I enjoy the challenges on AdventOfCode, but I must be missing something if people are able to solve these in under 1.5 minutes (faster than most can even read both of the prompts). What am I missing?
NPR notes today's "supercomputer-driven" weather modelling can crunch huge amounts of data to accurately forecast the weather a week in advance -- pointing out that "a six-day weather forecast today is as good as a two-day forecast was in the 1970s." Here's some highlights from their interview with Andrew Blum, author of The Weather Machine: A Journey Inside the Forecast : One of the things that's happened as the scale in the system has shifted to the computers is that it's no longer bound by past experience. It's no longer, the meteorologists say, "Well, this happened in the past, we can expect it to happen again." We're more ready for these new extremes because we're not held down by past expectations... The models are really a kind of ongoing concern. ... They run ahead in time, and then every six hours or every 12 hours, they compare their own forecast with the latest observations. And so the models in reality are ... sort of dancing together, where the model makes a forecast and it's corrected slightly by the observations that are coming in... It's definitely run by individual nations -- but individual nations with their systems tied together... It's a 150-year-old system of governments collaborating with each other as a global public good... The positive example from last month was with Cyclone Fani in India. And this was a very similar storm to one 20 years ago, that tens of thousands of people had died. This time around, the forecast came far enough in advance and with enough confidence that the Indian government was able to move a million people out of the way.
Read more of this story at Slashdot.
NASA's Artemis 1 mission notched up a new record today when it reached the farthest distance from Earth achieved by a human-rated spacecraft, breaking the previous record set by Apollo 13 on April 15, 1970. At about 4 pm EST, the uncrewed Orion spacecraft reached a distance of 268,563 miles (432,200 km) from Earth, as it sent back images that included the craft, the Earth, and the Moon in one shot.
From Jyn Erso and Chirrut Imwe to Director Krennic and Bor Gullet, Rogue One: A Star Wars Story is chock full of incredible characters. But only one of those characters (so far) has their very own spinoff series, and the actor behind him thinks upcoming episodes will change how you feel about the movie.
We’re talking, of course, about Diego Luna as Cassian Andor, who is at the center of Disney+’s Andor. Season one of the show just ended and it tracked how a lost, but willful person can be completely reprogrammed by the world around him and called to revolution. Season two of the show just began filming with an eye on a likely 2024 release—and, in the meantime, Luna talked about how those upcoming episodes might bring new context to the movie that will follow in their footsteps.
“That suicide mission in Rogue One, that’s for her,” Luna told Collider. “That’s for Maarva, that’s for his people, for his community. I love the arc that Tony [Gilroy] has built, and the arc ends in Rogue One, not in season two. I think it’s going to be quite amazing to watch Rogue One after you see season two. I think you’ll see a different film. For sure, you’ll understand the character from a different perspective, and you’ll be with him in a different way.”
If you haven’t seen Rogue One in awhile, we first meet Cassian as a full-on leader and spy extraordinaire. He learns about what ends up being the Death Star, kills the source, and is off and running. Throughout, he seems not just determined and loyal to the Rebellion; it’s life or death to him. All of which means season two is going see Cassian becoming more and more involved in the Rebellion, and more and more disillusioned with the Empire.
Head over to Collider to read much more because it’s a long, excellent interview.
Want more io9 news? Check out when to expect the latest Marvel, Star Wars, and Star Trek releases, what’s next for the DC Universe on film and TV, and everything you need to know about James Cameron’s Avatar: The Way of Water.
ZDNet asks: why is everyone getting remote working wrong? Researchers at tech analyst Gartner believe a rigid requirement to return to offices is a mistake. But the researchers also believe so-called "hybrid" schedules often are also flawed: "Most of those work models delivered below-average outcomes," the research found, and the common factor was some kind of rigid on-site requirement. Much more successful was a "hybrid-flexible" set-up offering leaders and employees the opportunity to choose where they work from. But most successful by far were workplaces that offered this flexibility and also included elements of "intentional collaboration and empathy-based management", where bosses don't force staff to come to the office just to keep an eye on them. How the working week is organized matters: get it right, and staff are more likely to want to stay, and more likely to perform well. Autonomy also reduces fatigue, which in turn means workers are likely to sustain good performance over time. ZDNet also tested virtual reality meetings — concluding they're "still undeniably somewhat clunky and can make you feel a bit awkward." But at the same time, "I was also surprised by how much benefit they could potentially deliver." Sure, a meeting with avatars that only look a bit like your colleagues, in a fantasy meeting room that wouldn't look out of place in a Bond villain's lair does feel a bit ridiculous. But it also — and this was the revelation to me — adds a level of engagement that you just don't get from a video meeting of colleagues occupying flat tiles on a screen. It provides a sense of being there (wherever 'there' was) that adds meaning beyond what you get from staring into a monitor. I'm not saying I want to have every meeting in VR from now on: far from it. But we have to see the present state of hybrid and remote working as just the current state of the art, and to keep experimenting, and thinking, about the way we work.
Read more of this story at Slashdot.
Autonomous vacuum maker iRobot is a lot like Tesla, not necessarily by reinventing an existing concept — vacuums, robots and electric cars all existed before these two companies came on the scene — but by imbuing their products with that intangible quirk that makes people sit up and take notice. Just as Tesla ignited the public's imagination as to what an electric car could be and do, iRobot has expanded our perception of how domestic robots can fit into our homes and lives.
More than two dozen leading experts from across the technology sector have come together in ‘You Are Not Expected to Understand This’: How 26 Lines of Code Changed the World to discuss how seemingly innocuous lines of code have fundamentally shaped and hemmed the modern world. In the excerpt below, Upshot Deputy Editor Lowen Liu, explores the development of iRobot's Roomba vacuum and its unlikely feline brand ambassadors.
Excerpted with permission from ‘You Are Not Expected to Understand This’: How 26 Lines of Code Changed the World edited by Torie Bosch. Published by Princeton University Press. Copyright © 2022. All rights reserved.
According to Colin Angle, the CEO and cofounder of iRobot, the Roomba faced some early difficulties before it was rescued by two events. The disc-shaped robot vacuum had gotten off to a hot start in late 2002, with good press and a sales partner in the novelty chain store Brookstone. Then sales started to slow, just as the company had spent heavily to stock up on inventory. The company found itself on the other side of Black Friday in 2003 with thousands upon thousands of Roombas sitting unsold in warehouses.
Then around this time, Pepsi aired a commercial starring comedian Dave Chappelle. In the ad, Chappelle teases a circular robot vacuum with his soft drink while waiting for a date. The vacuum ends up eating the comedian’s pants—schlupp. Angle remembers that at a team meeting soon after, the head of e-commerce said something like: “Hey, why did sales triple yesterday?” The second transformative moment for the company was the rapid proliferation of cat videos on a new video-sharing platform that launched at the end of 2005. A very specific kind of cat video: felines pawing suspiciously at Roombas, leaping nervously out of Roombas’ paths, and, of course, riding on them. So many cats, riding on so many Roombas. It was the best kind of advertising a company could ask for: it not only popularized the company’s product but made it charming. The Roomba was a bona fide hit.
By the end of 2020, iRobot had sold 35 million vacuums, leading the charge in a booming robot vacuum market.
The Pepsi ad and the cat videos appear to be tales of early days serendipity, lessons on the power of good luck and free advertising. They also appear at first to be hardware stories— stories of cool new objects entering the consumer culture. But the role of the Roomba’s software can’t be underestimated. It’s the programming that elevates the round little suckers from being mere appliances to something more. Those pioneering vacuums not only moved, they decided in some mysterious way where to go. In the Pepsi commercial, the vacuum is given just enough personality to become a date-sabotaging sidekick. In the cat videos the Roomba isn’t just a pet conveyer, but a diligent worker, fulfilling its duties even while carrying a capricious passenger on its back. For the first truly successful household robot, the Roomba couldn’t just do its job well; it had to win over customers who had never seen anything like it.
Like many inventions, the Roomba was bred of good fortune but also a kind of inevitability. It was the brainchild of iRobot’s first hire, former MIT roboticist Joe Jones, who began trying to make an autonomous vacuum in the late 1980s. He joined iRobot in 1992, and over the next decade, as it worked on other projects, the company developed crucial expertise in areas of robotics that had nothing to do with suction: it developed a small, efficient multithreaded operating system; it learned to miniaturize mechanics while building toys for Hasbro; it garnered cleaning know-how while building large floor sweepers for SC Johnson; it honed a spiral-based navigation system while creating mine-hunting robots for the US government. It was a little like learning to paint a fence and wax a car and only later realizing you’ve become a Karate Kid.
The first Roombas needed to be cheap—both to make and (relatively) to sell—to have any chance of success reaching a large number of American households. There was a seemingly endless list of constraints: a vacuum that required hardly any battery power, and navigation that couldn’t afford to use fancy lasers—only a single camera. The machine wasn’t going to have the ability to know where it was in a room or remember where it had been. Its methods had to be heuristic, a set of behaviors that combined trial and error with canned responses to various inputs. If the Roomba were “alive,” as the Pepsi commercial playfully suggested, then its existence would more accurately have been interpreted as a progression of instants—did I just run into something? Am I coming up to a ledge? And if so, what should I do next? All conditions prepared for in its programming. An insect, essentially, reacting rather than planning.
And all this knowledge, limited as it was, had to be stuffed inside a tiny chip within a small plastic frame that also had to be able to suck up dirt. Vacuums, even handheld versions, were historically bulky and clumsy things, commensurate with the violence and noise of what they were designed to do. The first Roomba had to eschew a lot of the more complicated machinery, relying instead on suction that accelerated through a narrow opening created by two rubber strips, like a reverse whistle.
But the lasting magic of those early Roombas remains the way they moved. Jones has said that the navigation of the original Roomba appears random but isn’t—every so often the robot should follow a wall rather than bounce away from it. In the words of the original patent filed by Jones and Roomba cocreator Mark Chiappetta, the system combines a deterministic component with random motion. That small bit of unpredictability was pretty good at covering the floor—and also made the thing mesmerizing to watch. As prototypes were developed, the code had to account for an increasing number of situations as the company uncovered new ways for the robot to get stuck, or new edge cases where the robot encountered two obstacles at once. All that added up until, just before launch, the robot’s software no longer fit on its allotted memory. Angle called up his cofounder, Rodney Brooks, who was about to board a transpacific flight. Brooks spent the flight rewriting the code compiler, packing the Roomba’s software into 30 percent less space. The Roomba was born.
In 2006 Joe Jones moved on from iRobot, and in 2015 he founded a company that makes robots to weed your garden. The weeding robots have not, as yet, taken the gardening world by storm. And this brings us to perhaps the most interesting part of the Roomba’s legacy: how lonely it is.
You’d be in good company if you once assumed that the arrival of the Roomba would open the door to an explosion of home robotics. Angle told me that if someone went back in time and let him know that iRobot would build a successful vacuum, he would have replied, “That’s nice, but what else did we really accomplish?” A simple glance around the home is evidence enough that a future filled with robots around the home has so far failed to come true. Why? Well for one, robotics, as any roboticist will tell you, is hard. The Roomba benefited from a set of very limited variables: a flat floor, a known range of obstacles, dirt that is more or less the same everywhere you go. And even that required dozens of programmed behaviors.
As Angle describes it, what makes the Roomba’s success so hard to replicate is how well it satisfied the three biggest criteria for adoption: it performed a task that was unpleasant; it performed a task that had to be done relatively frequently; and it was affordable. Cleaning toilets is a pain but not done super frequently. Folding laundry is both, but mechanically arduous. Vacuuming a floor, though—well, now you’re talking.
Yet for all the forces that led to the creation of the Roomba, its invention alone wasn’t a guarantee of success. What is it that made those cat videos so much fun? It’s a question that lies close to the heart of the Roomba’s original navigation system: part determinism, part randomness. My theory is that it wasn’t just the Roomba’s navigation that endeared it to fans—it was how halting and unpredictable that movement could be. The cats weren’t just along for an uneventful ride; they had to catch themselves as the robot turned unexpectedly or hit an object. (One YouTuber affectionately described the vacuum as “a drunk coming home from the bar.”) According to this theory, it’s the imperfection that is anthropomorphic. We are still more likely to welcome into our homes robots that are better at slapstick than superhuman feats. It’s worth noting that the top-of-the-line Roomba today will map your rooms and store that map on an app, so that it can choose the most efficient lawnmower-like cleaning path. In these high-end models, the old spiral navigation system is no longer needed. Neither is bumping into walls.
Watching one of these Roombas clean a room is a lot less fun than it used to be. And it makes me wonder what the fate of the Roomba may have been had the first ever robot vacuum launched after the age of smartphones, already armed with the capacity to roll through rooms with precise confidence, rather than stumble along. It’s not always easy, after all, to trust someone who seems to know exactly where they are going.
It’s hard to even imagine. A world ravaged by climate change. People totally consumed by technology. Mega corporations in control of everything. Robots performing menial tasks. Wait, did we say “hard” to imagine? We meant we’re literally living it. The “it” being Wall-E, Pixar’s 2008 Oscar-winning masterpiece co-written and directed by Andrew Stanton.
The tale of a lone robot left to clean up the Earth who finds himself on an intergalactic adventure to protect the future of the planet wowed audiences when it was released and is considered to be one of Pixar’s best films to date. Since then, Wall-E has only gotten more poignant and been more revered, so it’s only fitting that, on November 22, it becomes Pixar’s first film ever released by the Criterion Collection, a company specializing in the best, most comprehensive, obsessive Blu-ray releases around.
To mark the occasion, io9 sat for a video chat with Wall-E’s director to find out how the film made it to Criterion, what his favorite special features are, what he thinks about our world being so close to Wall-E’s, and whether there was ever talk of a sequel or theme park ride—as well as his work on Obi-Wan Kenobi and For All Mankind. Check it out.
Germain Lussier, io9: So how did you find out that the
movie is going to be a part of the Criterion Collection? Because
that was a big deal and it’s Pixar’s first
Andrew Stanton: I approached them. I pressed them as a filmmaker. This was not a studio thing. It was me asking as a favor to Alan Bergman, who is the president of Walt Disney Studios, and saying, “Look, I’ve been out in the world making TV shows for about seven years. I’ve met so many people in the industry now, filmmakers that I revere, filmmakers that are budding, that really sort of get the cinema DNA and inspirations that were in the molecules of Wall-E.” I made it with such a love of cinema. It was great to see that it had that effect on on a lot of peers and I felt like there’s something there that qualifies it to possibly be in their library. And so I said, “Can I ask them?” Because I know it breaks precedent with what Disney does so, it was a bit of a favor, and he said, “Well, if Criterion bites, yeah, we’ll see if we can make it work.” And so that was in 2019. Then the pandemic hit and everything just paused. They said yes. But it was very frustrating because then the world just stopped. Then it was really last year that we got very serious about it.
And the real question was “What’s the Criterion angle on this?” We’ve done such a good job and a thorough job of showing the behind-the-scenes on other DVDs. So I really left it up to them. And [Criterion producer] Kim Hendrickson and the rest of their wonderful team really just drilled down. I let them lead about “What is interesting to you guys? What is it you guys want to know?” So that really led the angle on all the doc materials and the booklet and everything. I’ve been a consumer of Criterion since they existed in the late ‘80s. So I was pleased as punch to see everything from the cover to what their perspective was and what was interesting to them, because I feel a lot of the times [Pixar] DVDs get used as a babysitter, and they’re not necessarily going to the crowd that we want to talk to, because I would love to talk to other people that love film as much. And so I feel like, “Oh, this is finally for an audience that I would be in.”
io9: Yeah, it’s my favorite Pixar movie, so going through the disc and exploring a little bit was excellent. Now, you buy a Criterion for the transfer, the sound, but mostly the features. And here there’s just so much. So, if someone buys this disc, they watch the movie—but after that, what’s the first thing they should go watch and why?
Stanton: Well, it’s hard for me to know if there’s a better order, but I find it fascinating to be able to finally do a Master Class and just talk about the actual under-the-hood work that we do [at Pixar], and how much we really control and work on and nuance the story down to a beat-by-beat level. I mean, I could have done that with any scene and any other filmmaker in the studio could have done that with their movies and their scenes. And so it was a chance to slow down and actually have a literal Master Class. And then I also loved being able to talk about all the cinematic influences because again, we’re such filmgoers first and filmmakers second that—any one of these films, but I think particularly Wall-E—had such deep, deep, deep influences from some of the earliest cinematic movies. There really was such a major Keaton and Chaplin influence. So I think it’s great to sort of see how cinema from any era keeps inspiring the latest films. That it just keeps passing it on.
io9: One of the things I did watch was the Master Class and it was really, really good. And I also watched the “Wall-E A to Z” feature that you guys did for this.
Stanton: To me, we could have gone A to... If that alphabet was twice as long we could have kept finding things.
io9: Oh for sure. I bring it up though because I found it interesting how it really spoke to the way Wall-E was ahead of its time, or at least forward-looking with a lot of things—technology, the terrible world we’re in. So out of all those things that our world has in common with Wall-E, does anything, in particular, stand out, for better or worse?
Stanton: Well, I certainly didn’t expect to be seeing the dire state of the world climate-wise in such a short amount of time. Didn’t want to be right about that! And I’ve noted back at the time of press for the movie when it originally released, that wasn’t something that I was preaching. I just sort of leveraged off of the truth of what I’d always thought. I was raised in the ‘60s and ‘70s not to pollute and that the environment is fragile. That was always in my world and culture. So I just went with that logic to get this robot alone. I wasn’t hoping to be right. I wasn’t being a Lorax, but I was not anti. So I’m horrified that I was right in that regard.
The other thing that happened, equal or greater, than I expected, was the siloing of everybody and their technology. I knew I was right about that. I was one of the first adopters of an iPhone and I was like “This is like smoking cigarettes.” I can’t stop it, you know? I just knew. And I was just sitting getting coffee this morning in New York and watching everybody pass by on their way to work and counting. And it was like one in every six people was looking forward and everybody else was just looking at their iPhones and not navigating. I’m like, “Oh my God, I’m sitting on the Axiom right now.”
io9: That’s hilarious-slash-terrifying. But okay.
The movie has this distinguished legacy but it’s also one of
the few Pixar movies from that time that didn’t get a sequel.
I get that the credits are kind of the sequel but did Disney ever
pressure you guys to say like, “Hey, any thoughts on a
Stanton: I’ve been getting this question since 1995.
Stanton: And everybody wants Disney to be the big bad guy. And I’m sure that they sometimes are on things. But for [Pixar], they’ve always said is “Whatever you guys want to do, we just would love a sequel whenever it comes to you naturally.” Economically, [Pixar] wouldn’t exist if we didn’t have our third feature be Toy Story 2, and if we didn’t continue to try and find other ways. So we try to find them organically and we try to find them honestly. And we certainly don’t want to spend four years working on a lesser-than product because that’s just too much of your life. And, frankly, having been behind several sequels, after about six months, it’s an original. Anything you think you gain from it, it’s sometimes even harder to crack.
So there’s never pressure from them like, “We need exactly this at this time.” We’ve never had that. But we’ve had our own private pressure of like, “How do we keep a balance so that we can keep the lights on?” or else you guys don’t get to watch anything ever again. It’s always been that. So there’s not any “If you left us alone, we’d never make a sequel.” But Wall-E just never felt right to me. I mean, I’m not anti and I’m very sober to the fact that I don’t own this movie. They can do whatever they want with it. And if I get hit by a bus tomorrow, who knows? But it doesn’t feel like it’s asking for that. And on the success chart of our movies, it wasn’t one of the bigger moneymakers. So I don’t even feel like the crass business guy is going “We need another one.” So it kind of protects it a bit.
io9: One of the other things Disney likes to do,
obviously, is theme park rides and pretty much—not all of
them, but a lot—of the Pixar movies from that era are in
theme parks as an attraction. Wall-E obviously has a
million things merch-wise and it’s honestly a little bit more
pessimistic towards the world, at least at the start, but were
there ever talks about bringing the movie into the parks as a
Stanton: Again, that’s a direct reflection of it wasn’t that big of a box office movie. It did that sweet spot of it did just well enough that nobody’s embarrassed by it, but it did just low enough that everybody is like, we’re just going to let that move on. And it’s kind of stayed pure in that sense.
io9: Gotcha. Now, you said you approached Criterion for this. You were a fan. So were there any features or materials you had been sitting on in case something like this ever came to pass?
Stanton: No. I think the thing that was frustrating though, still even on making this disc, is we shot so much behind the scenes [footage]. We just let the cameras run in so many meetings and I think our Criterion producer Kim Hendrickson saw more than I’ve ever seen. And she said that they could have made a whole box set of just watching how we make the donuts, you know? Which is frustrating because there’s so much stuff that we do that uses other materials. Like sometimes other music and we’ll never be able to show it because we don’t have the rights to the music. It’ll always be a bit of frustration that we can never really, really, really, really show a Get Back, behind-the-scenes talk.
io9: Yeah that would be incredible. Okay, I’ll
come back to Wall-E but as you can see [from the art]
behind me, I’m obviously a huge Star Wars fan. And
you helped write the final two episodes of Obi-Wan Kenobi
which have some really crucial moments in Star Wars
history. So I want to know, what’s the process for that?
Obviously, you want to tell a great story. But also with Star
Wars, it’s got to fit in with all the canon and
everything else. So how did that work out?
