywhere in the world *can* have a totally private economic exchange that cannot be detected by anyone else. And since it cannot be detected, it cannot be regulated, it cannot be prohibited, and it cannot be taxed. Even inflation cannot tax it, if the exchange is denominated in some money like silver or gold. Which means that those who dream of ruling the world sowed the seeds of their own damnation?

Jim Davidson, “Peak Culture”, Libertarian Enterprise, 2010-08-22

August 20, 2010

“C will not only let you shoot yourself in the foot, it will hand you a new magazine when you run out of bullets”

Filed under: History, Technology — Tags: , , — Nicholas @ 21:28

Charles Stross enumerates some of the ways “we went wrong” in the rush to today’s computing world:

According to one estimate pushed by the FBI in 2006, computer crime costs US businesses $67 billion a year. And identity fraud in the US allegedly hit $52.6Bn in 2004.

Even allowing for self-serving reporting (the FBI would obviously find it useful to inflate the threat of crime, if only to justify their budget requests), that’s a lot of money being pumped down a rat-hole. Extrapolate it worldwide and the figures are horrendous — probably nearer to $300Bn a year. To put it in perspective, it’s like the combined revenue (not profits; gross turnover) of Intel, Microsoft, Apple, and IBM — and probably a few left-overs like HP and Dell — being lost due to deliberate criminal activity.

Where does this parasitic drag come from? Where did we go wrong?

I’m compiling a little list, of architectural sins of the founders (between 1945 and 1990, more or less) that have bequeathed us the current mess. They’re fundamental design errors in our computing architectures; their emergent side-effects have permitted the current wave of computer crime to happen . . .

I make it a rule never to believe the order of magnitude claimed by a self-interested party about how much money is “lost” because of their current hobby-horse mopery and dopery. Even if the amount claimed by the FBI is off by an order of magnitude, that’s still serious money.

August 16, 2010

Practically speaking, the end is in sight for passwords

Filed under: Technology — Tags: , , , , , — Nicholas @ 10:37

Advances in computing are not always uniformly beneficial: short passwords are increasingly vulnerable to brute-force cracking:

The availability of password-cracking tools based on increasingly powerful graphics processors means that even carefully chosen short passwords are liable to crack under a brute-force attack.

A password of less than seven characters will soon be “hopelessly inadequate” even if it contains symbols as well as alphanumerical characters, according to computer scientists at the Georgia Tech Research Institute. The security researchers recommend passwords at least 12 characters long.

The number crunching abilities of graphics processors were recently applied to commercial password auditing and recovery tools from Russian developer ElcomSoft. It’s a safe assumption that black hats are able to use the same type of technology for less laudable purposes. Richard Boyd, of the Georgia Tech Research Institute, told the BBC that the number-crunching capacity of graphics cards compares to those of supercomputers built only 10 years ago.

Passwords are going to go away, sooner rather than later. All of us have too many passwords to remember that it’s pretty much guaranteed that you’re using one of the following coping strategies:

  • Using the same password on many different sites (or, shudder, all of them)
  • Using a simple password (among the most commonly used are “password” and “letmein”)
  • Leaving a sticky note on your monitor or your keyboard with your passwords listed
  • Using the name of the site as your password for that site

There are tools available to generate passwords that avoid the most obvious pitfalls (too short, no numeric or non-alphanumeric characters, using full words), but very few people use them consistently. I don’t know what the replacement for passwords will be, but we clearly need to move to more secure ways of verifying identity as soon as we can.

I’ve posted items about password security before.

August 11, 2010

Felicia Day talks about making The Guild

Filed under: Economics, Gaming, Media, Technology — Tags: , , — Nicholas @ 14:19

More at Fast Company.

August 9, 2010

IPv6 still not ready for primetime?

Filed under: Technology — Tags: , , — Nicholas @ 08:55

As you’ve probably heard, the current internet addressing system, IPv4, is running out of unallocated addresses. The replacement is called IPv6 and was supposed to be in use by now. Security concerns are holding it back:

The internet’s next-generation addressing scheme is so radically different from the current one that its adoption is likely to cause severe security headaches for those who adopt it, a researcher said last week.

With reserves of older addresses almost exhausted, the roll-out of the new scheme — known as IPv6 or Internet Protocol version 6 — is imminent. And yet, the radical overhaul still isn’t ready for prime time — in large part because IT professionals haven’t worked out a large number of security threats facing those who rely on it to route traffic over the net.

“It is extremely important for hackers to get in here fast because IPv6 is a security nightmare,” Sam Bowne, an instructor in the Computer Networking and Information Technology Department at the City College of San Francisco, said on day one of the Defcon hacker conference in Las Vegas. “We’re coming into a time of crisis and no one is ready.”

Chief among the threats is the issue of incompatible firewalls, intrusion-prevention devices, and other security appliances, Bowne said. That means many people who deploy IPv6 are forced to turn the security devices off, creating a dangerous environment that could make it easier for attackers to penetrate network fortresses.

« Newer PostsOlder Posts »

Powered by WordPress