I’ve probably purchased 300 books in the last year for research purposes, not to mention all the fiction my wife gets (and so do I, if it costs $3 or less). For the newer ones , buying them as eBooks is generally an option. But the state of software, DRM, and copy protection for Kindle books is a mess. Kindle’s software (like iBooks) is deliberately crippled – no copying into another document, no printing, and especially no way to copy diagrams. I’m running Kindle’s software on my Mac and on an iPad, rather than using a Kindle tablet, but that barely helps.
Joe Stiglitz critique of TPP Trans-Pacific Partnership treaty:
Corporations on both sides of the Pacific have an interest at lowering regulatory standards—to protect the environment, to protect consumers, to protect workers, to protect health. But ordinary citizens, our society, will suffer. So you can get corporations on both sides pushing an agenda that will be increasing corporate profits at the cost of the well-being of people on both sides of the Pacific.
…Philip Morris is suing Uruguay under an investment agreement. It says, “This interferes with our basic right to sell products to kill people.” It’s like the Opium War 150 years ago, where the West went to war because China said, “We don’t want opium,” and we said, “That interferes with the basic right to trade.”
I have been doing a lot of OCR, as I study more than 100 old aircraft manuals to see how aviation procedures evolved. I have them all in a database, and it’s useful to search the DB for key terms like V1 and density altitude. In the end, no single OCR program did everything, and I have ended up with 3. (OCR = Optical Character Recognition = takes scanned documents and makes them searchable, copyable, etc.) Here are some notes on my experience, with the goal of saving time for others in the future. Continue reading
(I wrote this primarily for friends and colleagues. I’m posting it on my blog for efficiency/discussion/amendment.) My IT manager recently sent around a warning about phishing attacks. (And I just attended a scary CSE seminar on spear-phishing — but that is another story.) Among his advice was:
You should use a strong password on all UCSD accounts and you should never use the same password on any other account you have,
That’s perennial advice that is both good and impossible. It’s good because many (most?) web sites keep making security mistakes that lead to massive breaches, exposing millions of passwords at a time. (The recent+ 100 million account breach at Target, for example.) It’s impossible because we have a decade or more of experience, research, and discussion that says using unique passwords for each login is completely impractical, and nobody actually does it. Continue reading
I recently visited some friends and colleagues at Wharton to discuss my work on evolution of flying. Naturally, Malaysia Air MH370 came up. We have continued the discussion by email since I got back. Here is a note I wrote, explaining why it’s impossible to preprogram a flight plan so that the pilots could not override it, if they were conscious.
Sid, overriding manual override is designed to be impossible. The pilots always have override. Indeed, the first 2 items on some emergency procedures are:
1) Disengage autopilot
2) Disengage auto throttle
and there are specific buttons to make that easy to do in a hurry. (As well as by going into the Flight computer and reprogramming it, or rebooting it, etc. ) Continue reading
The Telephone Wires of Manhattan, 1887. Switchboards were a big step forward. This picture also shows an advantage of living in a city: better communications. Still true today, except measured in milliseconds.
[edits Jan. 31] A poli sci friend recently blogged about the Ukranian government’s “text that changed the world,” a mass text message thousands of anti-government demonstrators in Kiev. She asked 1) How did the government know who was in the main square of Kiev that day? (Cell phone location) and 2) How did it send the same message to everyone at once? (Mass SMS)
The second question is easy: phone companies routinely provide mass-SMS services to large customers. For example, I’m on the “emergency alert” texting service of UC San Diego’s campus police. It was designed for earthquakes, but it has been used for other kinds of messages “between earthquakes.” The same message goes out to every phone number on their list.
What to do to avoid tracking? Short version: Leave your phone at home. Second best is to shut it off or switch to airplane mode, but those work only if the government is not making an effort to target you.