Stanton: That was the blessing and the curse of it. It’s like one, you’re geeking out that you get to type “Vader says” this and “Kenobi says” that. You pause and say “I can’t believe I’m actually getting paid to type this. I can’t believe these words may be said.” But then another part of you, it has to go through such a rigorous like “Does that fit the canon?” And I feel like it’s bittersweet. [The reason that happens is] because people care, but it also kind of doesn’t allow, sometimes, things to venture beyond where maybe they should to tell a better story. So it can sometimes really handicap what I think are better narrative options.
And so I was frustrated sometimes—not a lot—but I just felt it wasn’t as conducive to [the story]. So I love it when something like Andor is in a safe spot. And it can just do whatever the heck it wants. But I felt, you know, Joby [Harold, Obi-Wan Kenobi co-writer and executive producer], to his credit, kept the torch alive and kept trying to thread the needle so that the story wouldn’t suffer but it would please all the people that were trying to keep it in the canon. But I got some moments in there that I’m very happy with.
io9: Yeah, that sounds like a tough balance. Thank you. The other show you’ve been working on in the last couple of years is For All Mankind, which I recently caught up on and loved. What is it like working on something that is obviously so good, but it’s a little under the radar—and then also, did any of your space knowledge from Wall-E translate over?
Stanton: Well, we had a lot of NASA consultants at the time for Wall-E. And so it felt like I’d done a little bit of research. I mean, [For All Mankind’s] stuff is so thoroughly vetted by the writers’ room and the showrunners, and we have a consultant on set and an astronaut that’s actually there. And so you know that usually by the time you’re shooting and you’re reading what the scene is, that it’s already been vetted. But I just geek out and want to do it correctly. I love as a storyteller, working within those limitations. Like this is what would really happen, there wouldn’t be a window here, they float at this moment, they wouldn’t float here. I just love that challenge of just going, “Okay, then how do you tell that moment?” It’s such a great crew and show and I was pleased as punch to be able to come back and work with the same family again.
io9: Oh it’s the best. Finally, to wrap up back on Wall-E, it was a critical hit. Now we have this Criterion disc. Over a decade later, when you look back at it, what are you most proud of with the film?
Stanton: That you get just as caught up now. That’s all I care about. That’s the drug for me, still. I just want the lights to go down, and I want to be fully engaged and forget where I am, forget who I am, and then the lights come up, and I was just 100% in. And that’s really all it is that I’m trying to find again with every movie I buy a ticket for, and trying to do with every scene if I’m behind the telling of something. And I could tell I was hitting a real pure vein for so much of Wall-E. And it’s nice to come back to it now and feel that that hasn’t faded. You can just get just as caught up in it as you did on day one. It’s like having a song where everything’s just harmonized so well and you pick the arrangements just right. You don’t see a way to improve it. Plus, it’s a hummable tune. It’s something that your foot taps against your will. I feel like you don’t get to say when you’ve found songs that are that strong, and the same with movies, and I thought I did at the time. And it’s nice to look back and go, “Oh yeah, I did.”
Yes. Yes, he did. The Wall-E Criterion Collection disc
is out November 22.
Want more io9 news? Check out when to expect the latest Marvel, Star Wars, and Star Trek releases, what’s next for the DC Universe on film and TV, and everything you need to know about James Cameron’s Avatar: The Way of Water.
Great scientists become immortalized in various ways.
Some through names for obscure units of measurement (à la Hertz, Faraday and Curie). Others in elements on the periodic table (Mendeleev, Seaborg, Bohr, among many others). A few become household names symbolizing genius — like Newton in centuries past and nowadays, Einstein. But only one has been honored on millions and millions of cartons of milk: the French chemist, biologist and evangelist for experimental science Louis Pasteur.
Pasteur was born 200 years ago this December, the most significant scientist birthday bicentennial since Charles Darwin’s in 2009. And Pasteur ranked behind only Darwin among the most exceptional biological scientists of the 19th century.
Pasteur not only made milk safe to drink, but also rescued the beer and wine industry. He established the germ theory of disease, saved the French silkworm population, confronted the scourges of anthrax and rabies, and transformed the curiosity of vaccination against smallpox into a general strategy for treating and preventing human diseases. He invented microbiology and established the foundations for immunology.
Had he been alive after 1901, when Nobel Prizes were first awarded, he would have deserved one every year for a decade. No other single scientist demonstrated more dramatically the benefit of science for humankind.
He was not, however, exactly a saint. A Pasteur biographer, Hilaire Cuny, called him “a mass of contradictions.” Pasteur was ambitious and opportunistic, sometimes arrogant and narrow-minded, immodest, undiplomatic and uncompromising. In the scientific controversies he engaged in (and there were many), he was pugnacious and belligerent. He did not suffer criticism silently and was often acerbic in his responses. To his laboratory assistants, he was demanding, dictatorial and aloof. Despite his revolutionary spirit in pursuing science, in political and social matters, he was conformist and deferential to authority.
And yet he was a tireless worker, motivated by service to humankind, faithful to his family and unwaveringly honest. He was devoted to truth, and therefore also to science.
In his youth, Pasteur did not especially excel as a student. His interests inclined toward art rather than science, and he did display exceptional skill at drawing and painting. But in light of career considerations (his father wanted him to be a scholar), Pasteur abandoned art for science and so applied to the prestigious École Normale Supérieure in Paris for advanced education. He finished 15th in the competitive entrance examination, good enough to secure admission. But not good enough for Pasteur. He spent another year on further studies emphasizing physical sciences and then took the École Normale exam again, finishing fourth. That was good enough, and he entered the school in 1843. There he earned his doctoral degree, in physics and chemistry, in 1847.
Among his special interests at the École Normale was crystallography. In particular he was drawn to investigate tartaric acid. It’s a chemical found in grapes responsible for tartar, a potassium compound that collects on the surfaces of wine vats. Scientists had recently discovered that tartaric acid possesses the intriguing power of twisting light — that is, rotating the orientation of light waves’ vibrations. In light that has been polarized (by passing it through certain crystals, filters or some sunglasses), the waves are all aligned in a single plane. Light passing through a tartaric acid solution along one plane emerges in a different plane.
Even more mysteriously, another acid (paratartaric acid, or racemic acid), with the exact same chemical composition as tartaric acid, did not twist light at all. Pasteur found that suspicious. He began a laborious study of the crystals of salts derived from the two acids. He discovered that racemic acid crystals could be sorted into two asymmetric mirror-image shapes, like pairs of right-handed and left-handed gloves. All the tartaric acid crystals, on the other hand, had shapes with identical asymmetry, analogous to gloves that were all right-handed.
Pasteur deduced that the asymmetry in the crystals reflected the asymmetric arrangement of atoms in their constituent molecules. Tartaric acid twisted light because of the asymmetry of its molecules, while in racemic acid, the two opposite shapes canceled out each other’s twisting effects.
Pasteur built the rest of his career on this discovery. His research on tartaric acid and wine led eventually to profound realizations about the relationship between microbes and human disease. Before Pasteur, most experts asserted that fermentation was a natural nonbiological chemical process. Yeast, a necessary ingredient in the fermenting fluid, was supposedly a lifeless chemical acting as a catalyst. Pasteur’s experiments showed yeast to be alive, a peculiar kind of “small plant” (now known to be a fungus) that caused fermentation by biological activity.
Pasteur demonstrated that, in the absence of air, yeast acquired oxygen from sugar, converting the sugar to alcohol in the process. “Fermentation by yeast,” he wrote, is “the direct consequence of the processes of nutrition,” a property of a “minute cellular plant … performing its respiratory functions.” Or more succinctly, he proclaimed that “fermentation … is life without air.” (Later scientists found that yeast accomplished fermentation by emitting enzymes that catalyzed the reaction.)
Pasteur also noticed that additional microorganisms present during fermentation could be responsible for the process going awry, a problem threatening the viability of French winemaking and beer brewing. He solved that problem by developing a method of heating that eliminated the bad microorganisms while preserving the quality of the beverages. This method, called “pasteurization,” was later applied to milk, eliminating the threat of illness from drinking milk contaminated by virulent microorganisms. Pasteurization became standard public health practice in the 20th century.
Incorporating additional insights from studies of other forms of fermentation, Pasteur summarized his work on microbial life in a famous paper published in 1857. “This paper can truly be regarded as the beginning of scientific microbiology,” wrote the distinguished microbiologist René Dubos, who called it “one of the most important landmarks of biochemical and biological sciences.”
Pasteur’s investigations of the growth of microorganisms in fermentation collided with another prominent scientific issue: the possibility of spontaneous generation of life. Popular opinion even among many scientists held that microbial life self-generated under the proper conditions (spoiled meat, for example). Demonstrations by the 17th century Italian scientist Francesco Redi challenged that belief, but the case against spontaneous generation was not airtight.
In the early 1860s Pasteur undertook a series of experiments that should have left no doubt that spontaneous generation, under conditions encountered on Earth today, was an illusion. Yet he was nevertheless accosted by critics, such as the French biologist Charles-Philippe Robin, to whom he returned verbal fire. “We trust that the day will come when M. Robin will … acknowledge that he has been in error on the subject of the doctrine of spontaneous generation, which he continues to affirm, without adducing any direct proofs in support of it,” Pasteur remarked.
It was his work on spontaneous generation that led Pasteur directly to the development of the germ theory of disease.
For centuries people had suspected that some diseases must be transmitted from person to person by close contact. But determining exactly how that happened seemed beyond the scope of scientific capabilities. Pasteur, having discerned the role of germs in fermentation, saw instantly that something similar to what made wine go bad might also harm human health.
After disproving spontaneous generation, he realized that there must exist “transmissible, contagious, infectious diseases of which the cause lies essentially and solely in the presence of microscopic organisms.” For some diseases, at least, it was necessary to abandon “the idea of … an infectious element suddenly originating in the bodies of men or animals.” Opinions to the contrary, he wrote, gave rise “to the gratuitous hypothesis of spontaneous generation” and were “fatal to medical progress.”
His first foray into applying the germ theory of disease came during the late 1860s in response to a decline in French silk production because of diseases afflicting silkworms. After success in tackling the silkworms’ maladies, he turned to anthrax, a terrible illness for cattle and humans alike. Many medical experts had long suspected that some form of bacteria caused anthrax, but it was Pasteur’s series of experiments that isolated the responsible microorganism, verifying the germ theory beyond doubt. (Similar work by Robert Koch in Germany around the same time provided further confirmation.)
Understanding anthrax’s cause led to the search for a way to prevent it. In this case, a fortuitous delay in Pasteur’s experiments with cholera in chickens produced a fortunate surprise. In the spring of 1879 he had planned to inject chickens with cholera bacteria he had cultured, but he didn’t get around to it until after his summer vacation. When he injected his chickens in the fall, they unexpectedly failed to get sick. So Pasteur prepared a fresh bacterial culture and brought in a new batch of chickens.
When both the new chickens and the previous batch were given the fresh bacteria, the new ones all died, while nearly all of the original chickens still remained healthy. And so, Pasteur realized, the original culture had weakened in potency over the summer and was unable to cause disease, while the new, obviously potent culture did not harm the chickens previously exposed to the weaker culture. “These animals have been vaccinated,” he declared.
Vaccination, of course, had been invented eight decades earlier, when British physician Edward Jenner protected people from smallpox by first exposing them to cowpox, a similar disease acquired from cows. (Vaccination comes from cowpox’s medical name, vaccinia, from vacca, Latin for cow.) Pasteur realized that the chickens surprisingly displayed a similar instance of vaccination because he was aware of Jenner’s discovery. “Chance favors the prepared mind,” Pasteur was famous for saying.
Because of his work on the germ theory of disease, Pasteur’s mind was prepared to grasp the key role of microbes in the prevention of smallpox, something Jenner could not have known. And Pasteur instantly saw that the specific idea of vaccination for smallpox could be generalized to other diseases. “Instead of depending on the chance finding of naturally occurring immunizing agents, as cowpox was for smallpox,” Dubos observed, “it should be possible to produce vaccines at will in the laboratory.”
Pasteur cultured the anthrax microbe and weakened it for tests in farm animals. Success in such tests not only affirmed the correctness of the germ theory of disease, but also allowed it to gain a foothold in devising new medical practices.
Later Pasteur confronted an even more difficult microscopic foe, the virus that causes rabies. He had begun intense experiments on rabies, a horrifying disease that’s almost always fatal, caused usually by the bites of rabid dogs or other animals. His experiments failed to find any bacterial cause for rabies, leading him to realize that it must be the result of some agent too small to see with his microscope. He could not grow cultures in lab dishes of what he could not see. So instead he decided to grow the disease-causing agent in living tissue — the spinal cords of rabbits. He used dried-out strips of spinal cord from infected rabbits to vaccinate other animals that then survived rabies injections.
Pasteur hesitated to test his rabies treatment on humans. Still, in 1885 when a mother brought to his lab a 9-year-old boy who had been badly bitten by a rabid dog, Pasteur agreed to administer the new vaccine. After a series of injections, the boy recovered fully. Soon more requests came for the rabies vaccine, and by early the next year over 300 rabies patients had received the vaccine and survived, with only one death among them.
Popularly hailed as a hero, Pasteur was also vilified by some hostile doctors, who considered him an uneducated interloper in medicine. Vaccine opponents complained that his vaccine was an untested method that might itself cause death. But of course, critics had also rejected Pasteur’s view of fermentation, the germ theory of disease and his disproof of spontaneous generation.
Pasteur stood his ground and eventually prevailed (although he did not turn out to be right about everything). His attitude and legacy of accomplishments inspired 20th century scientists to develop vaccines for more than a dozen deadly diseases. Still more diseases succumbed to antibiotics, following the discovery of penicillin by Alexander Fleming — who declared, “Without Pasteur I would have been nothing.”
Even in Pasteur’s own lifetime, thanks to his defeat of rabies, his public reputation was that of a genius.
As geniuses go, Pasteur was the opposite of Einstein. To get inspiration for his theories, Einstein imagined riding aside a light beam or daydreamed about falling off a ladder. Pasteur stuck to experiments. He typically initiated his experiments with a suspected result in mind, but he was scrupulous in verifying the conclusions he drew from them. Preconceived ideas, he said, can guide the experimenter’s interrogation of nature but must be abandoned in light of contrary evidence. “The greatest derangement of the mind,” he declared, “is to believe in something because one wishes it to be so.”
So even when Pasteur was sure his view was correct, he insisted on absolute proof, conducting many experiments over and over with variations designed to rule out all but the true interpretation.
“If Pasteur was a genius, it was not through ethereal subtlety of mind,” wrote Pasteur scholar Gerald Geison. Rather, he exhibited “clear-headedness, extraordinary experimental skill and tenacity — almost obstinacy — of purpose.”
His tenacity, or obstinacy, helped him persevere through several personal tragedies, such as the deaths of three of his daughters, in 1859, 1865 and 1866. And then in 1868 he suffered a cerebral hemorrhage that left him paralyzed on his left side. But that did not slow his pace or impair continuing his investigations.
“Whatever the circumstances in which he had to work, he never submitted to them, but instead molded them to the demands of his imagination and his will,” Dubos wrote. “He was probably the most dedicated servant that science ever had.”
To the end of his life, Pasteur remained dedicated to science and the scientific method, stressing the importance of experimental science for the benefit of society. Laboratories are “sacred institutions,” he asserted. “Demand that they be multiplied and adorned; they are the temples of wealth and of the future.”
Three years before his death in 1895, Pasteur further extolled the value of science and asserted his optimism that the scientific spirit would prevail. In an address, delivered for him by his son, at a ceremony at the Sorbonne in Paris, he expressed his “invincible belief … that science and peace will triumph over ignorance and war, that nations will unite, not to destroy, but to build, and that the future will belong to those who will have done most for suffering humanity.”
Two hundred years after his birth, ignorance and war remain perniciously prominent, as ineradicable as the microbes that continue to threaten public health, with the virus causing COVID-19 the latest conspicuous example. Vaccines, though, have substantially reduced the risks from COVID-19, extending the record of successful vaccines that have already tamed not only smallpox and rabies, but also polio, measles and a host of other once deadly maladies.
Yet even though vaccines have saved countless millions of lives, some politicians and so-called scientists who deny or ignore overwhelming evidence continue to condemn vaccines as more dangerous than the diseases they prevent. True, some vaccines can induce bad reactions, even fatal in a few cases out of millions of vaccinations. But shunning vaccines today, as advocated in artificially amplified social media outrage, is like refusing to eat because some people choke to death on sandwiches.
Today, Pasteur would be vilified just as he was in his own time, probably by some people who don’t even realize that they can safely drink milk because of him. Nobody knows exactly what Pasteur would say to these people now. But it’s certain that he would stand up for truth and science, and would be damn sure to tell everybody to get vaccinated.
Dan Hon (previously at BB) noticed that Star Trek's meetings and conferences always involve military officers, usually occur with ample time for preparation, yet invariably has them just talking to one another. If there are any graphics involved, they are simple, concise and expressive.
This is of course nothing whatsoever like any military on earth
or off it. So Hon decided to photoshop what such meetings would
actually entail: PowerPoint, and lots of it.
Sorry not sorry. Bajoran Stability / Maquis Dynamics - GOVERNANCE
Heres "Overall Weekly Dominion Attack Trends for Stardate 51145.3 - 51247.5"
Overall Weekly Dominion Attack Trends
Stardate 51145.3 - 51247.5 pic.twitter.com/uL7jZWCyUS
— dan hon is back (@hondanhon) July 19, 2019
As reviewed by Lt. Cmdrs. Worf, Data, and LaForge, and Capt. Picard:
L-R: Worf, Data, Geordi and Picard review the latest overall weekly Dominion attack trends. pic.twitter.com/wACdfEC1vP
— dan hon is back (@hondanhon) July 19, 2019
Dave Rutledge, however, plays for the other team:
It's now much easier to ask for permission to fly drones in controlled airspace even if you're only doing it for fun. The FAA is giving recreational drone pilots access to the Low Altitude Authorization and Notification Capability (LAANC) system -- t...
As we all know, Wyze uses a linux kernel, so, adding NFS (or SMB or...) shouldn't be that difficult to do.
Well, the same author that found out how to use the Sensors without the need of a hub, also has a way to enable NFS share support of the WyzeCam. This means that you can have your WyzeCam write directly to a NFS share, and not the microSD card, and from there, you could write the files to a cloud service of your choice, or do many things that wasn't possible before.
Currently, I am doing a cron job to concat every hour's worth of data, then do some external processing on the footage.
For the info on how this was done, read
For the needed files, you need to clone (or...) https://github.com/HclX/WyzeHacks
If Wyze would just enable this from the start, and even offer different protocols like SMB, their cams would become so much more popular.
This week the New York Times published a five-years-later retrospective on Gamergate and its aftereffects, which is chilling and illuminating, and you should go read it. It makes an excellent case — several excellent written cases, actually — that “everything is Gamergate,” that it and its hate-screeching online mobs were the prototype for all the culture and media wars since and to come.
Sadly, the lesson expounded herein by the NYT is one which they — and other media — do not yet seem to have actually learned themselves.
Let’s look at another piece which called Gamergate a template for cultural warfare, using the media as a battleground. This one was written back in 2014, by one Kyle Walker, in Deadspin, and its scathing, take-no-prisoners real-time analysis was downright prophetic. A few of its most important passages:
Gamergate is […] a relatively small and very loud group of video game enthusiasts who claim that their goal is to audit ethics in the gaming-industrial complex and who are instead defined by the campaigns of criminal harassment that some of them have carried out against several women […] What’s made it effective, though, is that it’s exploited the same basic loophole in the system that generations of social reactionaries have: the press’s genuine and deep-seated belief that you gotta hear both sides … that anyone more respectable than, say, an avowed neo-Nazi is operating in something like good faith
It is now clear to us all that that last statement is no longer correct … in that it is far too optimistic. Two years ago, the NYT made it apparent that they are in fact willing to assume “an avowed neo-Nazi is operating in something like good faith,” when they published a piece about “the Nazi sympathizer next door,” one variously called “chummy” (Quartz), “sympathetic” (Business Insider), and “normalizing” (NYT readers themselves, among many others.)
Back to Wagner in Deadspin:
The demands for journalistic integrity coming from Gamergate have nothing at all to do with the systemic corruption of the gaming media … The claims from what we like to call the “bias journalisms” school of media criticism aren’t meant to express anything in particular, or even, perhaps, to be taken seriously; they’re meant to work the referees, to get them looking over their shoulders, to soften them up in the hopes that a particular grievance, whatever its merits, might get a better hearing next time around.
How does it play out? Like this: Earlier this month, the New York Times covered Intel’s capitulation in the face of a coordinated Gamergate campaign, called “Operation Disrespectful Nod.”
Here’s that NYT piece from five years ago. It, in turn, begins:
For a little more than a month, a firestorm over sexism and journalistic ethics has roiled the video game community, culminating in an orchestrated campaign to pressure companies into pulling their advertisements from game sites.
That campaign won a big victory in recent days with a decision by Intel, the chip maker, to pull ads from Gamasutra, a site for game developers.
Intel’s decision added to a controversy that has focused attention on the treatment of women in the games business and the power of online mobs. The debate intensified in August, partly because of the online posts of a spurned ex-boyfriend of a female game developer.
Wagner’s inescapable conclusion:
The story continued in this vein—cautious, assiduously neutral, lobotomized […] Both sides were heard. And thus did Leigh Alexander’s commentary on the pluralism of gaming today get equal time with a campaign bent on silencing her. …Make it a story about an oppressive and hypocritical media conspiracy, and all of a sudden you have a cause, a side in a “debate.”
Gamergate, like so many bad-faith movements since, followed a variant of the “motte and bailey” strategy, which is
when you make a bold, controversial statement. Then when somebody challenges you, you claim you were just making an obvious, uncontroversial statement, so you are clearly right and they are silly for challenging you. Then when the argument is over you go back to making the bold, controversial statement.
Here, the motte is an ugly or vile cause — in Gamergate’s case, vicious misogyny — and the bailey is an entirely different purported argument — for Gamergate, “it’s about ethics in games journalism.” They work the latter argument for credibility, but entirely in bad faith, because it is tacitly understood, both internally and externally, albeit in a quasi-deniable way, that what they actually care about is their ugly cause.
This has become the playbook for so many modern disputes, because it continues to be a thoroughly effective way to manipulate the mainstream media. Arguments about purported “grievance politics,” or “the decline of America sanctioned by the elites,” or a manufactured, fictional “immigration crisis,” all continue to be treated by the media as legitimate grievances, and/or good-faith disputes, rather than a thin pretext for bald-faced racism and xenophobia.
Every so often the motte is accidentally revealed, as when the head of the USCIS said, just this week, that the famous poem which adorns the Statue of Liberty referred to “people coming from Europe.” But in general the pretense of the bailey is upheld.
Let me reiterate: the pretense. These are arguments knowingly made in bad faith. What’s more, the actual cause soon becomes apparent to those who investigate the subject with open and searching minds. Good journalists should not be willing accept such distorted pretenses at face value, nor assume good faith without evidence. The NYT clearly made that mistake, fell into that trap, with Gamergate five years ago. As Wagner put it then,
What we have in Gamergate is a glimpse of how these skirmishes will unfold in the future—all the rhetorical weaponry and siegecraft of an internet comment section brought to bear on our culture, not just at the fringes but at the center.
How right he was. And yet it is all too apparent that, in the heart and at the heights of the New York Times, nothing of significance has been learned. How else to explain how, five years after Gamergate, and two years after “readers accuse(d) us of normalizing a Nazi sympathizer,” the NYT continues to treat exactly the same kind of bad-faith arguments as if they are meaningful, important, and valid? Most visibly with its most recent headline debacle, but that is only the tip of the wilfuly ignorant iceberg.
In the aftermath of that headline incident, Dean Baquet, its executive editor, told CNN a remarkable thing: “Our role is not to be the leader of the resistance.” In other words, the publisher of this excellent recent Gamergate exegesis has learned nothing from it.
The NYT’s role should be to lead a resistance — not necessarily against any individual political party or figure, but a resistance of critical thinking, and searching analysis, against deceptive motte-and-bailey arguments. But they don’t seem willing to recognize that they are being manipulated by such bad-faith movements, much less accept that one of them has grown to occupy much of America’s political landscape. One wonders when the Gray Lady will finally open her eyes.
Last weekend, Jeanette Ng won the John W Campbell Award for Best New Writer at the 2019 Hugo Awards at the Dublin Worldcon; Ng's acceptance speech calls Campbell, one of the field's most influential editors, a "fascist" and expresses solidarity with the Hong Kong pro-democracy protesters.
I am a past recipient of the John W Campbell Award for Best New Writer (2000) as well as a recipient of the John W Campbell Memorial Award (2009). I believe I'm the only person to have won both of the Campbells, which, I think, gives me unique license to comment on Ng's remarks, which have been met with a mixed reception from the field.
I think she was right -- and seemly -- to make her remarks. There's plenty of evidence that Campbell's views were odious and deplorable. For example, Heinlein apologists like to claim (probably correctly) that his terrible, racist, authoritarian, eugenics-inflected yellow peril novel Sixth Column was effectively a commission from Campbell (Heinlein based the novel on one of Campbell's stories). This seems to have been par for the course for JWC, who liked to micro-manage his writers: Campbell also leaned hard on Tom Godwin to kill the girl in "Cold Equations" in order to turn his story into a parable about the foolishness of women and the role of men in guiding them to accept the cold, hard facts of life.
So when Ng held Campbell "responsible for setting a tone of science fiction that still haunts the genre to this day. Sterile. Male. White. Exalting in the ambitions of imperialists and colonisers, settlers and industrialists," she was factually correct.
Not just factually correct: also correct to be saying this now. Science fiction (like many other institutions) is having a reckoning with its past and its present. We're trying to figure out what to do about the long reach that the terrible ideas of flawed people (mostly men) had on our fields. We're trying to reconcile the legacies of flawed people whose good deeds and good art live alongside their cruel, damaging treatment of women. These men were not aberrations: they were following an example set from the very top and running through fandom, to the great detriment of many of the people who came to fandom for safety and sanctuary and community.
It's not a coincidence that one of the first organized manifestation of white nationalism as a cultural phenomenon was within fandom, and while fandom came together to firmly repudiate its white nationalist wing, these assholes weren't (all) entryists who showed up to stir trouble in someone else's community. The call (to hijack the Hugo award) was coming from inside the house: these guys had been around forever, and we'd let them get away with it, in the name of "tolerance" even as these guys were chasing women, queer people, and racialized people out of the field.
Those same Nazis went on to join Gamergate, then take up on /r/The_Donald, and they were part of the vanguard of the movement that put a boorish, white supremacist grifter into the White House.
The connection between the tales we tell about ourselves and our past and futures have a real, direct outcome on the future we arrive at. White supremacist folklore, including the ecofascist doctrine that says we can only avert climate change by murdering all the brown people, comes straight out of sf folklore, where it's completely standard for every disaster to be swiftly followed by an underclass mob descending on their social betters to eat and/or rape them (never mind the actual way that disasters go down).
When Ng took the mic and told the truth about his legacy, she wasn't downplaying his importance: she was acknowledging it. Campbell's odious ideas matter because he was important, a giant in the field who left an enduring mark on it. No one disagrees about that. What we want to talk about today is what that mark is, and what it means.
There are still people in our community who knew Campbell personally, and many many others one step removed, who idolize and respect the writers Campbell took under his wing. And there are people — and once again I raise my hand — who are in the field because the way Campbell shaped it as a place where they could thrive. Many if not most of these folks know about his flaws, but even so it’s hard to see someone with no allegiance to him, either personally or professionally, point them out both forcefully and unapologetically. They see Campbell and his legacy abstractly, and also as an obstacle to be overcome. That’s deeply uncomfortable.
He's not wrong, and the people who counted Campbell as a friend are legitimately sad to confront the full meaning of his legacy. I feel for them. It's hard to reconcile the mensch who was there for you and treated his dog with kindness and doted on his kids with the guy who alienated and hurt people with his cruel dogma.
Here's the thing: neither one of those facets of Campbell cancel the other one out. Just as it's not true that any amount of good deeds done for some people can repair the harms he visited on others; it's also true that none of those harms cancel out the kindnesses he did for the people he was kind to.
Life is not a ledger. Your sins can't be paid off through good deeds. Your good deeds are not cancelled by your sins. Your sins and your good deeds live alongside one another. They coexist in superposition.
You (and I) can (and should) atone for our misdeeds. We can (and should) apologize for them to the people we've wronged. We should do those things, not because they will erase our misdeeds, but because the only thing worse than being really wrong is not learning to be better.
People are flawed vessels. The circumstances around us -- our social norms and institutions -- can be structured to bring out our worst natures or our best. We can invite Isaac Asimov to our cons to deliver a lecture on "The Power of Posterior Pinching" in which he literally advises men on how to grope the women in attendance, or we can create and enforce a Code of Conduct that would bounce anyone, up to and including the Con Chair and the Guest of Honor, who tried a stunt like that.
We, collectively, through our norms and institutions, create the circumstances that favor sociopathy or generosity. Sweeping bad conduct under the rug isn't just cruel to the people who were victimized by that conduct: it's also a disservice to the flawed vessels who are struggling with their own contradictions and base urges. Create an environment where it's normal to do things that -- in 10 or 20 years -- will result in your expulsion from your community is not a kindness to anyone.
There are shitty dudes out there today whose path to shitty dudehood got started when they watched Isaac Asimov deliver a tutorial on how to grope women without their consent and figured that the chuckling approval of all their peers meant that whatever doubts the might have had were probably misplaced. Those dudes don't get a pass because they learned from a bad example set by their community and its leaders -- but they might have been diverted from their path to shitty dudehood if they'd had better examples. They might not have scarred and hurt countless women on their way from the larval stage of shittiness to full-blown shitlord, and they themselves might have been spared their eventual fate, of being disliked and excluded from a community they joined in search of comradeship and mutual aid. The friends of those shitty dudes might not have to wrestle with their role in enabling the harm those shitty dudes wrought.
Jeannette Ng's speech was exactly the speech our field needs to hear. And the fact that she devoted the bulk of it to solidarity with the Hong Kong protesters is especially significant, because of the growing importance of Chinese audiences and fandom in sf, which exposes writers to potential career retaliation from an important translation market. There is a group of (excellent, devoted) Chinese fans who have been making noises about a Chinese Worldcon for years, and speeches like Ng's have to make you wonder: if that ever comes to pass, will she be able to get a visa to attend?
Back when the misogynist/white supremacist wing of SF started to publicly organize to purge the field of the wrong kind of fan and the wrong kind of writer, they were talking about people like Ng. I think that this is ample evidence that she is in exactly the right place, at the right time, saying the right thing.
And I am so proud to be part of this. To share with you my weird little story, an amalgam of all my weird interests, so much of which has little to do with my superficial identities and labels.
But I am a spinner of ideas, of words, as Margaret Cavendish would put it.
So I need say, I was born in Hong Kong. Right now, in the most cyberpunk in the city in the world, protesters struggle with the masked, anonymous stormtroopers of an autocratic Empire. They have literally just held her largest illegal gathering in their history. As we speak they are calling for a horological revolution in our time. They have held laser pointers to the skies and tried to to impossibly set alight the stars. I cannot help be proud of them, to cry for them, and to lament their pain.
I’m sorry to drag this into our fantastical words, you’ve given me a microphone and this is what I felt needed saying.
John W. Campbell, for whom this award was named, was a fascist. [Jeannette Ng/Medium]
The first anatomically correct model of the visual cortex seeks to capture how the brain sees the world.
It’s been a busy week for NASA in the days leading up to Halloween. In the spirit of the season, the agency recently released a new image of the Eagle Nebula captured by the James Webb Space Telescope where the . By coincidence, NASA’s Solar Dynamics Observatory managed to capture a similarly spooky image of the sun.
Say cheese! 📸— NASA Sun, Space & Scream 🎃 (@NASASun) October 26, 2022
Today, NASA’s Solar Dynamics Observatory caught the Sun "smiling." Seen in ultraviolet light, these dark patches on the Sun are known as coronal holes and are regions where fast solar wind gushes out into space. pic.twitter.com/hVRXaN7Z31
On Wednesday, the agency shared a capture of the sun “smiling.” As , more than a few Twitter users were quick to point out how the star looks like a in NASA’s image. There’s a bit of interesting science behind the resemblance. “Seen in ultraviolet light, these dark patches on the sun are known as coronal holes and are regions where fast solar wind gushes out into space,” according to NASA. The sun is constantly sending out solar winds. At times, these geomagnetic storms have been known to knock power out here on Earth, as was the case in part of Canada in .
This isn’t the first time the Solar Dynamics Observatory has captured an interesting image of the sun. In 2016, NASA released an animation of the sun doing a . The capture was the result of a seven-hour maneuver the SDO completes once a year to take an accurate measure of the star’s edge.
For decades, architectural critic and photographer John Margolies obsessively documented roadside attractions: vernacular architecture, weird sculpture, odd businesses and amusements. By his death in 2016, his collection consisted of more than 11,000 slides (he published books of his favorites, with annotations).
The Library of Congress purchased the Margolies archive and has released it to the public domain, with hi-rez scans of 11,710 slides.
Almost all of Margolies’ work was done in the interest of preserving images of what would otherwise be lost to time. Even his first book, published in 1981, was elegiacally called The End of the Road: Vanishing Highway Architecture in America. From the start, Margolies knew the quirky motels, miniature golf courses, diners, billboards, and gas stations were being endangered by franchising and changing fashions — not to mention changing patterns of automobile traffic. (For decades now, most drivers have, of course, opted for the high speed-limits of superhighways and the convenience of service areas, leaving the old local highways in the lurch.)
John Margolies’ Photographs of Roadside America [Public Domain Review]
John Margolies [Library of Congress]
Roadside America [Library of Congress/Flickr Commons]
Internet Archive founder Brewster Kahle created The Game of Oligarchy, which "shows that the 'free market' leads inexorably to one person getting all the money and everyone else going broke. And fast."
The game's rules are simple: everyone is assigned $100 in play money to begin with; they take it in turns to pick a player to have a coin-toss against, with the winner taking 50% of the lesser of pots of the pair (if both have $100, the winner takes $50 from the loser).
Very quickly, the winners of the initial coin tosses wipe out the remaining players, and then each other, producing an outcome with a single winner with all the money. What's more interesting than the ability of small amounts of random chance to produce oligarchic outcomes is the psychological effect of playing the game: over the duration of the very short games, the winners arrive at a "feeling of righteous empowerment based on being successful" and players experience class divisions.
Kahle based his game on an article in Scientific American: "Is Inequality Inevitable? Wealth naturally trickles up in free-market economies, model suggests. Neal Krawetz has implemented the game so it can run automatically in browsers.
Read the rest
What is amazing is that even through each toss is “fair” in that it is a 50-50 chance to win a straight amount of money, the results shows one player wins all the money, and really quickly.
Two nephews and their partners, Mary and I played 4 rounds in about an hour and we discovered social classes (we called the broke ones “organ sellers”), feeling of righteous empowerment based on being successful (even though it was completely random), but also that “free market” ended with all-but-one-of-us in a bad situation really quickly.
Fall and winter have not been kind to us over the last couple of years.
In 2020, cases of COVID-19 began to climb in October. And at this time last year, we were in the calm before the storm, so to speak, with delta-driven case counts slowly dipping before the omicron variant began its road to global domination at the end of November (SN: 12/1/21). What will happen in our third pandemic winter, as omicron continues to evolve and many people ditch their masks?
Only time will tell. But already there are some warning signs that we could be faced with yet another wave of infections, hospitalizations and deaths. For one, cases and hospitalizations are increasing in some European countries, including the United Kingdom.
What happens across the pond usually portends what will happen in the United States. At the national level and in most states, cases are still going down. But experts worry that may not hold true for long, as temperatures drop and more people gather indoors where the coronavirus is more likely to spread. Some Northeastern states, for instance, have seen a sharp increase in coronavirus levels in wastewater, suggesting there has been an uptick in transmission even if it’s not yet reflected in official case counts (SN: 4/22/22).
There’s also a wild card this year, complicating matters. New versions of omicron abound. How might they shift the pandemic’s near future?
It’s a hard question to answer. On one hand, we’re in a very different place than we were two years ago, or even last year, with more treatments on hand and an omicron-specific booster (SN: 5/11/22; SN: 9/2/22). But the coronavirus has been known to throw us a few curveballs. Experts expect that winter will usher in yet another wave, but what it will look like and how high it will crest is unclear.
“Although we can feel good that we are going in the right direction, we can’t let our guard down,” said National Institute of Allergy and Infectious Diseases director Anthony Fauci at an October 4 webinar held by the University of Southern California Annenberg Center for Health Journalism in Los Angeles.
There is some good(ish) news: Most people have been exposed to the virus, whether through vaccination or — the less-desirable route — an infection, or both. That means our immune systems have the virus’s mug shot on hand. Our antibodies and T cells are trained to kick into high gear if the coronavirus trips any alarm bells as it enters our noses, throats or lungs.
These immune barriers can dampen the virus’s ability to spread among people, as well as protect many from becoming seriously ill. As a result, fewer people may end up in the hospital or dying compared with previous years.
But then there’s the bad news: Over the last year, the omicron variant has adopted a few disguises in the form of mutations that help the virus hide from our immune systems. Over the summer, a version called BA.5 rose to dominance, pushing out its relatives BA.2 and BA.2.12.1. Now, researchers are keeping tabs on a new alphanumeric motley crew of omicron versions.
It is possible that a new worrisome variant could suddenly appear and outcompete all its relatives, as the delta and omicron variants did in 2021. The next name on the list would be “pi.”
But another — perhaps more likely — possibility is that over the next few months, our attention won’t be focused on a single lineage that sweeps the world but on a swarm of new variants. That’s thanks in part to the arms race between our immune systems and the virus.
Now that so many people have some kind of protection, compared with in 2020 or early 2021, the coronavirus must constantly change in ways that poke holes in those defenses in order to spread. Some variants circulating now have independently acquired the same mutations, imparting similar abilities to dodge antibodies in lab tests, researchers report in a preliminary study posted October 4 at bioRxiv.org. With multiple variants using the same tactics to get around people’s immune systems, it can be tough for a single variant to come out on top.
Two of the newest omicron versions, BQ.1.1 and BA.2.75.2, are particularly adept at dodging some individual antibodies taken from people who had recovered from a BA.2 or BA.5 infection, the researchers found. That means some people may be more susceptible to another infection if the new versions, which are so far present at low levels in the United States, spread widely this fall.
Officials have already taken some steps to tackle this ever-changing virus. This fall, Pfizer/BioNTech and Moderna released tweaked versions of their mRNA vaccines that tackle both the original version of the coronavirus and omicron to give immune systems a refresher course. But few of these updated shots are making it into arms. Half of U.S. adults say they have heard little to nothing about COVID-19 boosters, according to a Kaiser Family Foundation poll released September 30. And so far, only around 4 percent of people age 12 or older have gotten the new jabs. (On October 12, the U.S. Food and Drug Administration and Centers for Disease Control and Prevention signed off on bivalent boosters for 5- to 11-year-olds.)
What’s more, omicron’s continued evolution means that vulnerable people are fast losing COVID-19 treatment options. The October 4 study, which has not yet been peer-reviewed, also found that the last stronghold of antibody drugs that are used to treat or protect high-risk patients — therapies called bebtelovimab and Evusheld — didn’t recognize some of the new variants when tested in lab dishes. And on October 3, the FDA warned that Evusheld, which is used as a preexposure treatment to protect immunocompromised people, doesn’t work for all variants. The drug still offers protection against many of the currently circulating variants, the FDA said, as does the antiviral Paxlovid.
Another unknown that we’re facing this winter is how much other respiratory infections might add on to an already COVID-heavy burden. Flu season in Australia, usually a bellwether for those of us north of the equator, was back after a two-year hiatus and got an earlier than usual start. Experts are once again warning about a possible “twindemic” in the Northern Hemisphere, with both influenza and the coronavirus making people ill (SN: 9/18/20). Not to mention, there are myriad other infections that most people haven’t been exposed to over the last couple of years thanks to masking and social distancing.
That’s not to say everyone needs to prepare for yet another lonely winter. But it’s a sobering reminder that taking extra precautions such as testing before social gatherings and masking — especially around vulnerable people — would be wise, even as we get on with our lives. And that reminds me: I need to order more masks.
The Scottish actor and comedian Robbie Coltrane has died, as
reported by the Hollywood
Of course, he will likely be most remembered for playing the friendly giant Hagrid in the Harry Potter franchise of films, based on the books of the awful transphobic author J.K. Rowling, as well as several James Bond movies as the Russian mob boss Valentin Zukovsky. However, Coltrane also appeared in the 1983 fantasy film Krull, was in several of Rowan Atkinson’s Black Adder series, played Mr. Hyde in Hugh Jackman’s critically-panned movie Van Helsing, and appeared as a police sergeant in the 2001 adaptation of Alan Moore’s graphic novel From Hell, about Jack the Ripper.
His weirdest role might have been the voice of the giant, living
teddy bear Gooby in the obscure but cult-favorite movie of the same
name. Warning: Once you see this trailer, you can’t unsee
Coltrane has many, many other credits to his name, but more importantly, was by all accounts a wonderful guy. His former co-star Stephen Fry eulogized him thusly: “I was awe/terror/love struck all at the same time. Such depth, power & talent: funny enough to cause helpless hiccups & honking as we made our first TV show, Alfresco. Farewell, old fellow. You’ll be so dreadfully missed.”
Want more io9 news? Check out when to expect the latest
releases, what’s next for the DC Universe on film and
TV, and everything you need to know about House of the Dragon
and Lord of the Rings: The
Rings of Power.
The American healthcare system is the worst of all possible worlds. Unlike every other wealthy country, the US leaves its health insurance to the private sector, where your health and your life are a distant second to shareholder profits. But it's worse, because the majority of the money those terrible, "private" insurance companies "earn" comes from public subsidies.
In other words, the US has a privately run health care sector that is publicly financed, without any public accountability or duty to the public good. Insurance companies take ever more billions from the federal government and deliver ever less care to their customers.
Cigna-exec-turned-whistleblower Wendell Potter has just published a new report that breaks down share of federal subsidies in the largest US insurers' bottom lines:
See that? The vast majority of US insurers' income is public funding. That's because of Medicare Advantage, a privatized Medicare service that 27 million older people have been tricked into signing up for, which consistently delivers worse service with higher out-of-pockets, while billing the US government for billions.
You should not sign up for Medicare Advantage, nor let anyone you love do so. Medicare Advantage will deny you care you are entitled to and leave you to sicken and die, while draining the last of your savings in co-pays:
The insurers aren't done. They raised their prices by 24% in a single year:
Despite these massive profits, spiraling fees, and mounting premiums, the Biden admin is on track to let the insurers raise their prices again, though not by as much as originally announced:
You don't have to be on Medicare to be part of the health insurance scam. If you've got an Obamacare subsidy, you are helping to transfer billions in public money to insurers, even as these ACA plans grow steadily worse. ACA plans deny one in five claims:
Meanwhile, the out-of-pocket expenses your ACA insurer can rook you for just went up to $14,700/year:
ACA coverage is so poor that many of the people paying for it are best understood as "functionally uninsured":
ACA was sold as a brokered compromise between public healthcare advocates and private healthcare cultists. It created a situation where private insurers could grow larger, more powerful, more profitable, and less accountable to government, patients or doctors, so that care would steadily erode and prices mount.
ACA set the stage for Medicare privatization through Medicare Advantage. It was the template for the public-private-partnership from hell, teeing up a future where we finally get the wildly popular Medicare For All, but delivered by the same murdering profiteers who run the private system it was supposed to replace: Medicare Advantage For All.
As David Sirota writes in The Lever, Biden's 2020 campaign recognized this, and promised us a public option where "premiums could be substantially lower than those of private plans," but "Biden hasn’t once mentioned a public option since becoming president."
When Congress votes to give billions in public money to the health insurance industry, it also votes to give millions to itself – our legislature is awash in health insurance company dark money, and Democrats – including members of the Progressive Caucus – are carrying its water:
Giving for-profit insurance companies more public money will not translate into better care. The CEOs of every one of those publicly subsidized insurance companies took home more than $20 million in pay last year. 86% of Centene revenues came from the public coffers. Its (recently deceased) CEO Michael Neidorff paid himself $20.6 million.
It doesn't have to be this way. We know how to fix this. Biden laid it out in 2020:
Giving Americans a new choice, a public health insurance option like Medicare. If your insurance company isn’t doing right by you, you should have another, better choice. Whether you’re covered through your employer, buying your insurance on your own, or going without coverage altogether, Biden will give you the choice to purchase a public health insurance option like Medicare. As in Medicare, the Biden public option will reduce costs for patients by negotiating lower prices from hospitals and other health care providers. It also will better coordinate among all of a patient’s doctors to improve the efficacy and quality of their care, and cover primary care without any co-payments. And it will bring relief to small businesses struggling to afford coverage for their employees.
People are angry at their insurers, and justifiably so. Cigna isn't just raising prices and co-pays, it's committing mass-scale fraud: "exaggerat[ing] the illnesses of its Medicare members to obtain higher payments from the federal government." Also credibly accused of Medicare fraud: Unitedhealth and Elevance.
In 2019, I published Radicalized, a collection of four novellas subtitled "four tales of our present moment." The title story, "Radicalized," was frightening and upsetting to write, but I couldn't stop myself. It's a story about angry men who watch the people they love the most slowly and agonizingly murdered by care-denying insurance companies, who meet on message boards where they plot to murder health-care executives.
Having grown up in Canada and then spent more than a decade in the UK – and now become a US citizen – it's incredible to me that Americans tolerate this ghastly, worsening system. Not that I want to see terrorist violence! The very idea is sickening and terrifying.
But it is baffling to me that there are Americans who shoot each other over road-rage and yet as far as I know, the $20m/year vampire CEOs of profiteering, fraud-addicted insurance companies are living in comfort and safety.
It's one of the great paradoxes of the American psyche: all of that macho, don't-tread-on-me posturing turns to vapor when the person who's literally condemning your family to die is a distant corporate executive.
All that anger has to be out there, somewhere, channeled by cynical operators into scapegoating and nihilism. It's a ticking time-bomb. Imagine the political win that would accrue to the party that made saving your life and the lives of the people you love its political centerpiece. A party that met astroturf with naming names, hauling insurance execs into Congress to confront grieving mothers, fathers, children and spouses. A party that refused to let Lucy yank the football again with a "compromise" that gives us a privately managed, publicly funded service that only serves shareholders and executives.
The Polyhedral Perspective https://publicdomainreview.org/essay/polyhedral-perspective
One trick Apple uses to make you think green bubbles are “gross” https://uxdesign.cc/how-apple-makes-you-think-green-bubbles-gross-e03b52b12fed (h/t Boing Boing)
#15yrsago First-ever patent-suit filed against Linux https://www.groklaw.net/article.php?story=20071011205044141
#15yrsago HOWTO cite blogs in formal academic medical papers https://www.ncbi.nlm.nih.gov/books/NBK7266/
#10yrsago Videos from the HOPE 2004 conference: Jello Biafra, Woz, Schneier, Mitnick and more https://web.archive.org/web/20121030001822/https://www.2600.com/news/view/article/12284
#10yrsago UK surveillance bill: 19,000 letters opposing, 0 in favour https://web.archive.org/web/20121015000000*/http://blogs.computerworlduk.com/open-enterprise/2012/10/uk-snoopers-charter-19000-emails-against-0-in-favour/index.htm
#10yrsago Myhrvold patents 3D printing DRM https://web.archive.org/web/20121014042712/https://www.technologyreview.com/view/429566/nathan-myhrvolds-cunning-plan-to-prevent-3-d/
#10yrsago Scanning whole books is fair use https://arstechnica.com/tech-policy/2012/10/court-rules-book-scanning-is-fair-use-suggesting-google-books-victory/
#10yrsago Photos from backstage at Disneyland https://imgur.com/a/TJQYm
#5yrsago How do you dump the firmware from a “secure” voting machine? With a $15 open source hardware board https://blog.adafruit.com/2017/10/11/ft232h-breakout-on-cspan-from-adafruit-used-to-dump-firmware-off-accuvote-tsx-securelyfitz-essvote/
#5yrsago Portland police stage bizarre sensory deprivation stunt against ICE protesters https://www.youtube.com/watch?v=iUKpfU04vKw
#5yrsago The US has quit UNESCO, the UN agency that protects world heritage sites and teaches poor children to read https://www.vice.com/en/article/gy5aj9/the-us-has-withdrawn-from-a-un-agency-that-teaches-kids-to-read-and-protects-ruins
#5yrsago China’s 1 percenters are now worth as much as the GDP of the United Kingdom https://www.scmp.com/business/china-business/article/2115040/chinas-richest-2130-people-control-combined-wealth-us26
#5yrsago Here are the three most common dishonest arguments used to derail universal healthcare proposals https://www.latimes.com/opinion/op-ed/la-oe-johnson-concern-trolls-single-payer-20170921-story.html
#5yrsago Yet another Trump official accused of defrauding taxpayers with dirty travel expenses https://www.cnn.com/2017/10/11/politics/zinkes-travel-continues-to-raise-ethical-questions/index.html
#5yrsago Trump’s FCC redefines “effective competition” to include having only one ISP in your county https://www.techdirt.com/2017/10/12/groups-battle-trump-fccs-claim-that-one-isp-market-means-theres-effective-competition/
#5yrsago Here’s what hospital food looks like in Japan https://web.archive.org/web/20171006062957/https://imgur.com/gallery/hq8rV
#5yrsago Chinese internet censors really enjoy the work https://www.scmp.com/news/china/policies-politics/article/2113377/its-seen-cool-place-work-how-chinas-censorship-machine
#5yrsago You are the elevator captain: a guide to Japan’s unspoken elevator etiquette https://medium.com/japan-init/elevator-etiquette-in-japan-3cab23474e8c
#5yrsago Equifax is serving malware to visitors https://arstechnica.com/information-technology/2017/10/equifax-website-hacked-again-this-time-to-redirect-to-fake-flash-update/
#5yrsago How the University of New Hampshire spun blowing a frugal librarian’s donation on a stupid football scoreboard https://deadspin.com/how-unh-turned-a-quiet-benefactor-into-a-football-marke-1819064622
#1yrago There are no corporate criminals in America: Because America doesn't have corporate crime prosecutions https://pluralistic.net/2021/10/12/no-criminals-no-crimes/#get-out-of-jail-free-card
#1yrago This Thing Between Us, a neck-hair-stand-up cuycuy horror: Gus Moreno's debut novel https://pluralistic.net/2021/10/12/no-criminals-no-crimes/#cuycuy
#1yrago India funded a starving kids' app, but not food: Solutionism at its worst https://pluralistic.net/2021/10/13/theres-an-app-for-that/#solutionism
#1yrago Adobe uses copyfraud to preserve spyware: A free-as-in-surveillance-free Flash installer is gone thanks to a bogus copyright claim https://pluralistic.net/2021/10/13/theres-an-app-for-that/#gnash
#1yrago Charter uses bad credit threats to corral ex-subscribers: "Resubscribe or we'll keep trashing your credit report." https://pluralistic.net/2021/10/13/theres-an-app-for-that/#thugs-charter
Today's top sources: Naked Capitalism (https://www.nakedcapitalism.com/).
The Internet Con: How to Seize the Means of Computation, a nonfiction book about interoperability for Verso. Yesterday's progress: 516 words (45618 words total)
Picks and Shovels, a Martin Hench noir thriller about the heroic era of the PC. (92849 words total) – ON PAUSE
A Little Brother short story about DIY insulin PLANNING
Vigilant, Little Brother short story about remote invigilation. FIRST DRAFT COMPLETE, WAITING FOR EXPERT REVIEW
Moral Hazard, a short story for MIT Tech Review's 12 Tomorrows. FIRST DRAFT COMPLETE, ACCEPTED FOR PUBLICATION
Spill, a Little Brother short story about pipeline protests. FINAL DRAFT COMPLETE
A post-GND utopian novel, "The Lost Cause." FINISHED
A cyberpunk noir thriller novel, "Red Team Blues." FINISHED
Currently reading: Analogia by George Dyson.
Latest podcast: Sound Money https://craphound.com/news/2022/09/11/sound-money/
Copyright Evidence: Synthesis and Futures – CREATe
(Glasgow), Oct 17
Library Journal Day of Dialog (Zoom), Oct 20
Chokepoint Capitalism Event, Argo Bookshop (Montreal), Oct
Surviving Apocalyptic Economics, with Douglas Rushkoff and
Rebecca Giblin, Ottawa Writers Festival, Oct 24
World Ethical Data Forum, Oct 26-28
Radical Book Fair/Lighthouse Bookshop (Edinburgh), Nov 10
Arthur C Clarke Award (DC), Nov 16
Canadians Connected 2022 with Amber Mac:
Amazon Billing Amazon for Amazon (Trashfuture)
"Attack Surface": The third Little Brother novel, a standalone technothriller for adults. The Washington Post called it "a political cyberthriller, vigorous, bold and savvy about the limits of revolution and resistance." Order signed, personalized copies from Dark Delicacies https://www.darkdel.com/store/p1840/Available_Now%3A_Attack_Surface.html
"How to Destroy Surveillance Capitalism": an anti-monopoly pamphlet analyzing the true harms of surveillance capitalism and proposing a solution. https://onezero.medium.com/how-to-destroy-surveillance-capitalism-8135e6744d59 (print edition: https://bookshop.org/books/how-to-destroy-surveillance-capitalism/9781736205907) (signed copies: https://www.darkdel.com/store/p2024/Available_Now%3A__How_to_Destroy_Surveillance_Capitalism.html)
"Little Brother/Homeland": A reissue omnibus edition with a new introduction by Edward Snowden: https://us.macmillan.com/books/9781250774583; personalized/signed copies here: https://www.darkdel.com/store/p1750/July%3A__Little_Brother_%26_Homeland.html
"Poesy the Monster Slayer" a picture book about monsters, bedtime, gender, and kicking ass. Order here: https://us.macmillan.com/books/9781626723627. Get a personalized, signed copy here: https://www.darkdel.com/store/p2682/Corey_Doctorow%3A_Poesy_the_Monster_Slayer_HB.html#/.
This work licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to pluralistic.net.
Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution.
Blog (no ads, tracking, or data-collection):
Newsletter (no ads, tracking, or data-collection):
Mastodon (no ads, tracking, or data-collection):
Medium (no ads, paywalled):
(Latest Medium column: "Bankruptcy protects fake people, brutalizes real ones" https://doctorow.medium.com/bankruptcy-protects-fake-people-brutalizes-real-ones-cf9dec640c0a)
Twitter (mass-scale, unrestricted, third-party surveillance and advertising):
Tumblr (mass-scale, unrestricted, third-party surveillance and advertising):
"When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla
An anonymous reader quotes a report from The Register: Modified off-the-shelf drones have been found carrying wireless network-intrusion kit in a very unlikely place. Greg Linares, a security researcher, recently recounted an incident that he said occurred over the summer at a US East Coast financial firm focused on private investment. He told The Register that he was not involved directly with the investigation but interacted with those involved as part of his work in the finance sector. In a Twitter thread, Linares said the hacking incident was discovered when the financial firm spotted unusual activity on its internal Atlassian Confluence page that originated from within the company's network. The company's security team responded and found that the user whose MAC address was used to gain partial access to the company Wi-Fi network was also logged in at home several miles away. That is to say, the user was active off-site but someone within Wi-Fi range of the building was trying to wirelessly use that user's MAC address, which is a red flag. The team then took steps to trace the Wi-Fi signal and used a Fluke system to identify the Wi-Fi device. "This led the team to the roof, where a 'modified DJI Matrice 600' and a 'modified DJI Phantom' series were discovered," Linares explained. The Phantom drone was in fine condition and had a modified Wi-Fi Pineapple device, used for network penetration testing, according to Linares. The Matrice drone was carrying a case that contained a Raspberry Pi, several batteries, a GPD mini laptop, a 4G modem, and another Wi-Fi device. It had landed near the building's heating and ventilation system and appeared to be damaged but still operable. "During their investigation, they determined that the DJI Phantom drone had originally been used a few days prior to intercept a worker's credentials and Wi-Fi," Linares said. "This data was later hard coded into the tools that were deployed with the Matrice." According to Linares, the tools on the drones were used to target the company's internal Confluence page in order to reach other internal devices using the credentials stored there. The attack, he said, had limited success and is the third cyberattack involving a drone he's seen over the past two years. "The attackers specifically targeted a limited access network, used by both a third-party and internally, that was not secure due to recent changes at the company (e.g. restructuring/rebranding, new building, new building lease, new network setup or a combination of any of these scenarios)," Linares told The Register. "This is the reason why this temporary network unfortunately had limited access in order to login (credentials + MAC security). The attackers were using the attack in order to access an internal IT confluence server that contained other credentials for accessing other resources and storing IT procedures." [...] While the identity of the attacker has not been disclosed, Linares believes those responsible did their homework. "This was definitely a threat actor who likely did internal reconnaissance for several weeks, had physical proximity to the target environment, had a proper budget and knew their physical security limitations," he said.
Read more of this story at Slashdot.
Longtime Slashdot reader and tech historian, Kay Savetz, shares a blog post about the Internet Archive's efforts to build a library of amateur radio broadcasts. Here's an excerpt from the report: Internet Archive has begun gathering content for the Digital Library of Amateur Radio and Communications (DLARC), which will be a massive online library of materials and collections related to amateur radio and early digital communications. The DLARC is funded by a significant grant from the Amateur Radio Digital Communications Foundation (ARDC) to create a digital library that documents, preserves, and provides open access to the history of this community. The library will be a free online resource that combines archived digitized print materials, born-digital content, websites, oral histories, personal collections, and other related records and publications. The goals of the DLARC are to document the history of amateur radio and to provide freely available educational resources for researchers, students, and the general public. [...] The DLARC project is looking for partners and contributors with troves of ham radio, amateur radio, and early digital communications related books, magazines, documents, catalogs, manuals, videos, software, personal archives, and other historical records collections, no matter how big or small. In addition to physical material to digitize, we are looking for podcasts, newsletters, video channels, and other digital content that can enrich the DLARC collections. Internet Archive will work directly with groups, publishers, clubs, individuals, and others to ensure the archiving and perpetual access of contributed collections, their physical preservation, their digitization, and their online availability and promotion for use in research, education, and historical documentation. All collections in this digital library will be universally accessible to any user and there will be a customized access and discovery portal with special features for research and educational uses.
Read more of this story at Slashdot.
<Roosevelt> !choose do work, play games
<RoBoBo> Choice: do work
<Roosevelt> !choose listen to a stupid bot, don't listen to a stupid bot
<RoBoBo> Choice: listen to a stupid bot
Computer engineer George Hilliard says he has built an electronic business card running Linux. From his blog post: It is a complete, minimal ARM computer running my customized Linux firmware built with Buildroot. It has a USB port in the corner. If you plug it into a computer, it boots in about 6 seconds and shows up over USB as a flash drive and a virtual serial port that you can use to log into the card's shell. The flash drive has a README file, a copy of my resume, and some of my photography. The shell has several games and Unix classics such as fortune and rogue, a small 2048, and a small MicroPython interpreter. All this is accomplished on a very small 8MB flash chip. The bootloader fits in 256KB, the kernel is 1.6MB, and the whole root filesystem is 2.4MB. So, there's plenty of space for the virtual flash drive. It also includes a writable home directory, on the off chance that anyone creates something they want to keep. This is also saved on the flash chip, which is properly wear leveled with UBI. The whole thing costs under $3. It's cheap enough to give away. If you get one from me, I'm probably trying to impress you. In a detailed write-up, Hilliard goes on to explain how he came up with the design and assembled all the components. Naturally, there were some problems that arose during the construction that he had to troubleshoot: "first, the USB port wasn't long enough to reliably make contact in many USB ports. Less critically, the flash footprint was wrong, which I worked around by bending the leads under the part by hand..." Impressively, the total cost of the card (not including his time) was $2.88 -- "cheap enough that I don't feel bad giving it away, as designed!"
Read more of this story at Slashdot.
As part of our Blackhat Europe talk “Reverse Engineering and Exploiting Builds in the Cloud” we publicly released a new tool called Terrier.
In this blog post, I am going to show you how Terrier can help you identify and verify container and image components for a wide variety of use-cases, be it from a supply-chain perspective or forensics perspective. Terrier can be found on Github https://github.com/heroku/terrier.
In this blog post, I am not going to go into too much detail about containers and images (you can learn more here) however it is important to highlight a few characteristics of containers and images that make them interesting in terms of Terrier. Containers are run from images and currently the Open Containers Initiative (OCI) is the most popular format for images. The remainder of this blog post refers to OCI images as images.
Essentially images are tar archives that container multiple tar archives and meta-information that represent the “layers” of an image. The OCI format of images makes images relatively simple to work with which makes analysis relatively simple. If you only had access to a terminal and the tar command, you could pretty much get what you need from the image’s tar archive.
When images are utilised at runtime for a container, their
contents become the contents of the running container and the
layers are essentially extracted to a location on the
container’s runtime host. The container runtime host is the
host that is running and maintaining the containers. This location
location contains a few folders of interest, particularly the
"merged" folder. The "merged" folder contains the contents of the
image and any changes that have occurred in the container since its
creation. For example, if the image contained a location such as
/usr/chris/stuff and after creating a container from
this image I created a file called
/usr/chris/stuff. This would result in
the following valid path on the container runtime host
Now that we have a brief understanding of images and containers, we can look at what Terrier does. Often it is the case that you would like to determine if an image or container contains a specific file. This requirement may be due to a forensic analysis need or to identify and prevent a certain supply-chain attack vector. Regardless of the requirement, having the ability to determine the presence of a specific file in an image or container is useful.
Terrier can be used to determine if a specific image contains a specific file. In order to do this, you need the following:
The first point can be easily achieved with Docker by using the following command:
$ docker save imageid -o myImage.tar
The command above uses a Docker image ID which can be obtained using the following command:
$ docker images
Once you have your image exported as a tar archive, you will then need to establish the SHA256 hash of the particular file you would like to identify in the image. There are multiple ways to achieve this but in this example, we are going to use the hash of the Golang binary go1.13.4 linux/amd64 which can be achieved with following command on a Linux host:
$ cat /usr/local/go/bin/go | sha256sum
The command above should result in the following SHA256 hash:
Now that we have a hash, we can use this hash to determine if
the Golang binary is in the image
achieve this, we need to populate a configuration file for Terrier.
Terrier makes use of YAML configuration files and below is our
config file that we save as
mode: image image: myImage.tar hashes: - hash: '82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd'
The config file above has multiple entries which allow us to
mode that Terrier will operate in and in
this case, we are working with an image file (tar archive) so the
image. The image file we are working with is
myImage.tar and the hash we are looking to identify is
We are now ready to run Terrier and this can be done with the following command:
The command above should result in output similar to the following:
$ ./terrier [+] Loading config: cfg.yml [+] Analysing Image [+] Docker Image Source: myImage.tar [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [!] Found file '6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759/usr/local/go/bin/go' with hash: 82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c
We have identified a file
located at layer
that has the same SHA256 hash as the one we provided. We now have
verification that the image “myImage.tar” contains a
file with the SHA256 hash we provided.
This example can be extended upon and you can instruct Terrier to search for multiple hashes. In this case, we are going to search for a malicious file. Recently a malicious Python library was identified in the wild and went by the name “Jeilyfish”. Terrier could be used to check if a Docker image of yours contained this malicious package. To do this, we can determine the SHA256 of one of the malicious Python files that contains the backdoor:
$ cat jeIlyfish-0.7.1/jeIlyfish/_jellyfish.py | sha256sum cf734865dd344cd9b0b349cdcecd83f79a751150b5fd4926f976adddb93d902c
We then update our Terrier config to include the hash calculated above.
mode: image image: myImage.tar hashes: - hash: '82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd' - hash: 'cf734865dd344cd9b0b349cdcecd83f79a751150b5fd4926f976adddb93d902c'
We then run Terrier against and analyse the results:
$ ./terrier [+] Loading config: cfg.yml [+] Analysing Image [+] Docker Image Source: myImage.tar [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [!] Found file '6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759/usr/local/go/bin/go' with hash: 82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c
The results above indicate that our image did not contain the malicious Python package.
There is no limit as to how many hashes you can search for however it should be noted that Terrier performs all its actions in-memory for performance reasons so you might hit certain limits if you do not have enough accessible memory.
Terrier can also be used to determine if a specific image contains a specific file at a specific location. This can be useful to ensure that an image is using a specific component i.e binary, shared object or dependency. This can also be seen as “pinning” components by ensuring that you are images are using specific components i.e a specific version of cURL.
In order to do this, you need the following:
The first point can be easily achieved with Docker by using the following command:
$ docker save imageid -o myImage.tar
The command above utilises a Docker image id which can be obtained using the following command:
$ docker images
Once you have your image exported as a tar archive, you will need to determine the path of the file you would like to identify and verify in the image. For example, if we would like to ensure that our images are making use of a specific version of cURL, we can run the following commands in a container or some other environment that resembles the image.
$ which curl /usr/bin/curl
We now have the path to cURL and can now generate the SHA256 of this instance of cURL because in this case, we trust this instance of cURL. We could determine the hash by other means for example many binaries are released with a corresponding hash from the developer which can be acquired from the developer’s website.
$ cat /usr/bin/curl | sha256sum 9a43cb726fef31f272333b236ff1fde4beab363af54d0bc99c304450065d9c96
With this information, we can now populate our config file for Terrier:
mode: image image: myImage.tar files: - name: '/usr/bin/curl' hashes: - hash: '9a43cb726fef31f272333b236ff1fde4beab363af54d0bc99c304450065d9c96'
We’ve saved the above config as
when we run Terrier with this config, we get the following
$ ./terrier [+] Loading config: cfg.yml [+] Analysing Image [+] Docker Image Source: myImage.tar [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c [!] All components were identified: (1/1) [!] All components were identified and verified: (1/1) $ echo $? 0
The output above indicates that the file
/usr/bin/curl was successfully identified and
verified, meaning that the image contained a file at the location
/usr/bin/curl and that the SHA256 of that file matched
the hash we provided in the config. Terrier also makes use of
return codes and if we analyse the return code from the output
above, we can see that the value is
0 which indicates
a success. If Terrier cannot identify or verify all the provided
files, a return code of
1 is returned which indicates
a failure. The setting of return codes is particularly useful in
testing environments or CI/CD environments.
We can also run Terrier with verbose mode enable to get more information:
$ ./terrier [+] Loading config: cfg.yml [+] Analysing Image [+] Docker Image Source: myImage.tar [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [!] Identified instance of '/usr/bin/curl' at: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560/usr/bin/curl [!] Verified matching instance of '/usr/bin/curl' at: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560/usr/bin/curl with hash: 9a43cb726fef31f272333b236ff1fde4beab363af54d0bc99c304450065d9c96 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c [!] All components were identified: (1/1) [!] All components were identified and verified: (1/1)
The output above provides some more detailed information such as which layer the cURL files was located at. If you wanted more information, you could enable the veryveryverbose option in the config file but beware, this is a lot of output and grep will be your friend.
There is no limit for how many hashes you can specify for a file. This can be useful for when you want to allow more than one version of a specific file i.e multiple versions of cURL. An example config of multiple hashes for a file might look like:
mode: image image: myImage.tar files: - name: '/usr/bin/curl' hashes: - hash: '9a43cb726fef31f272333b236ff1fde4beab363af54d0bc99c304450065d9c96' - hash: 'aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545' - hash: '6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759' - hash: 'd4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c'
The config above allows Terrier to verify if the identified cURL instance is one of the provided hashes. There is also no limit for the amount of files Terrier can attempt to identify and verify.
Terrier’s Github repo also contains a useful script called
convertSHA.sh which can be used to convert a list of
SHA256 hashes and filenames into a Terrier config file. This is
useful when converting the output from other tools into a Terrier
friendly format. For example, we could have the following contents
of a file:
8946690bfe12308e253054ea658b1552c02b67445763439d1165c512c4bc240d ./bin/uname 6de8254cfd49543097ae946c303602ffd5899b2c88ec27cfcd86d786f95a1e92 ./bin/gzexe 74ff9700d623415bc866c013a1d8e898c2096ec4750adcb7cd0c853b4ce11c04 ./bin/wdctl 61c779de6f1b9220cdedd7dfee1fa4fb44a4777fff7bd48d12c21efb87009877 ./bin/dmesg 7bdde142dc5cb004ab82f55adba0c56fc78430a6f6b23afd33be491d4c7c238b ./bin/which 3ed46bd8b4d137cad2830974a78df8d6b1d28de491d7a23d305ad58742a07120 ./bin/mknod e8ca998df296413624b2bcf92a31ee3b9852f7590f759cc4a8814d3e9046f1eb ./bin/mv a91d40b349e2bccd3c5fe79664e70649ef0354b9f8bd4658f8c164f194b53d0f ./bin/chown 091abe52520c96a75cf7d4ff38796fc878cd62c3a75a3fd8161aa3df1e26bebd ./bin/uncompress c5ebd611260a9057144fd1d7de48dbefc14e16240895cb896034ae05a94b5750 ./bin/echo d4ba9ffb5f396a2584fec1ca878930b677196be21aee16ee6093eb9f0a93bf8f ./bin/df 5fb515ff832650b2a25aeb9c21f881ca2fa486900e736dfa727a5442a6de83e5 ./bin/tar 6936c9aa8e17781410f286bb1cbc35b5548ea4e7604c1379dc8e159d91a0193d ./bin/zforce 8d641329ea7f93b1caf031b70e2a0a3288c49a55c18d8ba86cc534eaa166ec2e ./bin/gzip 0c1a1f53763ab668fb085327cdd298b4a0c1bf2f0b51b912aa7bc15392cd09e7 ./bin/su 20c358f7ee877a3fd2138ecce98fada08354810b3e9a0e849631851f92d09cc4 ./bin/bzexe 01764d96697b060b2a449769073b7cf2df61b5cb604937e39dd7a47017e92ee0 ./bin/znew 0d1a106dc28c3c41b181d3ba2fc52086ede4e706153e22879e60e7663d2f6aad ./bin/login fb130bda68f6a56e2c2edc3f7d5b805fd9dcfbcc26fb123a693b516a83cfb141 ./bin/dir 0e7ca63849eebc9ea476ea1fefab05e60b0ac8066f73c7d58e8ff607c941f212 ./bin/bzmore 14dc8106ec64c9e2a7c9430e1d0bef170aaad0f5f7f683c1c1810b466cdf5079 ./bin/zless 9cf4cda0f73875032436f7d5c457271f235e59c968c1c101d19fc7bf137e6e37 ./bin/chmod c5f12f157b605b1141e6f97796732247a26150a0a019328d69095e9760b42e38 ./bin/sleep b9711301d3ab42575597d8a1c015f49fddba9a7ea9934e11d38b9ff5248503a8 ./bin/zfgrep 0b2840eaf05bb6802400cc5fa793e8c7e58d6198334171c694a67417c687ffc7 ./bin/stty d9393d0eca1de788628ad0961b74ec7a648709b24423371b208ae525f60bbdad ./bin/bunzip2 d2a56d64199e674454d2132679c0883779d43568cd4c04c14d0ea0e1307334cf ./bin/mkdir 1c48ade64b96409e6773d2c5c771f3b3c5acec65a15980d8dca6b1efd3f95969 ./bin/cat 09198e56abd1037352418279eb51898ab71cc733642b50bcf69d8a723602841e ./bin/true 97f3993ead63a1ce0f6a48cda92d6655ffe210242fe057b8803506b57c99b7bc ./bin/zdiff 0d06f9724af41b13cdacea133530b9129a48450230feef9632d53d5bbb837c8c ./bin/ls da2da96324108bbe297a75e8ebfcb2400959bffcdaa4c88b797c4d0ce0c94c50 ./bin/zegrep
The file contents above are trusted SHA256 hashes for specific files. If we would like to use this list for ensuring that a particular image is making use of the files listed above, we can do the following:
$ ./convertSHA.sh trustedhashes.txt terrier.yml
The script above takes the input file
trustedhashes.txt which contains our trusted hashes
listed above and converts them into a Terrier friendly config file
terrier.yml which looks like the following:
mode: image image: myImage.tar files: - name: '/bin/uname' hashes: - hash: '8946690bfe12308e253054ea658b1552c02b67445763439d1165c512c4bc240d' - name: '/bin/gzexe' hashes: - hash: '6de8254cfd49543097ae946c303602ffd5899b2c88ec27cfcd86d786f95a1e92' - name: '/bin/wdctl' hashes: - hash: '74ff9700d623415bc866c013a1d8e898c2096ec4750adcb7cd0c853b4ce11c04' - name: '/bin/dmesg' hashes: - hash: '61c779de6f1b9220cdedd7dfee1fa4fb44a4777fff7bd48d12c21efb87009877' - name: '/bin/which' hashes: - hash: '7bdde142dc5cb004ab82f55adba0c56fc78430a6f6b23afd33be491d4c7c238b' - name: '/bin/mknod'
The config file
terrier.yml is ready to be
$ ./terrier -cfg=terrier.yml [+] Loading config: terrier.yml [+] Analysing Image [+] Docker Image Source: myImage.tar [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c [!] Not all components were identifed: (4/31) [!] Component not identified: /bin/uncompress [!] Component not identified: /bin/bzexe [!] Component not identified: /bin/bzmore [!] Component not identified: /bin/bunzip2 $ echo $? 1
As we can see from the output above, Terrier was unable to identify 4/31 of the components provided in the config. The return code is also 1 which indicates a failure. If we were to remove the components that are not in the provided image, the output from the previous command would look like the following:
$ ./terrier -cfg=terrier.yml [+] Loading config: terrier.yml [+] Analysing Image [+] Docker Image Source: myImage.tar [*] Inspecting Layer: 34a9e0f17132202a82565578a3c2dae1486bb198cde76928c8c2c5c461e11ccf [*] Inspecting Layer: 6539a80dd09da08132a525494ff97e92f4148d413e7c48b3583883fda8a40560 [*] Inspecting Layer: 6d2d61c78a65b6e6c82b751a38727da355d59194167b28b3f8def198cd116759 [*] Inspecting Layer: a6e646c34d2d2c2f4ab7db95e4c9f128721f63c905f107887839d3256f1288e1 [*] Inspecting Layer: aefc8f0c87a14230e30e510915cbbe13ebcabd611e68db02b050b6ceccf9c545 [*] Inspecting Layer: d4468fff8d0f28d87d48f51fc0a6afd4b38946bbbe91480919ebfdd55e43ce8c [*] Inspecting Layer: dbf9da5e4e5e1ecf9c71452f6b67b2b0225cec310a20891cc5dedbfd4ead667c [!] All components were identified: (27/27) [!] Not all components were verified: (26/27) [!] Component not verified: /bin/cat [!] Component not verified: /bin/chmod [!] Component not verified: /bin/chown [!] Component not verified: /bin/df [!] Component not verified: /bin/dir [!] Component not verified: /bin/dmesg [!] Component not verified: /bin/echo [!] Component not verified: /bin/gzexe [!] Component not verified: /bin/gzip [!] Component not verified: /bin/login [!] Component not verified: /bin/ls [!] Component not verified: /bin/mkdir [!] Component not verified: /bin/mknod [!] Component not verified: /bin/mv [!] Component not verified: /bin/sleep [!] Component not verified: /bin/stty [!] Component not verified: /bin/su [!] Component not verified: /bin/tar [!] Component not verified: /bin/true [!] Component not verified: /bin/uname [!] Component not verified: /bin/wdctl [!] Component not verified: /bin/zdiff [!] Component not verified: /bin/zfgrep [!] Component not verified: /bin/zforce [!] Component not verified: /bin/zless [!] Component not verified: /bin/znew $ echo $? 1
The output above indicates that Terrier was able to identify all
the components provided but many were not verifiable, the hashes
did not match and once again, the return code is
indicate this failure.
The previous sections focused on identifying files in images, which can be referred to as a form of “static analysis,” however it is also possible to perform this analysis to running containers. In order to do this, you need the following:
merged folder is Docker specific, in this case,
we are using it because this is where the contents of the Docker
container reside, this might be another location if it were
The location of the container’s
can be determined by running the following commands. First obtain
the container’s ID:
$ docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES b9e676fd7b09 golang "bash" 20 hours ago Up 20 hours cocky_robinson
Once you have the container’s ID, you can run the
following command which will help you identify the location of the
merged folder on the underlying
$ docker exec b9e676fd7b09 mount | grep diff overlay on / type overlay (rw,relatime,lowerdir=/var/lib/docker/overlay2/l/7ZDEFE6PX4C3I3LGIGGI5MWQD4: /var/lib/docker/overlay2/l/EZNIFFIXOVO2GIT5PTBI754HC4:/var/lib/docker/overlay2/l/UWKXP76FVZULHGRKZMVYJHY5IK: /var/lib/docker/overlay2/l/DTQQUTRXU4ZLLQTMACWMJYNRTH:/var/lib/docker/overlay2/l/R6DE2RY63EJABTON6HVSFRFICC: /var/lib/docker/overlay2/l/U4JNTFLQEKMFHVEQJ5BQDLL7NO:/var/lib/docker/overlay2/l/FEBURQY25XGHJNPSFY5EEPCFKA: /var/lib/docker/overlay2/l/ICNMAZ44JY5WZQTFMYY4VV6OOZ, upperdir=/var/lib/docker/overlay2/04f84ddd30a7df7cd3f8b1edeb4fb89d476ed84cf3f76d367e4ebf22cd1978a4/diff, workdir=/var/lib/docker/overlay2/04f84ddd30a7df7cd3f8b1edeb4fb89d476ed84cf3f76d367e4ebf22cd1978a4/work)
From the results above, we are interested in two entries,
workdir because these two
entries will provide us with the path to the container’s
merged folder. From the results above, we can
determine that the container’s
is located at
on the underlying host.
Now that we have the location, we need some files to identify and in this case, we are going to reuse the SHA256 hashes from the previous section. Let’s now go ahead and populate our Terrier configuration with this new information.
mode: container path: merged #image: myImage.tar hashes: - hash: '82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd' - hash: 'cf734865dd344cd9b0b349cdcecd83f79a751150b5fd4926f976adddb93d902c'
The configuration above shows that we have changed the
and we have added the
path to our
folder. We have kept the two hashes from the previous section.
If we run Terrier with this configuration from the location
we get the following output:
$ ./terrier [+] Loading config: cfg.yml [+] Analysing Container [!] Found matching instance of '82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd' at: merged/usr/local/go/bin/go with hash:82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd
From the output above, we know that the container
b9e676fd7b09) does not contain the malicious Python
package but it does contain an instance of the Golang binary which
is located at
And as you might have guessed, Terrier can also be used to verify and identify files at specific paths in containers. To do this, we need the following:
The points above can be determined using the same procedures described in the previous sections. Below is an example Terrier config file that we could use to identify and verify components in a running container:
mode: container path: merged verbose: true files: - name: '/usr/bin/curl' hashes: - hash: '9a43cb726fef31f272333b236ff1fde4beab363af54d0bc99c304450065d9c96' - name: '/usr/local/go/bin/go' hashes: - hash: '82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91dd3ff92dd'
If we run Terrier with the above config, we get the following output:
$ ./terrier [+] Loading config: cfg.yml [+] Analysing Container [!] Found matching instance of '/usr/bin/curl' at: merged/usr/bin/curl with hash:9a43cb726fef31f272333b236ff1fde4beab363af54d0bc99c304450065d9c96 [!] Found matching instance of '/usr/local/go/bin/go' at: merged/usr/local/go/bin/go with hash:82bce4b98d7aaeb4f841a36f7141d540bb049f89219f9e377245a91 dd3ff92dd [!] All components were identified: (2/2) [!] All components were identified and verified: (2/2) $ echo $? 0
From the output above, we can see that Terrier was able to
successfully identify and verify all the files in the running
container. The return code is also
0 which indicates a
successful execution of Terrier.
In addition to Terrier being used as a standalone CLI tool, Terrier can also be integrated easily with existing CI/CD technologies such as GitHub Actions and CircleCI. Below are two example configurations that show how Terrier can be used to identify and verify certain components of Docker files in a pipeline and prevent the pipeline from continuing if all verifications do not pass. This can be seen as an extra mitigation for supply-chain attacks.
Below is a CircleCI example configuration using Terrier to verify the contents of an image.
version: 2 jobs: build: machine: true steps: - checkout - run: name: Build Docker Image command: | docker build -t builditall . - run: name: Save Docker Image Locally command: | docker save builditall -o builditall.tar - run: name: Verify Docker Image Binaries command: | ./terrier
Below is a Github Actions example configuration using Terrier to verify the contents of an image.
name: Go on: [push] jobs: build: name: Build runs-on: ubuntu-latest steps: - name: Get Code uses: actions/checkout@master - name: Build Docker Image run: | docker build -t builditall . - name: Save Docker Image Locally run: | docker save builditall -o builditall.tar - name: Verify Docker Image Binaries run: | ./terrier
In this blog post, we have looked at how to perform multiple actions on Docker (and OCI) containers and images via Terrier. The actions performed allowed us to identify specific files according to their hashes in images and containers. The actions performed have also allowed us to identify and verify multiple components in images and containers. These actions performed by Terrier are useful when attempting to prevent certain supply-chain attacks.
We have also seen how Terrier can be used in a DevOps pipeline via GitHub Actions and CircleCI.
Learn more about Terrier on GitHub at https://github.com/heroku/terrier.
Last month, journalist Matt Cohen tweeted about his years-long Instagram group chat comprised of fellow Matt Cohens, which he calls “the most wholesome thing I’m a part of.”
In the chat, one Matt Cohen shared that he “had [his] first day of college classes today,” to which a Matt Cohen responded “Nice. Just started my first job. Real world is brutal enjoy college man.”
“Got married!” and “Just started my dream job!” chimed in fellow Matt Cohens. Another Matt Cohen announced he had launched a weed brand. The Matt Cohens, who have turned a shared name into an informal online club, planned a Zoom Happy Hour to catch up.
Your name clones usually lurk around you like a shadow. You get their junk mail, their emails, their Google results; glimpses of their intimate moments via their digital ephemera. They are strangers — but they don’t have to be.
Around the world, people are maintaining multigenerational, global friendships with their same-named counterparts — Jake Wright, William Hodgson, Jordan DaSilva, and Josh Brown, to name a few. Sometimes, name twins commiserate about shared experiences: a sixteen-member Council of Aaron Johnson chat laments about the viral Key and Peele sketch that introduced the now-inescapable A-A-Ron nickname. Perhaps the best, or at least the most publicized, example of same-name camaraderie is the Josh Fight, when a group chat of Josh Swains organized an April 2021 meeting in Lincoln, Nebraska to fight for the “right” to the name. More than 900 Joshes showed up.
The Paul O’Sullivan Band has four members with one thing in common: the name Paul O’Sullivan. The quartet materialized after Baltimore Paul started “indiscriminately adding other Paul O’Sullivans on Facebook” and realized that a few different Paul O’Sullivans were musicians. These days, a quartet of Paul O’Sullivans, who hail form from Baltimore, Rotterdam, Manchester, and Pennsylvania, have come together to form a bona fide musical group.
Since its early days, the social internet has been lauded as a way for niche interest groups to connect, and name twins are no exception. A chat titled “Council of Bens” hosts 2500 Benjamins and Bens, and when one Ben caught wind of a similar group chat of Sydneys, he created a chat just for people named Sydney or Ben, which has been going strong for months. Chris Lenaghan added 7 other Chris Lenaghans to a chat, and soon he had same-name friends from Ohio to Belfast to Birmingham. In a Josh Kaplan group chat on Twitter, fellow Josh Kaplans use the chat to congratulate each other on achievements and awards: “A win for one JK is a win for all.”
Samuel Stewart, a 19-year-old Exeter student living in London, formed an Instagram chat of fellow Samuel Stewarts after reading about the Josh Fight. For a few weeks, they chatted about their days; older Sam Stewarts gave advice to younger Sam Stewerts. “They seemed to take me under their wing as if I were a younger version of them,” said a 19-year-old Sam Stewert when we talked on the phone. But the chat went awry when one Samuel Stewert started asking for money. “I felt a bond with the fellow Samuel Stewarts, but the name connection wasn’t quite strong enough for me to start giving away my college fund,” Sam told me.
“They seemed to take me under their wing as if I were a younger version of them.”
The chats aren’t strictly social — sometimes, they’re the most practical way to sort through same-name mixups. Will Packer, a strategist in New York, recently used the Will Packer chat to see if any of his name brothers had been contributing to his inbox clutter. “Any of you from Queensland?” he asked. “Someone tried to create a PlayStation account with my email.”
College student Nolen Young says, “I once created a Facebook Messenger group chat with everyone I could find on Facebook with my exact same name, spelling and all. There were only two other people. One of them considered giving me a job, and the other was an old man who started commenting on all my photos. I've messaged the former a few times because he owns every domain name and email I've ever wanted, and he keeps telling me I can only have them when he dies.”
It’s easier than ever to connect with same-name pals today, but the uncanny allure of name clones predates social media. Tahnee Gehm, an artist and animator based in L.A., organized a Web 1.0 catalog of Tahnees when she was a teenager.
“My dad was into computers and he got me a URL with my name,” she says. “I built an atrocious ‘90s website in 2001 as an eighth grader, and I started getting messages from girls all over the world named Tahnee.”
To catalog her new pen pals, she created a “Hall of Tahnees” webpage with a photo, bio, and hometown for every Tahnee she could find. The site’s “Tahnee-only area” was a “weird, unique club.” Once, she says, a singer from the band Hanson used the website to track down a girl named Tahnee he’d met at a concert. And the Tahnee bond has lasted decades: Tahnee Gehm has maintained a long-distance friendship with Tahneé Engelen since they were in high school. A few years ago, Gehm spent two weeks visiting Engelen in Paris, where she works as a neurobiologist.
“It’s nice to know that my name buddy is living my alternate life and absolutely killing it,” she told Input over the phone.
Sometimes, all it takes to spark a friendship is a similar email address. Seth Capron met an older Seth Capron after noticing their similar interests based on the emails he mistakenly received — soon, they realized their physical resemblance, too. These days, the older Seth jokes that he could pass on his career. “I was actually considering that as I move into retirement, the Younger could just carry on in my former role of Seth Capron, affordable housing consultant,” said “Seth the Older.”
Name buddies sometimes have a parasocial relationship with each other’s digital footprint. As a kid, Chris Lenaghan found online videos of a different Chris Lenaghan doing wheelies and “cool BMX shit” and immediately told all his friends that it was him in the videos. Years later, thanks to a big group chat, Chris Lenaghan met the BMX trickster, who he now calls “Ohio Chris,” and they ended up becoming close friends.
The chats don’t always advance beyond acquaintanceship, though. Evan Quigley, a University of Florida student, says that the Evan Quigley group chat is “more like a running joke than true friendship.” (The Evan Quigleys, bonded by name alone, proclaim unconditional public support for one another by commenting “way to go, Evan Quigley” on each other’s posts).
People with uncommon first names can bond over shared experiences — mispronunciations, playground taunts, and misspellings. More than a dozen Zaviens have come together via Snapchat. “None of us had ever talked to another Zavien,” one Zavien told Input. And a 14-member-strong “Council of Ethyns” chat, which started on Instagram in 2019, is mostly dedicated to tongue-in-cheek malice toward Ethans (with an “a”). They also just pop in the chat to say “love you Ethyn” a lot.
Still, the unlikely connections evoke nostalgia for a simpler internet, less cluttered with surveillance and corporate interests, where people went to meet new friends. Occasionally, wholesome chance online encounters remain. “Text door neighbors,” for example, or people with phone numbers one digit apart, show how easy it is to stumble upon an unlikely friend. Most notably in the wrong-number-gone-right stories, the duo Wanda and Jamal, whose viral wrong number ordeal has led to a six-year-long-and-counting Thanksgiving tradition, is now set to be featured in an upcoming Netflix movie.
It’s a big world out there — lots of Matt Cohens, more Alex Stewarts, and even more James Smiths — and your name buddies have never been easier to befriend. And I think that’s beautiful.
But just because we’re psychologically inclined to like our own name, doesn’t mean you’ll have a guaranteed connection with your name clones. Just ask Kelly Hildebrandt and Kelly Hildebrandt, the couple that tied the knot a year after they’d met when name-searching on Facebook and then, four years later, called off the marriage due to irreconcilable differences. It’s not all in a name.
Missouri’s school funding strategy recognizes that some children and communities need more financial support to meet education standards.
It directs extra funds to districts that have a harder time raising local property taxes, and to children who have special needs, are learning English or are living in poverty.
But experts say while the system has good intentions, the devil is in the details.
Parts of Missouri’s funding strategies undermine its equity goals. School finance researchers named issues that include:
Overall, this leads to a situation where some districts receive state aid they don’t need while others are stretched thin as they attempt to serve children who need more resources.
“We have a large portion of students across the state who experience some form of economic disadvantage,” said Cameron Anglum, an assistant professor of education, policy and equity at the Saint Louis University School of Education.
“It’s really important that the state funding formula serve those kids effectively, particularly those kids that live in districts that don’t have the local property wealth … to provide an adequate education.”
Bruce Baker, a professor and chair of the department of teaching and learning at the University of Miami School of Education and Human Development, said the main goals of a school finance formula should be adequacy and equity.
Adequacy means there’s enough funding for the school to meet certain goals. Equity acknowledges that some students or schools may require greater funding to meet those standards.
To illustrate, Baker referred to the School Finance Indicators Database run by the Albert Shanker Institute and Rutgers Graduate School of Education.
The database calculates that in 2019, the latest data available, the 20% of districts with the highest poverty rates in Missouri needed nearly $12,000 more per student to reach national average test scores than the 20% of districts with the lowest poverty rates.
Instead, the database shows students in highest-poverty districts were receiving only about $1,000 more than students in the most affluent schools.
Baker, one of the main researchers for the database, said the numbers are based on a statistical model that uses data on student characteristics, hiring costs and district size to calculate necessary funding levels, which are different in each state.
James Shuls, an associate professor of educational leadership and policy studies at the University of Missouri-St. Louis, said school funding “reflects the values of people” and appropriate levels should be determined through the political process.
Shuls said he personally values choice, equity and efficiency in education funding. He previously worked for the Show-Me Institute, where he authored a Missouri school finance formula primer. The institute is a think tank “dedicated to promoting free markets and individual liberty” and supportive of policies that increase “school choice.”
An ideal funding formula should be “dynamic,” said Shuls, reflecting changing local resources and specific student needs to better promote equity.
Instead, Missouri’s formula reflects outdated property values and school funding levels, Shuls said.
Missouri’s school funding formula starts with an “adequacy target,” the amount of money needed to educate a single student. It multiplies that number based on student attendance, area cost of living and, in some cases, student characteristics that might require extra funds such as disability or learning English.
The formula then factors in how much funding districts can raise from local property taxes.
Anglum, the SLU professor, said one equity challenge is that the state doesn’t manage a majority of the funding that goes to schools.
Some state funding also goes through programs that don’t have the same equity focus as the main formula.
Missouri ranks 47th out of 50 states when it comes to the percentage of school funding that comes from the state. When all sources — local, state and federal — are combined, 2018-19 data from the National Center for Education Statistics shows that K-12 per-student spending in Missouri ranks 32nd in the nation.
Additionally, 2021 data from the National Education Association, a prominent teachers union, shows that not counting the District of Columbia, Missouri has the second-highest percentage of funding coming from local sources and the smallest percentage coming from state sources.
“When we are relying predominantly on local resources in order to fund education, higher-wealth districts are going to win out and lower-wealth districts are going to lose out,” Anglum said.
Traci Gleason, vice president for external affairs at the Missouri Budget Project, said lower state funding can cause localities with fewer resources to choose between underfunding services — including education — or imposing burdensome levels of property and sales taxes.
When legislators reformed school finance in 2005, they also included “hold harmless” provisions to ensure no district would receive less state money under the new formula.
Shuls said that was a sensible way to prevent abrupt funding dips for some districts under the new system. But the “hold harmless” provisions didn’t phase out, meaning many districts are still being funded at outdated levels instead of updated, equitable ones.
When the formula calculates districts’ ability to raise local property taxes, it’s using property values that are now more than 16 years old. That means the state is giving districts with growing property values more funds than they need to meet targets, instead of distributing that money in other ways.
Baker, the University of Miami professor with experience in Missouri and Kansas, said Missouri’s “hold harmless” provisions aren’t even the biggest factor that prevents the state from having a “progressive” funding system. (In this case, “progressive” means districts with greater need spend more money per student.)
Hold harmless provisions tend to partially undo reforms, he agreed. “But I’m not convinced that any of the changes they were making would have very aggressively moved it in the right direction anyway.”
Instead, he said the state’s method of calculating attendance financially penalizes districts that most need support.
Missouri calculates the number of students in each district by using the average daily attendance instead of the total number of students.
That means a school with an 80% attendance rate on the average day could see its funding cut by 20% compared to an otherwise identical school with perfect attendance.
Baker said that’s especially problematic when it comes to equity because schools with lower attendance rates tend to have higher rates of students living in poverty.
“It’s been explained to policymakers in every damn state that it is discriminatory and erases any need adjustment to fund on average daily attendance, and only a few states are bold enough to still do it,” he said. “There’s no excuse for doing it. There’s no legitimate incentive that funding on average daily attendance will, you know, cause attendance to improve.”
Anglum and Shuls agreed that using average daily attendance penalizes poorer schools, although Shuls said there are pros and cons in all methods of calculating attendance.
Another quirk of Missouri’s system is that while it “weights” students who are typically more costly to educate, it only does so when the percentage of students in a specific category exceeds a specific threshold.
For example, the threshold for students receiving free and reduced-price lunch — a common way to estimate numbers of low-income students — is a bit more than 30%. Schools that serve a higher percentage than that get extra funding. Meanwhile, a district serving 25% students in that category doesn’t receive more funding than a district serving 5%.
Shuls, Baker and Anglum all criticized the use of thresholds. Shuls suggested the state could even differentiate the amounts granted for special-needs students — who can have very different funding needs — to better create a system where money “follows the student.”
Baker said that over the past decades, Kansas has strengthened its school finance system while Missouri’s has weakened.
Baker formerly taught at the University of Kansas and was involved in discussions surrounding school finance reform in both Missouri and Kansas. He recently published “School Finance and Education Equity: Lessons from Kansas,” which he said includes many comparisons with Missouri.
“The costs to get to the same outcomes are a little lower in Kansas, but Kansas also much more robustly funds their system,” Baker said.
In Kansas, 58% of districts are spending above the adequate level and achieving results above the national average, Baker said. In Missouri, only 43% of districts are doing the same.
Meanwhile, about 13% of Kansas districts are spending below the targets and achieving below the national average. Nearly 30% of Missouri districts are in the same boat.
“There’s much more inequality in Missouri; there’s far more kids in inadequately funded districts that then have inadequate outcomes to go along with that,” Baker said. “Kansas has just done much better in that regard, over time.”
The Beacon is working on a larger story about Kansas’ school finance formula.
A report from the Missouri Budget Project shows Missouri’s overall K-12 funding target for each student, adjusted for inflation, is less than the 2007 amount — by about $1,000.
Gleason, the project spokesperson, said that while Kansans
reacted to abrupt funding cuts several years ago and restored
funding, Missourians haven’t been as aware of gradual funding
“Missouri has been more like the frog in the frying pan, or boiling water … We just haven’t noticed because it’s happened so slowly over time.”
The post Missouri’s school funding system undermines its own goals for equity, experts say appeared first on The Beacon.
ops is hard. what have we learned so far?
Last weekend I happened to pick up a book called “Rituals For Work: 50 Ways To Create Engagement, Shared Purpose, And A Culture That Can Adapt To Change.” It’s a super quick read, more comic book than textbook, but I liked it.
It got me thinking about the many rituals I have initiated and/or participated in over the course of my career. Of course, I never thought of them as such — I thought of them as “having fun at work” — but now I realize these rituals disproportionately contribute to my favorite moments and the most precious memories of my career.
Rituals (a definition): Actions that a person or group does repeatedly, following a similar pattern or script, in which they’ve imbued symbolism and meaning.
I think it is extremely worth reading the first 27 pages of the book — the Introduction and Part One. To briefly sum up the first couple chapters: the power of creative rituals comes from their ability to link the physical with the psychological and emotional, all with the benefit of “regulation” and intentionality. Physically going through the process of a ritual helps people feel satisfied and in control, with better emotional regulation and the ability to act in a steadier and more focused way. Rituals also powerfully increase people’s sense of belonging, giving them a stable feeling of social connection. (p. 5-6)
The thing that grabbed me here is that rituals create a sense of belonging. You show that you belong to the group by participating in the ritual. You feel like you belong to the group by participating in the ritual. This is powerful shit!
It seems especially relevant these days when so many of us are atomized and physically separated from our teammates. That ineffable sense of belonging can make all the difference between a job that you do and a role that feeds your soul. Rituals are a way to create that sense of belonging. Hot damn.
So I thought I’d write up some of the rituals for engineering teams I remember from jobs past. I would love to hear about your favorite rituals, or your experience with them (good or bad). Tell me your stories at @mipsytipsy.
At Linden Lab, in the ancient era of SVN, we had something called the “Feature Fish”. It was a rubber fish that we kept in the freezer, frozen in a block of ice. We would periodically cut a branch for testing and deployment and call a feature freeze. Merging code into the branch was painful and time consuming, so If you wanted to get a feature in after the code freeze, you had to first take the fish out of the freezer and unfreeze it.
This took a while, so you would have to sit there and consider your sins as it slowly thawed. Subtext: Do you really need to break code freeze?
You were supposed to pair with another engineer for code review. In your commit message, you had to include the name of your reviewer or your merge would be rejected. But the template would also accept the name “Stuffy”, to confess that your only reviewer had been…Stuffy, the stuffed animal.
However if your review partner was Stuffy, you would have to narrate the full explanation of Stuffy’s code review (i.e., what questions Stuffy asked, what changes he suggested and what he thought of your code) at the next engineering meeting. Out loud.
We had a matted green felt headband with ogre ears on it, called the Shrek Ears. The first time an engineer broke production, they would put on the Ears for a day. This might sound unpleasant, like a dunce cap, but no — it was a rite of passage. It was a badge of honor! Everyone breaks production eventually, if they’re working on something meaningful.
If you were wearing the Shrek Ears, people would stop you throughout the day and excitedly ask what happened, and reminisce about the first time they broke production. It became a way for 1) new engineers to meet lots of their teammates, 2) to socialize lots of production wisdom and risk factors, and 3) to normalize the fact that yes, things break sometimes, and it’s okay — nobody is going to yell at you.
This is probably the number one ritual that everybody remembers about Linden Lab. “Congratulations on breaking production — you’re really one of us now!”
We had a stuffed Vorpal Bunny, duct taped to a 3″ high speaker stand, and the operations engineer on call would put the bunny on their desk so people knew who it was safe to interrupt with questions or problems.
At some point we lost the bunny (and added more offices), but it lingered on in company lore since the engineers kept on changing their IRC nick to “$name-bunny” when they went on call.
There was also a monstrous, 4-foot-long stuffed rainbow trout that was the source of endless IRC bot humor… I am just now noticing what a large number of Linden memories involve stuffed animals. Perhaps not surprising, given how many furries were on our platform
Whenever an engineer really took one for the team and dove headfirst into a spaghetti mess of tech debt, we would award them the “Tiara of Technical Debt” at the weekly all hands. (It was a very sparkly rhinestone wedding tiara, and every engineer looked simply gorgeous in it.)
Examples included refactoring our golang rewrite code to support injection, converting our entire jenkins fleet from AWS instances to containers, and writing a new log parser for the gnarliest logs anyone had ever seen (for the MongoDB pluggable storage engine update).
We spent nearly 2.5 years rewriting our entire ruby/rails API codebase to golang. Then there was an extremely long tail of getting rid of everything that used the ruby unicorn HTTP server, endpoint by endpoint, site by site, service by service.
When we finally spun down the last unicorn workers, I brought in a bunch of rainbow unicorn paper sculptures and a jug of lighter fluid, and we ceremonially set fire to them in the Facebook courtyard, while many of the engineers in attendance gave their own (short but profane) eulogies.
This one requires a bit of backstory.
Finally we caved and got on board. We were excited! I announced the migration and started providing biweekly updates to the infra leadership groups. Four months later, when the migration was half done, I get a ping from the same exact members of Facebook leadership:
“What are you doing?!?”
“You can’t do that, there are security issues!”
“No it’s fine, we have a fix for it.”
“There are hardware issues!”
“No it’s cool, we got it.”
“You can’t do this!!!”
ANYWAY. To make an EXTREMELY long and infuriating story short, they pulled the plug and canned the whole project. So I printed up a ten foot long “Mission Accomplished” banner (courtesy of George W Bush on the aircraft carrier), used Zuck’s credit card to buy $800 of top-shelf whiskey delivered straight to my desk (and cupcakes), and we threw an angry, ranty party until we all got it out of our systems.
I honestly don’t remember what this one was about, but I have extensive photographic evidence to prove that I shaved the heads of and/or dyed the hair blue of at least seven members of engineering. I wish I could remember why! but all I remember is that it was fucking hilarious.
Coincidentally (or not), I have no memories of participating in any rituals at the jobs I didn’t like, only the jobs I loved. Huh.
One thing that stands out in my mind is that all the fun rituals tend to come bottoms-up. A ritual that comes from your VP can run the risk of feeling like forced fun, in a way it doesn’t if it’s coming from your peer or even your manager. I actually had the MOST fun with this shit as a line manager, because 1) I had budget and 2) it was my job to care about teaminess.
There are other rituals that it does make sense for executives to create, but they are less about hilarious fun and more about reinforcing values. Like Amazon’s infamous door desks are basically just a ritual to remind people to be frugal.
Rituals tend to accrue mutations and layers of meaning as time goes on. Great rituals often make no sense to anybody who isn’t in the know — that’s part of the magic of belonging.
Claydream, Marq Evans’ new documentary about animator Will Vinton, addresses the elephant in the room immediately: yes, this is the guy who lost his company to his most deep-pocketed investor, Nike founder Phil Knight. It’s something that looms over the film, but it’s not the only melancholy element that colors this portrait of Vinton’s life and career.
Made with the cooperation of Vinton himself, who died of cancer in 2018 but is interviewed extensively here, Claydream offers a visual history of his remarkable accomplishments. Not only do we get a look at the progression of Vinton’s work over the years (from Closed Mondays, the Oscar-winning 1974 short he created with Bob Gardiner, to his company’s instantly recognizable commercial work from the ‘80s and ‘90s, including the California Raisins), we also get access to home movies, as well as firsthand accounts from friends, family members, and former coworkers. After sparking to filmmaking while at UC Berkeley in the 1960s, Vinton (who prized experimentation and creative fulfillment above all else, and was definitely a bit of a hippie) set up a small workshop with his collaborators in Portland, Oregon, a location that kept their productions deliberately removed from the Hollywood machine—the same machine he’d end up pursuing years later, when Will Vinton Studios was at its peak.
Most of Claydream keeps the focus on Vinton’s work—again, this movie is a visual feast, jam-packed with clips and other ephemera (including answering-machine messages from a California Raisins-obsessed Michael Jackson) that illustrate the narrative of Vinton’s career every step of the way. But for all his success, and for the admirable way he bounced back from his periodic failures and missteps, he never achieved the heights of his idol, Walt Disney, whose life trajectory he emulated, down to plans for a never-realized “Claymation Station” amusement park. Though he was well-liked as a person, not everyone he worked with is full of praise; there were issues over the years of sharing credit with the other animators who toiled on his projects, as well as some bad business decisions that meant, for instance, that Will Vinton Studios didn’t share in the licensing for the insanely marketable California Raisins—and also that Vinton passed on selling his company to Pixar during its pre-Disney era. A contentious split with the troubled Gardiner soon after their shared Oscar win haunted Vinton until Gardiner’s death in 2005. But as Claydream amply illustrates, the Phil Knight debacle ended up being the biggest tragedy of Vinton’s creative life.
Neither Knight nor his son Travis Knight are interviewed in Claydream; we see them in deposition and archival footage only. Travis Knight, now a film director known for the stop-motion feature Kubo and the Two Strings as well as the live-action Transformers spin-off Bumblebee, comes off particularly badly just on the basis of the facts presented: a failed rapper, he was hired at Will Vinton Studios after his father invested in it, where he developed his (by all accounts) true talent and passion for animation. But there’s no escaping the “nepotism baby” aroma that envelops him in this context, especially when the documentary points out that he became head of Will Vinton Studios—renamed Laika—after Vinton, who was unable to rescue his financially struggling company, was pushed out.
It’s juicy show-biz stuff, for sure, but Vinton makes a point of turning what was obviously an incredibly devastating blow into something positive. Looking back several years after he lost his studio, he sounds genuinely proud of its continued success, specifically in the way that Laika—which has since become a Hollywood powerhouse with acclaimed titles like Coraline, ParaNorman, The Boxtrolls, Missing Link, and Knight’s Kubo—brought stop-motion to an ever-wider audience while innovating on the art form. It couldn’t have been easy for Vinton to make peace with the situation, but Claydream sure makes it seem like he was able to. Perhaps, as in his earliest days as a counterculture animator, it all came down to what really mattered: making an end product that was cool as it could possibly be. Even if Vinton wasn’t directly involved in any of Laika’s titles, his legacy lives on.
Claydream hits select theaters today, August 5.
Want more io9 news? Check out when to expect the latest Marvel and Star Wars releases, what’s next for the DC Universe on film and TV, and everything you need to know about House of the Dragon and Lord of the Rings: The Rings of Power.
Iâ€™m Brandon Sanderson, a bestselling fantasy author. Best known for The Stormlight Archive, Mistborn, and for finishing Robert Jordanâ€™s The Wheel of Time, Iâ€™m now also known for having the highest-funded campaign in Kickstarterâ€™s history for four books I wrote during the quarantine. If you want to stay up to date with me, you should check out my YouTube channel (where you can watch me give my answers to the questions below) and my Facebook, Twitter, and Instagram. Ask me any questions you like, but Iâ€™m less likely to answer questions with massive spoilers for the books. Iâ€™ll be taking questions today only.
EDIT: I'm off the livestream and have had some dinner. The transcription of some questions is still coming, as...well, I talk a lot. Those answers will be posted soon, or you can see them on the VOD of my answers on the YouTube channel.
Apologies for the stream-of-consciousness wall-of-text answers. This was a new thing for us, finding a way for me to be able to give answers for people while also getting piles of pages signed. I hope you can make sense of the sometimes rambling answers I give. They might flow better if you watch them be spoken.
Thanks, all, for the wonderful AMA. And as I said, some answers are still coming (and I might pop in and write out a few others that I didn't get to.)
Russia’s invasion of Ukraine has exacerbated a number of fault lines already present within the global energy supply chain. This is especially true in Europe, where many countries were reliant on the superstate's natural resources, and are now hastily looking to cut ties before the supply is shut off. This has revealed the fragility of Europe’s energy market, and caused it to drive up demand and prices for consumers all over the globe.
In the UK, things are becoming increasingly dire and energy prices are skyrocketing. Bad planning on the infrastructure side and the cancellation of several major domestic energy efficiency programs are exacerbating the problem. It’s clear that real, useful action on the national level isn’t coming any time soon. So, I wondered, what would happen if I, personally, simply tried to break up with natural gas on my own? It’s relatively straightforward but, as it turns out, it comes at a cost that only one percenters will be able to bear.
I live in a four-bedroom, end-terraced house that’s around 150 years old and I’ve tried, as best as I can, to renovate it in an eco-friendly way. Since we bought it almost a decade ago, my wife and I have insulated most of the rooms, installed a new gas central heating system and hot water cylinder. We are, like nearly 20 million other households in the UK, reliant on natural gas to supply our home heating, hot water and cooking. And in the period between January 8th and April 7th, 2022, I was billed on the following usage:
Cost Per Unit (GBP)
Electricity (incl. standing charge)
Gas (incl. standing charge)
Total (incl. tax and other charges)
Essentially, I paid around $1,300 for my natural gas and electricity in the first quarter of 2022. That figure is likely to rise significantly, as the UK’s mandatory price cap on energy rose by more than 50 percent in April. A further price rise is scheduled for October, with the figure set at £2,800 per year, even though wholesale energy prices are no longer increasing. It’s likely that my energy bill for the first quarter of 2023 will be nearly twice what I’ve just paid. In 2020, the UK reported that 3.16 million households were unable to pay for their energy costs; that figure is likely to leap by 2023.
In the US, the EIA says that monthly utility bills rose to a national average of $122 in 2021, with Hawaii ($178 per month) and Utah ($82 per month) the most expensive and cheapest state to buy energy in. The average price per kWh is around 13.7 cents, which is less than half the comparable price in the UK as it currently stands. For natural gas, the average natural gas price for residential customers was $10.84 per thousand cubic feet in 2020.
Much of Europe is reliant on natural gas, a significant proportion of which was supplied by Russia. Despite a rapid decline in domestic production, Europe sought to make natural gas the bedrock of its energy policy in the medium term. A 2013 policy paper written by Sami Andoura and Clémentine d’Oultremont outlined the reasons why officials were banking on it. “An economically attractive option for investors, a potential backup source for renewables and the cleanest fossil fuel, natural gas is expected to play an important role in the European transition towards a low-carbon economy by 2050.” This is despite the fact that “European energy resources are being depleted, and energy demand is growing.”
In 2007, then EU Energy Commissioner Andris Piebalgs said that the bloc is “dependent on imports for over one half of our energy use.” He added that energy security is a “European security issue,” and that the bloc was vulnerable to disruption. “In 10 years, from 1995 to 2005, natural gas consumption in the EU countries has increased from 369 billion to 510 billion m3 [of gas] year,” he said. He added that the EU’s own production capacity and reserves peaked in the year 2000.
The EU’s plan was to pivot toward Liquified Natural Gas (LNG), methane which has been filtered and cooled to a liquid for easier transportation. It enables energy supplies from further afield to be brought over to Europe to satisfy the continent’s need for natural gas. But the invasion of Ukraine by Russia has meant that this transition has now needed to be accelerated as leaders swear off Russian-sourced gas and oil. And while the plan is to push more investment into renewables, LNG imports are expected to fill much of the gap for now.
Except, and this is crucial, many of the policy decisions made during this period seem to be in the belief that nothing bad would, or could, disrupt supply. Here in the UK, wholesale gas prices have risen five times since the start of 2021 but there’s very little infrastructure available to mitigate price fluctuations.
The Rough Field is a region in the North Sea situated 18 miles off the coast of Yorkshire, and was previously a source of natural gas for the UK. In 1985, however, it was converted into a natural gas storage facility with a capacity of 3.31 billion cubic meters. This one facility was able to fulfill the country’s energy needs for a little more than a week at a time and was considered a key asset to maintaining the UK’s energy security.
However, Centrica, the private company spun out of the former state-owned British Gas, opted to close the field in 2017. It cited safety fears and the high cost of repair as justification for the move, saying that alternative sources of gas – in the form of LNG – were available. At the time, one gas trader told Bloomberg that the closure would “boost winter prices” and “create seasonal swings in wholesale energy costs.” He added that the UK would now be “competing with Asia for winter gas cargoes,” raising prices and increasing reliance on these shipments.
And, unsurprisingly, the ramifications of this decision were felt in the summer of 2017 when a pair of LNG tankers from Qatar changed course. The vessels were going to the UK, and when they shifted direction, Bloomberg reported that prices started to shift upward almost instantly.
Analysis from TransitionZero, reported by The Guardian, says that the costs associated with natural gas are now so high that it’s no longer worth investing in as a “transition fuel.” It says that the cost to switch from coal to gas is around $235 per ton of CO2, compared to just $62 for renewables as well as the necessary battery storage.
In order to break up with gas in my own home, I’ll need to swap out my stovetop (not so hard) and my whole central heating system (pretty hard). The former I can likely achieve for a few hundred dollars, plus or minus the cost of installation. (Some units just plug in to a standard wall socket, so I may be able to do much of the work myself if I’m feeling up to the task.) Of course, getting a professional to unpick the gas pipeline that connects to my stovetop is going to be harder.
Unfortunately, replacing a 35kW condensing gas boiler (I have the Worcester Bosch Greenstar 35CDi) is going to be a lot harder. The obvious choice is an Air Source Heat Pump (ASHP), or even a geothermal Ground Source Heat Pump (GSHP), both of which are more environmentally-friendly. After all, both are more energy-efficient than a gas boiler, and both run on electricity which is theoretically cleaner.
More generally, the UK’s Energy Saving Trust, a Government-backed body with a mission to advocate for energy efficiency, says that the average Briton should expect to pay between £7,000 and £13,000 to install an ASHP. Much of that figure is dependent on how much of your home’s existing hardware you’ll need to replace. A GSHP is even more expensive, with the price starting at £14,000 and rising to closer to £20,000 depending on both your home’s existing plumbing and the need to dig a bore hole outside.
In my case, heat pump specialists told me that, give or take whatever nasties were found during installation, I could expect to pay up to £27,000 ($33,493). This included a new ASHP, radiators, hot water and buffer cylinders, pumps, piping, controllers, parts and labor. Mercifully, the UK is launching a scheme to offer a £5,000 ($6,200) discount on any new heat pump installations. But that still means that I’m paying north of £20,000 (and ripping out a lot of existing materials with plenty of life left in them) to make the switch.
In the US, there’s plenty of difference on a state level, but at the federal level, you can get a tax credit on the purchase of a qualifying GSHP. A system installed before January 1st, 2023, will earn a 26 percent credit, while a unit running before January 1st, 2024, will be eligible for a 22 percent credit. Purchasers of a qualifying ASHP, meanwhile, were entitled to a $300 tax credit until the end of 2021.
The contractors also provided me with a calculation of my potential energy savings over the following seven years. It turns out that I’d actually be spending £76 more on fuel per month, and £532 over the whole period. On one hand, if I had the cash to spare, it’s a small price to pay to dramatically reduce my personal carbon emissions. On the other, I was hoping that the initial investment would help me reduce costs overall, but that's not the case while the cost of gas is (ostensibly) cheaper than electricity. (This will, of course, change as energy prices surge in 2023, however, but I can only look at the data as it presently stands.)
An aside: To be honest with you all, I was fully aware that the economic case for installing a heat pump was always going to be a shaky one. When speaking to industry figures last year, they said that the conversation around “payback” isn’t shared when installing standard gas boilers. It doesn’t help that, at present, levies on energy mean that natural gas is subsidized more than energy, disincentivizing people making the switch. The rise of electric cars, too, has meant that demand for power is going to increase sharply as more people switch, forcing greater investment in generation. What’s required just as urgent is a series of measures to promote energy efficiency to reduce overall demand for both gas and electricity.
The UK has had an on-again, off-again relationship with climate change mitigation measures, which has helped sow the seeds of this latest crisis. The country, with low winter temperatures, relies almost exclusively on natural gas to heat its homes, its largest energy-consuming sector. As I reported last year, around 85 percent of UK homes are heated by burning natural gas in domestic boilers.
Work to reduce the UK’s extraordinary demand for natural gas was sabotaged by government in 2013. In 2009, under the previous Labour government, a series of levies on energy companies were introduced under the Community Energy Saving Programme. These levies were added to domestic energy bills, with the proceeds funding works to install wall or roof insulation, as well as energy-efficient heating systems and heating controllers for people on low incomes. The idea was to reduce demand for gas by making homes, and the systems that heated them, far more efficient since most of the UK’s housing stock was insufficiently insulated when built.
But in 2013, then-Conservative-Prime Minister David Cameron was reportedly quoted as saying that he wanted to reduce the cost of domestic energy bills by getting “rid of all the green crap.” At the time, The Guardian reported that while the wording was not corroborated by government officials, the sentiment was. Essentially, that meant scrapping the levies, which at the time GreenBusinessWatch said was around eight percent of the total cost of domestic energy. Cameron’s administration also scrapped a plan to build zero-carbon homes, and effectively banned the construction of onshore windfarms which would have helped reduce the cost of domestic electricity generation.
In 2021, the UK’s Committee on Climate Change examined the fallout from this decision, saying that Cameron’s decision kneecapped efforts to reduce demand for natural gas. As Carbon Brief highlighted at the start of 2022, in 2012, there were nearly 2.5 million energy efficiency improvements installed. By 2013, that figure had fallen to just 292,593. The drop off, the Committee on Climate Change believes, has caused insulation installations to fall to “only a third of the rate needed by 2021” to meet the national targets for curbing climate emissions.
Carbon Brief’s report suggests that the financial savings missed by the elimination of these small levies – the “green crap,” – has cost UK households around £2.5 billion. In recent years, a pressure group – Insulate Britain – has undertaken protests at major traffic intersections to help highlight the need for a new retrofit program to be launched. The current government’s response to their pleas has been to call for tougher criminal penalties for protesters including a jail term of up to six months.
Looking back through my energy bills over the last few years, my household’s annual electricity consumption is around 4,500kWh per year. A heat pump would likely add a further 6,000kWh to my energy bill, not to mention any additional cost for switching to all-electric cooking. It would be sensible to see if I could generate some, or all, of my own energy at home using solar panels to help reduce the potential bill costs.
The Energy Saving Trust says that the average homeowner can expect to pay £6,500 for a 4.2kWp system on the roof of their home. Environmental factors such as the country you live in and orientation of your property mean you can’t be certain how much power you’ll get out of a specific solar panel, but we can make educated guesses. For instance, the UK’s Renewable Energy Hub says you can expect to get around 850kW per year out of a 1kW system. For a theoretical 5kWp system in my location, the Energy Saving Trust thinks I’ll be able to generate around 4,581kWh per year.
Sadly, I live in an area where, even though my roof is brand new and strong enough to take panels, they aren’t allowed. This is because it is an area of “architectural or historic interest where the character and appearance [of the area] needs to be protected or improved.” Consequently, I needed to explore work to ground-mount solar panels in my back garden, which gets plenty of sunlight.
While I expected grounded panel installations to be much cheaper, they apparently aren’t. Two contractors I spoke to said that while their average roof-based installation is between £5,000 and £7,000, a 6kWp system on the ground would cost closer to £20,000. It would be, in fact, cheaper to build a sturdy shed in the bit of back yard I had my eye on and install a solar system on top of there, compared to just getting the mounting set up on the ground. That’s likely to spool out the cost even further, and that’s before we get to the point of talking about battery storage.
For this rather nifty thought experiment, the cost for me to be able to walk away from natural gas entirely would be north of £30,000 ($37,000). Given that the average UK salary is roughly £38,000, it’s a sum that is beyond the reach of most people without taking out a hefty loan. This is, fundamentally, why the need for government action is so urgent, since it is certainly beyond the ability of most people to achieve this change on their own.
In fact, it’s going to require significant movement from central government not just in the UK but elsewhere to really shake our love-hate relationship with natural gas. Unfortunately, given that it’s cheap, cleaner than coal and the energy lobby has plenty of muscle behind it, that’s not likely to happen soon. And so we’re stuck in a trap – it’s too expensive to do it ourselves (although that’ll certainly be an interesting experiment to undertake) and there’s no help coming, despite the energy crisis that’s unfurling around us.
Maps of the American West have featured ever darker shades of red over the past two decades. The colors illustrate the unprecedented drought blighting the region. In some areas, conditions have blown past severe and extreme drought into exceptional drought. But rather than add more superlatives to our descriptions, one group of scientists believes it's time to reconsider the very definition of drought.
<SimonSapin> nox: the history of packaging in python is
<nox> SimonSapin: All I need to know is, is setuptools old stuff or new stuff?
<SimonSapin> nox: its been both
<SimonSapin> in that order
I first fell in love with wuxia when I was around eight or so. I remember running around swinging the bright yellow handle of my toy broom as a sword, calling a sprawling tiger stuffed toy my master and pretending the shower was a waterfall I could learn the secrets of the universe under. I ran on tiptoe because that was somehow more like flying—or “hing gung” 輕功, the art of lightness, as I would eventually become fond of translating it .
But even before then I was deeply familiar with the genre; its many conventions have become baked into the everyday language of the Hong Kong I grew up in. My relatives all played Mahjong and much like with sports, discussions around these games borrowed heavily from the language of sparring martial artists. I’d ask at the end of every Sunday, what are the results of the battles. When asking for a family recipe, someone would joke that they’d have to become the apprentice of this or that auntie. Later, there was the world of study guides and crib sheets, all calling themselves secret martial arts manuals. The conventions around martial artists going into seclusion to perfect their craft and going mad in the pursuit of it take on new meaning as slang around cramming for exams.
Which is all to say, I really love wuxia.
“Wuxia”, literally meaning “martial hero”, is a genre about martially powerful heroes existing in a world parallel to and in the shadows of the Chinese imperial history.
The archetypal wuxia hero is someone carving out his own path in the world of rivers and lakes, cleaving only to their own personal code of honour. These heroes are inevitably embroiled in personal vengeance and familial intrigue, even as they yearn for freedom and seek to better their own skills within the martial arts. What we remember of these stories are the tournaments, the bamboo grove duels and the forbidden love.
Parallels are often drawn to knights errant of medieval romances, with many older translations favouring a chivalric vocabulary. There are also obvious comparisons to be made with the American western, especially with the desperados stumbling into adventures in isolated towns in search for that ever-elusive freedom.
It is easy to think of wuxia in these universal terms with broad themes of freedom, loyalty and justice, but largely divorced from contemporary politics. These are stories, after all, that are about outlaws and outcasts, existing outside of the conventional hierarchies of power. And they certainly do have plenty to say about these big universal themes of freedom, loyalty and justice.
But this is also a genre that has been banned by multiple governments within living memory. Its development continues to happen in the shadows of fickle Chinese censorship and at the heart of it remains a certain defiant cultural and national pride intermingled with nostalgia and diasporic yearning. The vast majority of the most iconic wuxia texts are not written by Chinese authors living comfortably in China, but by a dreaming diaspora amid or in the aftermath of vast political turmoil.
Which is all to say that the world of wuxia is fundamentally bound up with those hierarchies of power it seeks to reject. Much like there is more to superheroes than dorky names, love triangles, and broad universal ideals of justice, wuxia is grounded in the specific time and place of its creation.
Biography of Old Dragon-beard (虯髯客傳) by Du Guangting (杜光庭, 850-933) is commonly cited as the first wuxia novel. It chronicles the adventures of the titular Old Dragon-beard, who along with the lovers, Hongfu 紅拂 and Li Jing 李靖, make up the Three Heroes of the Wind and Dust. But the story isn’t just supernatural adventures; they also help Li Shimin 李世民 found the Tang Dynasty (618–906). The martial prowess and the seemingly eccentric titles of the characters aside, the act of dynastic creation is unavoidably political. 虯髯客傳 pivots around Hongfu’s ability to discern the true worth a man, which leads her to abandon her prior loyalties and cleave her love to Li Jing and his vision for a better empire. Not to mention Du wrote this and many of his other works whilst in exile with the Tang imperial court in the south, after rebels sacked the capital and burnt his books. Knowing this, it is difficult not to see Du as mythologising the past into a parable of personal resonance, that perhaps he too was making decisions about loyalties and legacies, which court or emperor he should stay with, asking himself if the Tang would indeed rise again (as he himself, as a taoist has prophecised).
Other commonly cited antecedents to the modern wuxia genre are the 14th Century classics like Romance of the Three Kingdoms (三國演義) and Outlaws of the Marsh (水滸傳), the former of which is all about the founding of dynasties and gives to Chinese the now ubiquitously cited The empire, long divided, must unite; long united, must divide. Thus it has ever been (话说天下大势．分久必合，合久必分).
Revolutionaries, Rebels and Race in the Qing Dynasty
No era of imperial China was in possession of a “free press”, but the literary inquisitions under the Qing Dynasty (1644–1911) were particularly bloody and thorough. The Manchu elite suppressed any openly revolutionary sentiment in fiction, however metaphorical, and what is written instead is a literature that sublimates much of that discontent into historical fiction nostalgic for the eras of Han dominance. Wandering heroes of the past were refashioned into a pariah elite, both marginalised from mainstream society but also superior to it with their taoist-cultivated powers.
Whilst earlier quasi-historical epics and supernatural tales are replete with gods and ghosts, late Qing wuxia begins to shed these entities and instead grounds itself in a world where taoist self-cultivation grants immense personal powers but not divinity itself. In each of the successive reprintings of Three Heroes and Five Gallants (三俠五義), editors pruned the text of anachronisms and supernatural flourishes.
The parallel world of secret societies, foreign cults, bickering merchants and righteous martial clans came to be known as jianghu, literally “rivers and lakes”. As a metaphor, it was first coined by taoist philosopher, Zhuangzi 莊子, to describe a utopian space outside of cutthroat court politics, career ambitions and even human attachments. This inspires subsequent generations of literati in their pursuits of aesthetic hermitism, but the jianghu we know today comes also from the waterways that form the key trade routes during the Ming Dynasty (1368–1644). To the growing mercantile classes, jianghu referred to the actual rivers and canals traversed by barges heavy with goods and tribute, a byname for the prosperous Yangtze delta.
These potent lineages of thought intermingle into what jianghu is within martial arts fiction today, that quasi historical dream time of adventure. But there is also another edge to it. In Stateless Subjects: Chinese Martial Arts History and Postcolonial History, Petrus Liu translates jianghu as “stateless”, which further emphasizes that the hero’s rejection of and by the machineries of government. Jianghu is thus a world that rejects the dictates of the state in favor of divine virtue and reason, but also of a sense of self created through clan and community.
The name of the genre, wuxia (“武俠“) comes from Japanese, where a genre of martially-focused bushido-inspired fiction called bukyō (“武侠”) was flourishing. It was brought into Chinese by Liang Qichao 梁启超, a pamphleteer writing in political exile in Japan, seeking to reawaken what he saw as Han China’s slumbering and forgotten martial spirit. In his political work, he holds up the industrialisation and militarisation of Meiji Japan (and its subsequent victory against Russia) as inspiration and seeks a similar restoration of racial and cultural pride for the Han people to be the “master of the Continent” above the hundred of different races who have settled in Asia.
Wuxia is fundamentally rooted in these fantasies of racial and cultural pride. Liang Qichao’s visions of Han exceptionalism were a response to subjugation under Manchu rule and Western colonialism, a martial rebuttal to the racist rhetoric of China being the “Sick Man of Asia”. But it is still undeniably ethno-nationalism built around the descendants of the Yellow Emperor conquering again the continent that is their birthright. Just as modern western fantasy has as its bones the nostalgia for a pastoral, premodern Europe, wuxia can be seen as a dramatisation of Sinocentric hegemony, where taoist cultivation grants power and stalwart heroes fight against an ever-barbaric, ever-invading Other.
Dreams of the Diaspora
Jin Yong 金庸 remains synonymous with the genre of wuxia in Chinese and his foundational mark on it cannot be overstated. His Condor Trilogy (射鵰三部曲) was serialised between 1957-63 and concerns three generations of heroes during the turbulent 12th-13th centuries. The first concerns a pair of sworn brothers, one loyal and righteous, the other clever and treacherous. Their friendship deteriorates as the latter falls into villainy, scheming with the Jin Empire (1115–1234) to conquer his native land. The second in the trilogy follows their respective children repeating and atoning for the mistakes of their parents whilst the Mongols conquer the south. The last charts the internal rivalries within the martial artists fighting over two peerless weapons whilst its hero leads his secret society to overthrow the Yuan Dynasty (1271–1368).
It’s around here that English articles about him start comparing him to Tolkien, and it’s not wholly unjustified, given how both created immensely popular and influential legendaria that draw heavily upon ancient literary forms. Entire genres of work have sprung up around them and even subversions of their work have become themselves iconic. Jin Yong laid down what would become the modern conventions of the genre, from the way fights are imagined with discrete moves, to the secret martial arts manuals and trap-filled tombs.
Unlike Tolkien, however, Jin Yong’s work is still regularly (even aggressively) adapted. There are in existence nine tv adaptations of each instalment of the Condor Trilogy, for example, as well as a video game and a mobile game. And at time of writing, eight feature films and nine tv series based on his work are in production.
But Jin Yong’s work was not always so beloved by mainland Chinese audiences. For a long time he, along with the rest of wuxia, were banned and the epicentre of the genre was in colonial Hong Kong. It is a detail often overlooked in the grand history of wuxia, so thoroughly has the genre been folded into contemporary Chinese identity. It is hard at times to remember how much of the genre was created by these artists in exile. Or perhaps that is the point, as Hong Kong’s own unique political and cultural identity is being subsumed into that of the People’s Republic, so too is its literary legacy. Literalist readings of his work as being primarily about historical martial artists defang the political metaphors and pointed allegories.
Jin Yong’s work is deeply political. Even in the most superficial sense, his heroes intersect with the politics of their time, joining revolutionary secret societies, negotiating treaties with Russia and fighting against barbarian invaders. They are bound up in the temporal world of hierarchy and power. Legend of the Condor Hero (射鵰英雄傳)’s Guo Jing 郭靖 becomes the sworn brother to Genghis Khan’s son, Tolui, and joins the Mongol campaign against the Khwarezmid Empire. Book and Sword (書劍恩仇錄)’s Chen Jialuo 陳家洛 is secretly the Qianlong Emperor’s half brother. The Deer and the Cauldron (鹿鼎記)’s Wei Xiaobao 韋小寶 is both best friends with the Kangxi Emperor and also heavily involved in a secret society dedicated to overthrowing the aforementioned emperor. Even Return of the Condor Hero (神鵰俠侶)‘s Yang Guo 楊過 ends up fighting to defend the remains of the Song Empire against the Mongols.
But it goes deeper than that. Jin Yong was a vocal critic of the Cultural Revolution, penning polemics against Mao Zedong and the Gang of Four during the late 60s. Beyond the immediate newspaper coverage, Jin Yong edited and published many more works both documenting and dissecting the Cultural Revolution.
Jin Yong described himself as writing every day one novel instalment and one editorial against the Gang of Four. Thus did they bleed together, the villains of Laughing in the Wind (笑傲江湖) becoming recognisable caricatures as it too rejected senseless personality cults.
In this light, his novels seem almost an encyclopaedia of traditional Chinese culture, its values and virtues, a record of it to stand bulwark against the many forces that would consign it all to oblivion. It is a resounding rebuttal to principles of the May Fourth Movement, that modernisation and westernisation are equivalents. To Jin Yong the old and the traditional were valuable, and it is from this we must build our new literature .
Taken together, Jin Yong’s corpus offers an alternate history of the Han people spanning over two thousand years from the Eastern Zhou (771–256 B.C.) to the Qing Dynasty (1644–1911). He fills in the intriguing gaps left in official records with folk heroes, court gossip and conspiracy theories. His text is dense with literary allusions and quotations from old Chinese poems.
His stories are almost all set during times of turmoil when what can be termed “China”, or at least, the Han people are threatened by barbarian invasion and internal corruption; pivotal moments in history that makes heroes and patriots out of ordinary men and women. All this Jin Yong immortalises with a deep yearning for a place and past that never quite was; nostalgia in the oldest sense of the word, with all the pain and pining and illusion that it implies.
It is arguably this very yearning, this conjuring of a real and relevant past from dry history books that makes Jin Yong’s work so endlessly appealing to the Chinese diaspora, as well as the mainland Chinese emerging from the Cultural Revolution. This alternate history dramatises the complexities of Han identity, all the times it has been threatened, disrupted and diluted in history, but at the same time it gave hope and heroics. These were stories as simple or as complex as the reader wanted it to be.
Chinese Imperialism and Han Hegemony
It is sometimes hard to remember that Jin Yong and all the rest of wuxia was once banned in the People’s Republic of China, so thoroughly have they now embraced his work. As late as the 1990s was Jin Yong decried as one of the “Four Great Vulgarities of Our Time” (alongside the four heavenly kings of cantopop, Jackie Chan and sappy Qiong Yao romances).
In recent decades, the CCP has rather dramatically changed its relationship with the past. The censorship machine is still very active, but it does not have in its crosshairs the decadent and feudal genre of wuxia (though there have been exceptions, especially during the run up to the Republic’s 70th anniversary when all frivolous dramas were put on pause; it is important to remember that the censors are not always singular or consistent in their opinions). But more importantly, the Party no longer draws power from a radical rejection of the past, instead it is embraces utterly, celebrated at every turn. Traditionalism now forms a core pillar of their legitimacy, with all five thousand years of that history validating their rule. The State now actively promotes all those superstitions and feudal philosophies it once held in contempt.
Along with the shifting use of history to inspire nationalism has Jin Yong been rehabilitated and canonised. It’s arguably that revolutionary traditionalism —that he was preserving history in a time of its destruction—that makes him so easy to rehabilitate. Jin Yong’s work appeals both to the conservative mind with its love of tradition and patriotic themes, but also to rebels in its love of outlaw heroes.
It isn’t that these stories have nothing to say on themes of a more abstract or universal sense of freedom or justice, but that they are also very much about the specifics of Han identity and nationalism. Jin Yong’s heroes often find themselves called to patriotism, even as they navigate their complex or divided loyalties, they must defend “China” in whatever form it exists in at the time against barbaric, alien invaders. Even as they function as straightforward stories of nationalistic defence, they are also dramatising disruptions of a simplistic or pure Chinese identity, foregrounding characters from marginalised (if also often exoticised) ethnicities and religions.
Jin Yong’s hero Guo Jing is Han by birth and Mongol by adoption. He ultimately renounces his loyalty to Genghis Khan and returns to his Han homeland to defend it from Mongol conquest. Whilst one can read Jin Yong’s sympathy and admiration for the Mongols as an attempt to construct an inclusive nationalism for modern China, Guo Jing’s participation as a Han hero in the conquest of Central Asia also functions as a justification of modern Han China’s political claim on that imperial and colonial legacy.
Book and Sword has this even more starkly as it feeds the popular Han fantasy that the Kangxi Emperor is not ethnically Manchu but instead, a Han changeling. He is forced by the hero of the novel Chen Jialuo to swear an oath to acknowledge his Han identity and overthrow the Manchus, but of course, he then betrays them and subjugates not only the Han but also the “Land of Wei” (now known as Xin Jiang, where the genocide is happening). Still there is something to be said about how this secret parentage plot attributes the martial victories of the Qing to Han superiority and justifies the Han inheritance of former Qing colonies.
The Uyghur tribes are portrayed with sympathy in Book and Sword. They are noble and defiant and devout. Instead of savages who need to be brought to heel, they are fellow resistance fighters. It alludes to an inclusive national identity, one in which Han and Uyghur are united by their shared suffering under Manchu rule. It can also be argued that their prominence disrupts the ideal of a pure Han-centric Chineseness. But what good is inclusion and unity to those who do not want to be part of that nation? Uyghurs, being a people suffering occupation, actively reject the label of “Chinese Muslims”.
Furthermore, the character of Kasili in Book and Sword, based on the legend of the Fragrant Concubine, is drenched in orientalist stereotype. Chen first stumbles upon her bathing naked in a river, her erotic and romantic availability uncomfortably paralleling that of her homeland. When the land of Wei falls to the emperor’s sword and Kasili is taken as a concubine, she remains loyal to the Han hero she fell in love with, ultimately killing herself to warn Chen of the emperor’s duplicity. Conquest and imperial legacy is thus dramatised as a love triangle between a Uyghur princess, a Han rebel and a Manchu emperor.
Chen, it should be noted, falls in love and marries a different Uyghur princess for his happy ending.
Amid other far more brutal policies meant to forcibly assimilate and eradicate Uyghur identity, the PRC government encouraged Han men to take Uyghur women as wives. Deeply unpleasant adverts still available online extolled the beauty and availability of Uyghur women, as something and somewhere to be conquered. It is impossible not to be reminded of this when reading about the beautiful and besotted Kasili.
There is no small amount of political allegory to be read between the lines of Jin Yong, something he became increasingly frank about towards the end of his life. Condor Trilogy with its successive waves of northern invaders can be seen as echoing at the Communist takeover of China. The success of Wei Xiaobao’s affable cunning can be a satire on the hollowness materialistic 70s modernity. But Jin Yong himself proved to be far less radical than his books as he sided with the conservative anti-democracy factions within Hong Kong during the Handover.
In an 1994 interview, Jin Yong argues against the idea that China was ever under “foreign rule”, instead proposing that the many ethnic groups within China are simply taking turns on who happens to be in ascendance. All wars are thus civil wars and he neatly aligns his novels with the current Chinese policies that oppress in the name of unity, harmony and assimilation, of “inclusive” nationalism.
The legacy of Jin Yong is a complex one. His work, like all art, contains multitudes and can sustain any number of seemingly contradictory interpretations. It is what is beautiful about art. But I cannot but feel that his rapid canonisation over the last decades in mainland China is a stark demonstration of how easily those yearning dreams of the diaspora can become nationalistic fodder.
I did not come to bury wuxia, but to praise it. I wanted to show you a little bit of its complexities and history, as well as the ideals and ideologies that simmer under its surface.
For me, I just think it is too easy to see wuxia as a form of salvation. Something to sustain and inspire me in a media landscape hostile to people who look like me. To give me the piece of me that I have felt missing, to heal a deep cultural wound. After all, Hollywood or broader Anglophone media might be reluctant to make stories with Asian protagonists, but I can turn to literally all of wuxia. American TV series won’t make me a fifty episode epic about two pretty men eyefucking each other that also has a happy ending, but I will always have The Untamed.
It’s this insidious feeling of hope. That this genre is somehow wholly “unproblematic” because I am reconnecting with my cultural roots, that it can nourish me. That it can be safe that way. It is, after all, untouched by all the problematic elements in Anglophone mainstream that I have analysed to death and back. That it is some sort of oasis, untouched by colonialism and western imperialism. That it therefore won’t or can’t have that taint of white supremacy; it’s not even made by white people.
Perhaps it is just naive of me to have ever thought these things, however subconsciously. Articulating it now, it’s ridiculous. Han supremacy is a poisonous ideology that is destroying culture, hollowing out communities and actively killing people. In the face of its all-consuming genocide-perpetuating ubiquity, the least I can do is recognise its presence in a silly little genre I love. It just doesn’t seem too much to ask.
Jeannette Ng is originally from Hong Kong but now lives in Durham, UK. Her MA in Medieval and Renaissance Studies fed into an interest in medieval and missionary theology, which in turn spawned her love for writing gothic fantasy with a theological twist. She runs live roleplay games and is active within the costuming community, running a popular blog. Jeannette has been a finalist for the John W. Campbell Award for Best New Writer and the Sydney J Bounds Award (Best Newcomer) in the British Fantasy Awards 2018.
A weakness in the algorithm used to encrypt cellphone data in the 1990s and 2000s allowed hackers to spy on some internet traffic, according to a new research paper. Motherboard: The paper has sent shockwaves through the encryption community because of what it implies: The researchers believe that the mathematical probability of the weakness being introduced on accident is extremely low. Thus, they speculate that a weakness was intentionally put into the algorithm. After the paper was published, the group that designed the algorithm confirmed this was the case. Researchers from several universities in Europe found that the encryption algorithm GEA-1, which was used in cellphones when the industry adopted GPRS standards in 2G networks, was intentionally designed to include a weakness that at least one cryptography expert sees as a backdoor. The researchers said they obtained two encryption algorithms, GEA-1 and GEA-2, which are proprietary and thus not public, "from a source." They then analyzed them and realized they were vulnerable to attacks that allowed for decryption of all traffic. When trying to reverse-engineer the algorithm, the researchers wrote that (to simplify), they tried to design a similar encryption algorithm using a random number generator often used in cryptography and never came close to creating an encryption scheme as weak as the one actually used: "In a million tries we never even got close to such a weak instance," they wrote. "This implies that the weakness in GEA-1 is unlikely to occur by chance, indicating that the security level of 40 bits is due to export regulations." Researchers dubbed the attack "divide-and-conquer," and said it was "rather straightforward." In short, the attack allows someone who can intercept cellphone data traffic to recover the key used to encrypt the data and then decrypt all traffic. The weakness in GEA-1, the oldest algorithm developed in 1998, is that it provides only 40-bit security. That's what allows an attacker to get the key and decrypt all traffic, according to the researchers.
Read more of this story at Slashdot.
SaltStack has released a security update to Salt to address three critical vulnerabilities. We strongly recommend that you prioritize this update.
This is a security release. The following CVE’s were fixed as part of this release:
For my work on Debian, i want to use my debian.org email address, while for my personal projects i want to use my gmail.com address.
One way to change the user.email git config value is to git config --local in every repo, but that's tedious, error-prone and doesn't scale very well with many repositories (and the chances to forget to set the right one on a new repo are ~100%).
The solution is to use the git-config ability to include extra configuration files, based on the repo path, by using includeIf:
Content of ~/.gitconfig:
name = Sandro Tosi
email = <personal.address>@gmail.com
path = ~/.gitconfig-deb
Every time the git path is in ~/deb/ (which is where i have all Debian repos) the file ~/.gitconfig-deb will be included; its content:
[user]That results in my personal address being used on all repos not part of Debian, where i use my Debian email address. This approach can be extended to every other git configuration values.
email = firstname.lastname@example.org
Studies from around the world suggest that success depends on class size, distancing, the age of the students, and how prevalent the virus is locally.
or at this YouTube link:
Been putting this together for a while... more to come.
In no particular order, though grouped by composer.
To be clear, I'm in no way saying these are unknown themes or not loved. In my limited experience, they just don't get the same acclaim as some more well-known scores, and I feel they deserve recognition! These are just pieces of music uncannily suited to their films, and work perfectly in the movie while also standing alone as wonderful pieces of music.
And while I haven't completely steered away from the John Williams' and Jerry Goldsmiths of the world, I have tried to include slightly more off-kilter selections that are truly fantastic.
Klendathu Drop - Starship Troopers
Robocop Theme - Robocop
Riddle of Steel & Riders of Doom - Conan the Barbarian
Love Theme - Cinema Paradiso
Complete Score - The Thing
Ecstasy of Gold - The Good, The Bad, and The Ugly
Going The Distance & The Final Bell - Rocky
Main Theme - The Right Stuff
Main Theme - Capricorn One
Main Theme - Gremlins II (and Gremlins... just a great
performance of it)
Main Title - Planet of the Apes
The Enterprise - Star Trek: The Motion Picture
Erich Wolfgang Korngold
Main Title - Kings Row (also... the inspiration for Star
Main Title - Reunion - The Sea Hawk
Main Theme - Seven Years in Tibet (one of his best)
Main Theme - Born on the Fourth of July
With Malice Towards None - Lincoln
Main Theme - Predator
Main Theme - Contact (Maybe my fav on the list... I'm a sucker
for sentimentality... Sue me)
Captain America March - Captain America: The First Avenger
Junkie Xl - Mad Max: Fury Road
Daft Punk - Tron Legacy
James Horner - Commando
Wow, man. Some of us take on more extreme projects during the
Great Coronavirus Quarantine than others.
This ambitious fellow shows you how to build a Nintendo Switch, with a beautiful and wholesome purpose: “to Starve Online Price Gougers” who are jacking up the prices because demand is high for Nintendo Switch, and availability is nil.
Here's their introduction to the HOWTO gallery, which is amazing and stupendous.
After playing New Horizons and hyping it up to my friends, they decided they wanted a Switch. They called around to different retailers every day for a week with no luck finding anyone who had one in stock. No one knew when the next shipment would be. This led to an online search like Craigslist, OfferUp, and Ebay.
Unfortunately everyone knows the rest. Upwards of $450 to $600 in the Seattle area for a used Switch. Some with and without all the accessories. This enraged me to the point of telling them I could build one cheaper out of spare parts. So they hired me to do just that. If anyone is interested in doing the same here is my step by step buying guide along with assembly instructions and a pricing guide.
1. Game Cartridge Card Slot Socket Board w/Headphones Port - $15
2. NS Console Micro SD TF Memory Card Slot Port Socket Reader - $5
3. Nintendo Switch HAC-001 CPU Cooling Heatsink - $7
4. Game Cartridge Card Plastic Cover - $1
5. Console Speaker Replacement Parts For Nintendo Switch Built in speaker - $8
6. Wifi Antenna Connecting Cable (Short) $2
7. Wifi Antenna Connecting Cable (Long) $2
8. Internal Cooling Fan - $3
9. Power & Volume Button control flex cable (w/ buttons and rubber conductor) - $4
10. Side Slider Sliding Rail Flex Cable (Left) - $3
11. Side Slider Sliding Rail Flex Cable (Right) - $3
12. Replacement Top Housing Shell Case Face plate -$6
13. Nintendo Switch Console Replacement Battery (New) - $15
14. Replacement Bottom Housing Shell Transparent Case Face plate -$5
15. Touch Screen Digitizer Adhesive - $0.50
16. Touch Screen Digitizer - $9
17. LCD Display Screen Replacement - $12
18. Shield Plate - $2
19. Iron Middle Frame - $6
20. (Not Pictured Here) - 100% WORKING OEM NINTENDO SWITCH REPLACEMENT LOGIC BOARD MOTHERBOARD - $95
21. (Not Pictured Here) - Full Screw Replacement Set - $2
22. (Not Pictured Here) - (Removal of Copper Sicker on CPU)
Grand Total For Used Parts Build: = $199
Ebay Average Price Jan 2020: = (between $175 and $225)
Ebay Average Price April 2020: = (between $300 and $400)
I am sure I made made mistakes in this post so feel free to correct me if I am wrong about anything.
And screw you if you are one of the bad guys making a buck off of a crisis.
Here you go...
It used to be that being a couch potato was almost universally deemed a negative—but it’s funny how it only takes a contagious epidemic to turn the normal state of things on its head. Fortunately, nobody with a computer need be without ways to occupy their time.
Publishers, studios, and other media agencies are providing free offerings to give people plenty to do to ride out the corona lockdowns—as well as tools to assist self-education or learning at home. Here are a few of them I’ve noticed.
Educational/children’s book publisher Scholastic is offering a free 20-day learn-at-home program for grades K-9 via its web site—very handy for those in areas whose schools have closed down.
Would your children like to learn more about whales? Seattle-based research institute Oceans Initiative has launched a free Virtual Marine Biology Camp to teach school-closed children more about aquatic life. They’re holding live sessions every Monday and Thursday at 11 a.m. Pacific (2 p.m. Eastern) to help give those out-of-school children something educational to do.
Audiobook publisher and Amazon subsidiary Audible.com is making hundreds of audiobook titles available for free for the duration of school closures, via stories.audible.com.
NPR, the Sarasota Herald-Tribune, and CNET, among others, have articles collecting a lot of other free entertainment and education sources that weren’t free before the Corona quarantines. (Indeed, all you need do is google “coronavirus free entertainment” to find all the others who had the same idea.) But there are also still plenty of things that were already free and still are.
Baen’s Free Library is, of course, still just as free as it ever was. If you’re a member of a compatible public library, Hoopla Digital will let you borrow a limited number of ebooks, audiobooks, albums, movies, or TV episodes per month for free. And you still have access to Project Gutenberg, Librivox for audiobooks, Archive.org for all sorts of content, and all the other public-domain sites out there.
If you’re looking for something interesting to watch, Open Culture has links to over 200 free documentary films online, on subjects as diverse as Hayao Miyazaki and M.C. Escher. The site also includes links to free ebooks, audiobooks, online courses, and textbooks.
If you’re into anime, most of Crunchyroll‘s anime titles are available to watch for free (save for the very newest episode). Resolution may be limited, and you may have to put up with advertisements—but free is free, right? Pluto TV has over 250 channels of free video content, too, with mobile apps for iOS and Android available. And YouTube has its usual countless hundreds of thousands of hours of enjoyable ways to entertain or improve yourself, including its “Learning” category.
If you’re more into computer games, you could check out the Homecoming City of Heroes servers. Coming up on a full year since the game originally returned, it has thousands of players once again enjoying life in the early-2000s superhero MMO. (I play primarily on the Torchbearer shard, myself, and am always happy to help out new or returning players.)
There are many more free education or entertainment resources than I could even list, and there will doubtless be more the longer this lockdown goes on. How about adding your favorites in the comments?
Photo by Eric Antunes on Pexels.com
If you found this post worth reading and want to kick in a buck or two to the author, click here.
I have been late to adopt an on-premise cloud solution as the security of Owncloud a few years ago wasn't so stellar (cf. my comment from 2013 in Encryption files ... for synchronization across the Internet). But the follow-up product Nextcloud has matured quite nicely and we use it for collaboration both in the company and in FLOSS related work at multiple nonprofit organizations.
There is a very annoying "feature" in Nextcloud though that the designers think menu items for apps at the top need to be limited to eight or less to prevent information overload in the header. The whole item discussion is worth reading as it it an archetypical example of design prevalence vs. user choice.
And of course designers think they are right. That's a feature
of the trade.
And because they know better there is no user configurable option to extend that 8 items to may be 12 or so which would prevent the annoying overflow menu we are seeing with 10 applications in use:
Luckily code can be changed and there are many comments floating
around the Internet to change
minAppsDesktop = 8. In this case it is slightly
compressed form (aka "minified") as
core/js/dist/main.js and you probably don't want to
build the whole beast locally to change one constant.
gets compressed during build time to become part of one 15,000+ character line. The relevant portion reads:
Well, we can still patch that, can we?Continue reading "Fixing the Nextcloud menu to show more than eight application icons"